Patents by Inventor Preeti Ravindra

Preeti Ravindra has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11349856
    Abstract: Embodiments provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are executed by the processor to cause the processor to implement the method of identifying an exploit kit, the method comprising: receiving, by the processor, a web page; extracting, by the processor, a plurality of features of the web page; and determining, by the processor, whether the web page is associated with an exploit kit, through an ensemble classifier model trained using the extracted features.
    Type: Grant
    Filed: January 30, 2019
    Date of Patent: May 31, 2022
    Assignee: International Business Machines Corporation
    Inventors: Bradley E. Harris, Moazzam Khan, Preeti Ravindra
  • Patent number: 11308211
    Abstract: Mechanisms are provided to perform security incident disposition operations. A security incident is received that includes a security incident data structure comprising metadata describing properties of the security incident, and a corresponding security knowledge graph which includes nodes representing elements associated with the security incident and edges representing relationships between the nodes. The security incident data structure and security knowledge graph are processed to extract a set of security incident features corresponding to the security incident and input the extracted set of security incident features into a trained security incident machine learning model. The model generates a disposition classification output based on results of processing the extracted set of security incident features. The disposition classification output is output to the source of the security incident data structure.
    Type: Grant
    Filed: June 18, 2019
    Date of Patent: April 19, 2022
    Assignee: International Business Machines Corporation
    Inventors: Burkhard Ringlein, Preeti Ravindra, Bradley E. Harris, Moazzam Khan, James B. Peterson
  • Publication number: 20210349994
    Abstract: An approach is provided in which the approach receives a global trending threat corresponding to an incident occurring in an industry. The approach identifies a set of local Indicators of Concern (IoCs) within an entity that corresponds to the global trending threat, and computes an alert priority based on the set of local IoCs and the global trending threat. The approach adjusts the alert priority based on comparing entity properties of the entity with threat properties of the global trending threat, and dispatches an alert based on the adjusted alert priority.
    Type: Application
    Filed: May 11, 2020
    Publication date: November 11, 2021
    Inventors: PREETI RAVINDRA, Ilgen Banu Yuceer, Kevin Tabb
  • Patent number: 11082434
    Abstract: A cognitive security analytics platform is enhanced by providing a technique for automatically inferring temporal relationship data for cybersecurity events. In operation, a description of a security event is received, typically as unstructured security content or data. Information such as temporal data or cues, are extracted from the description, along with security entity and relationship data. Extracted temporal information is processing according to a set of temporal markers (heuristics) to determine a time value marker (i.e., an established time) of the security event. This processing typically involves retrieval of information from one or more structured data sources. The established time is linked to the security entities and relationships. The resulting security event, as augmented with the identified temporal data, is then subjected to a management operation.
    Type: Grant
    Filed: April 6, 2019
    Date of Patent: August 3, 2021
    Assignee: International Business Machines Corporation
    Inventors: Preeti Ravindra, Youngja Park, Dhilung Hang Kirat, Jiyong Jang, Marc Philippe Stoecklin
  • Publication number: 20200401696
    Abstract: Mechanisms are provided to perform security incident disposition operations. A security incident is received that includes a security incident data structure comprising metadata describing properties of the security incident, and a corresponding security knowledge graph which includes nodes representing elements associated with the security incident and edges representing relationships between the nodes. The security incident data structure and security knowledge graph are processed to extract a set of security incident features corresponding to the security incident and input the extracted set of security incident features into a trained security incident machine learning model. The model generates a disposition classification output based on results of processing the extracted set of security incident features. The disposition classification output is output to the source of the security incident data structure.
    Type: Application
    Filed: June 18, 2019
    Publication date: December 24, 2020
    Inventors: Burkhard Ringlein, Preeti Ravindra, Bradley E. Harris, Moazzam Khan, James B. Peterson
  • Publication number: 20200322361
    Abstract: A cognitive security analytics platform is enhanced by providing a technique for automatically inferring temporal relationship data for cybersecurity events. In operation, a description of a security event is received, typically as unstructured security content or data. Information such as temporal data or cues, are extracted from the description, along with security entity and relationship data. Extracted temporal information is processing according to a set of temporal markers (heuristics) to determine a time value marker (i.e., an established time) of the security event. This processing typically involves retrieval of information from one or more structured data sources. The established time is linked to the security entities and relationships. The resulting security event, as augmented with the identified temporal data, is then subjected to a management operation.
    Type: Application
    Filed: April 6, 2019
    Publication date: October 8, 2020
    Applicant: International Business Machines Corporation
    Inventors: Preeti Ravindra, Youngja Park, Dhilung Hang Kirat, Jiyong Jang, Marc Philippe Stoecklin
  • Publication number: 20200244686
    Abstract: Embodiments provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are executed by the processor to cause the processor to implement the method of identifying an exploit kit, the method comprising: receiving, by the processor, a web page; extracting, by the processor, a plurality of features of the web page; and determining, by the processor, whether the web page is associated with an exploit kit, through an ensemble classifier model trained using the extracted features.
    Type: Application
    Filed: January 30, 2019
    Publication date: July 30, 2020
    Inventors: Bradley E. Harris, Moazzam Khan, Preeti Ravindra