Patents by Inventor Paul Coccoli
Paul Coccoli has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12267404Abstract: A network appliance is configured to provide inline traffic inspection for all flow through the device, to selectively intercept based on traffic content or policy, and to modify intercepted traffic content, all without connection termination and re-origination. Content modification may involve substitution of traffic content with smaller or larger content, in which case the device provides appropriate sequence number translations for acknowledgements to the endpoints. This streaming rewrite may occur on a byte-at-a-time basis, while keeping the session alive and without a need to proxy it. The appliance enables transmitted TCP data to be modified inline and then reliably delivered without the overhead of forwarding packets through a full-blown TCP stack. Rather, the approach relies upon an initiator entity's TCP stack for congestion control, as well as the receiving entity's re-transmission behavior to determine how the device manages packets internally.Type: GrantFiled: July 1, 2019Date of Patent: April 1, 2025Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gregory Lyle Galloway, Paul Coccoli, David Allen Dennerline, Steven Ashley Mazur
-
Publication number: 20240143745Abstract: A computer-implemented method includes receiving CTI from a data source during a search of a system, and capturing the CTI in a STIX bundle. The method includes invoking an analytic pipeline on the STIX bundle that includes applying a classification model on the STIX bundle to classify features from the CTI and applying a clustering model on the STIX bundle to identify a cluster of features from the CTI. The output of the analytic pipeline is analyzed to identify suspicious features that include a combination of the classified features and the cluster of features. The suspicious features are annotated thereby highlighting risk and threat, and attack techniques are identified using existing domain expertise encoded as heuristics to provide additional machine learning features.Type: ApplicationFiled: October 28, 2022Publication date: May 2, 2024Inventors: Sulakshan Vajipayajula, Jason David Keirstead, Paul Coccoli
-
Publication number: 20240022578Abstract: A computer-implemented method according to one embodiment includes causing a search to be performed for data on at least one security endpoint and organizing information about the performed search into steps and variables. Security analytics are run on a dataset provided from the performed search, and based on results of the analytics, a response is invoked to protect a system that interacts with the analyzed dataset. A computer program product according to another embodiment includes a computer readable storage medium having program instructions embodied therewith. The program instructions are readable and/or executable by a computer to cause the computer to perform the foregoing method. A system according to another embodiment includes a processor, and logic integrated with the processor, executable by the processor, or integrated with and executable by the processor. The logic is configured to perform the foregoing method.Type: ApplicationFiled: July 13, 2022Publication date: January 18, 2024Inventors: Sulakshan Vajipayajula, Paul Coccoli, Xiaokui Shu
-
Patent number: 11522880Abstract: A method, system, and computer-usable medium for analyzing security data formatted in STIX™ format. Data related to actions performed by one or more users is captured. Individual tasks, such as analytics or extract, transform, load (ETL) tasks related to the captured data is created. Individual tasks are registered to a workflow for executing particular security threat or incident analysis. The workflow is executed and visualized to perform the security threat or incident analysis.Type: GrantFiled: July 9, 2020Date of Patent: December 6, 2022Assignee: International Business Machines CorporationInventors: Sulakshan Vajipayajula, Paul Coccoli, James Brent Peterson, Michael Vu Le, Ian Michael Molloy
-
Publication number: 20220014531Abstract: A method, system, and computer-usable medium for analyzing security data formatted in STIX™ format. Data related to actions performed by one or more users is captured. Individual tasks, such as analytics or extract, transform, load (ETL) tasks related to the captured data is created. Individual tasks are registered to a workflow for executing particular security threat or incident analysis. The workflow is executed and visualized to perform the security threat or incident analysis.Type: ApplicationFiled: July 9, 2020Publication date: January 13, 2022Inventors: Sulakshan Vajipayajula, Paul Coccoli, James Brent Peterson, Michael Vu Le, Ian Michael Molloy
-
Patent number: 10742499Abstract: A computer program product and a computer system for distributed dynamic sizing and load self-management for a relay infrastructure. Program instructions are executable to initiate, by the non-leaving relay in a relay infrastructure, an expansion process, in response to determining that a current load level reaches an expansion level and in response to determining that an overload condition of the relay infrastructure is satisfied; send to a server, by the non-leaving relay, an expansion message, in response to initiating the expansion process; send to the server, by the non-leaving relay, local statistics of endpoints of the non-leaving relay; shift, by the non-leaving relay, one or more endpoints of the non-leaving relay to a first new relay, in response to the server selecting from the endpoints an endpoint and converting the endpoint to the first new relay.Type: GrantFiled: June 10, 2019Date of Patent: August 11, 2020Assignee: International Business Machines CorporationInventors: Paul Coccoli, Bradford A. Fisher, Nathan P. Frith, Jian Lin
-
Patent number: 10708348Abstract: Methods and systems for high-availability data processing include detecting, at a first data processing system, a change in link state between the first data processing system and a second data processing system. A link state between the first data processing system and a third data processing system is changed responsive to the detection in accordance with a first high availability policy stored at the first data processing system. An identifier of the first data processing system is changed in accordance with the first high availability policy to conform to a second high availability policy stored at the first data processing system. The detection, change of the link state, and change of the identifier are repeated in accordance with the second high availability policy.Type: GrantFiled: August 15, 2016Date of Patent: July 7, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul Coccoli, Gregory L. Galloway, Cheng-Ta Lee, Wei-Shiau Suen, Ming-Hsun Wu
-
Publication number: 20190327347Abstract: A network appliance is configured to provide inline traffic inspection for all flow through the device, to selectively intercept based on traffic content or policy, and to modify intercepted traffic content, all without connection termination and re-origination. Content modification may involve substitution of traffic content with smaller or larger content, in which case the device provides appropriate sequence number translations for acknowledgements to the endpoints. This streaming rewrite may occur on a byte-at-a-time basis, while keeping the session alive and without a need to proxy it. The appliance enables transmitted TCP data to be modified inline and then reliably delivered without the overhead of forwarding packets through a full-blown TCP stack. Rather, the approach relies upon an initiator entity's TCP stack for congestion control, as well as the receiving entity's re-transmission behavior to determine how the device manages packets internally.Type: ApplicationFiled: July 1, 2019Publication date: October 24, 2019Applicant: International Business Machines CorporationInventors: Gregory Lyle Galloway, Paul Coccoli, David Allen Dennerline, Steven Ashley Mazur
-
Publication number: 20190296975Abstract: A computer program product and a computer system for distributed dynamic sizing and load self-management for a relay infrastructure. Program instructions are executable to initiate, by the non-leaving relay in a relay infrastructure, an expansion process, in response to determining that a current load level reaches an expansion level and in response to determining that an overload condition of the relay infrastructure is satisfied; send to a server, by the non-leaving relay, an expansion message, in response to initiating the expansion process; send to the server, by the non-leaving relay, local statistics of endpoints of the non-leaving relay; shift, by the non-leaving relay, one or more endpoints of the non-leaving relay to a first new relay, in response to the server selecting from the endpoints an endpoint and converting the endpoint to the first new relay.Type: ApplicationFiled: June 10, 2019Publication date: September 26, 2019Inventors: PAUL COCCOLI, BRADFORD A. FISHER, NATHAN P. FRITH, JIAN LIN
-
Patent number: 10397054Abstract: Methods for distributed dynamic sizing and load self-management for a relay infrastructure. In one method, a relay in a relay infrastructure determines whether a current load level of the relay reaches an expansion level of the relay and whether an overload condition of the relay infrastructure is satisfied, and the relay initiates an expansion process in response to the determination. In another method, a relay in a relay infrastructure determines whether in response to determining that an underload condition of the relay infrastructure is satisfied, and the relay initiates a contraction process in response to the determination. In yet another method, a relay in a relay infrastructure determines whether a tolerance-load condition of the relay infrastructure is satisfied, and the relay in initiates a load self-management process in response to the determination.Type: GrantFiled: October 26, 2017Date of Patent: August 27, 2019Assignee: International Business Machines CorporationInventors: Paul Coccoli, Bradford A. Fisher, Nathan P. Frith, Jian Lin
-
Patent number: 10382591Abstract: A network appliance is configured to provide inline traffic inspection for all flow through the device, to selectively intercept based on traffic content or policy, and to modify intercepted traffic content, all without connection termination and re-origination. Content modification may involve substitution of traffic content with smaller or larger content, in which case the device provides appropriate sequence number translations for acknowledgements to the endpoints. This streaming rewrite may occur on a byte-at-a-time basis, while keeping the session alive and without a need to proxy it. The appliance enables transmitted TCP data to be modified inline and then reliably delivered without the overhead of forwarding packets through a full-blown TCP stack. Rather, the approach relies upon an initiator entity's TCP stack for congestion control, as well as the receiving entity's re-transmission behavior to determine how the device manages packets internally.Type: GrantFiled: October 13, 2014Date of Patent: August 13, 2019Assignee: International Business Machines CorporationInventors: Gregory Lyle Galloway, Paul Coccoli, Jr., David Allen Dennerline, Steven Ashley Mazur
-
Publication number: 20190132201Abstract: Methods for distributed dynamic sizing and load self-management for a relay infrastructure. In one method, a relay in a relay infrastructure determines whether a current load level of the relay reaches an expansion level of the relay and whether an overload condition of the relay infrastructure is satisfied, and the relay initiates an expansion process in response to the determination. In another method, a relay in a relay infrastructure determines whether in response to determining that an underload condition of the relay infrastructure is satisfied, and the relay initiates a contraction process in response to the determination. In yet another method, a relay in a relay infrastructure determines whether a tolerance-load condition of the relay infrastructure is satisfied, and the relay in initiates a load self-management process in response to the determination.Type: ApplicationFiled: October 26, 2017Publication date: May 2, 2019Inventors: PAUL COCCOLI, BRADFORD A. FISHER, NATHAN P. FRITH, JIAN LIN
-
Patent number: 9961103Abstract: A network-based appliance includes a mechanism to intercept, decrypt and inspect secure network traffic flowing over SSL/TLS between a client and a server. The mechanism responds to detection of a session initiation request message from the client, the message being received following establishment of a TCP connection between the client and server. The mechanism responds by holding the session initiation request message, preferably by creating a fake socket to a local process, and then diverting the request message over that socket. The TCP connection is then terminated, and the mechanism initiates a new session in initiation request message, all while the original session initiation request message continues to be held. The server responds with its server certificate, which is then used by the mechanism to generate a new server certificate. The new server certificate is then returned to the requesting client as the response to the session initiation request message.Type: GrantFiled: October 28, 2014Date of Patent: May 1, 2018Assignee: International Business Machines CorporationInventors: Ronald Becker Williams, Paul Coccoli, John William Court, Gregory Lyle Galloway, Matthew Joseph Kubilus, Steven Ashley Mazur, Joseph Karl Vossen
-
Publication number: 20180048546Abstract: Methods and systems for high-availability data processing include detecting, at a first data processing system, a change in link state between the first data processing system and a second data processing system. A link state between the first data processing system and a third data processing system is changed responsive to the detection in accordance with a first high availability policy stored at the first data processing system. An identifier of the first data processing system is changed in accordance with the first high availability policy to conform to a second high availability policy stored at the first data processing system. The detection, change of the link state, and change of the identifier are repeated in accordance with the second high availability policy.Type: ApplicationFiled: August 15, 2016Publication date: February 15, 2018Inventors: Paul Coccoli, Gregory L. Galloway, Cheng-Ta Lee, Wei-Shiau Suen, Ming-Hsun Wu
-
Publication number: 20160119374Abstract: A network-based appliance includes a mechanism to intercept, decrypt and inspect secure network traffic flowing over SSL/TLS between a client and a server. The mechanism responds to detection of a session initiation request message from the client, the message being received following establishment of a TCP connection between the client and server. The mechanism responds by holding the session initiation request message, preferably by creating a fake socket to a local process, and then diverting the request message over that socket. The TCP connection is then terminated, and the mechanism initiates a new session in initiation request message, all while the original session initiation request message continues to be held. The server responds with its server certificate, which is then used by the mechanism to generate a new server certificate. The new server certificate is then returned to the requesting client as the response to the session initiation request message.Type: ApplicationFiled: October 28, 2014Publication date: April 28, 2016Inventors: Ronald Becker Williams, Paul Coccoli, John William Court, Gregory Lyle Galloway, Matthew Joseph Kubilus, Steven Ashley Mazur, Joseph Karl Vossen
-
Publication number: 20160105469Abstract: A network appliance is configured to provide inline traffic inspection for all flow through the device, to selectively intercept based on traffic content or policy, and to modify intercepted traffic content, all without connection termination and re-origination. Content modification may involve substitution of traffic content with smaller or larger content, in which case the device provides appropriate sequence number translations for acknowledgements to the endpoints. This streaming rewrite may occur on a byte-at-a-time basis, while keeping the session alive and without a need to proxy it. The appliance enables transmitted TCP data to be modified inline and then reliably delivered without the overhead of forwarding packets through a full-blown TCP stack. Rather, the approach relies upon an initiator entity's TCP stack for congestion control, as well as the receiving entity's re-transmission behavior to determine how the device manages packets internally.Type: ApplicationFiled: October 13, 2014Publication date: April 14, 2016Inventors: Gregory Lyle Galloway, Paul Coccoli, JR., David Allen Dennerline, Steven Ashley Mazur
-
Patent number: 7177295Abstract: Method for selecting a route within a wireless ad-hoc routing protocol using a QoS metric. The method begins by dynamically defining a routing zone that encompasses at least two of the network nodes. A communications link is established between the source node and a destination node. If the destination node is within the routing zone of the source node, the route is determined by a proactive routing protocol. If, however, the destination node is outside the routing zone, the route is determined using a reactive routing protocol. A QoS metric for each route is calculated by combining the individual QoS metrics for each hop within the particular route. Finally, the route with the best QoS metric is selected to use as the communications link between the source node and the destination node.Type: GrantFiled: March 8, 2002Date of Patent: February 13, 2007Assignee: Scientific Research CorporationInventors: Peter Sholander, Tracey Oakes, Paul Coccoli