Patents by Inventor Roy Hodgman
Roy Hodgman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220197930Abstract: Disclosed herein are methods, systems, and processes to optimize role level identification for computing resource allocation to perform security operations in networked computing environments. A role level classifier to process a training dataset that corresponds to a clean title is generated from a subset of entities associated with the clean title. An initial effective title determined by the role level classifier based on processing the training dataset is assigned to an entity. A new effective title based on feature differences between the initial effective title and the clean title is re-assigned to the entity. Performance of the generating, the assigning, and the re-assigning is repeated using the new effective title instead of the clean title.Type: ApplicationFiled: March 9, 2022Publication date: June 23, 2022Applicant: Rapid7, Inc.Inventors: Vasudha Shivamoggi, Wah-Kwan Lin, Roy Hodgman
-
Patent number: 11368474Abstract: Analyzing and reporting anomalous internet traffic data by accepting a request for a connection to a virtual security appliance, collecting attribute data about the connection, applying an alert module to the data, and automatically generating an alert concerning an identified incident. An alert system for analyzing and reporting the anomalous internet traffic data. A processor to analyze and report anomalous internet traffic data.Type: GrantFiled: April 10, 2018Date of Patent: June 21, 2022Assignee: Rapid7, Inc.Inventors: Roy Hodgman, Wah-Kwan Lin, Vasudha Shivamoggi
-
Publication number: 20220182407Abstract: Approaches provide for securing an electronic environment. A threat analysis service can obtain data for devices, users, and threats from disparate sources and can correlate users to devices and threats to build an understanding of an electronic environment's operational, organizational, and security concerns in order to provide customized security strategies and remediations. Additionally, the threat analysis service can develop a model of an electronic environment's behavior by monitoring and analyzing various the data from the data sources. The model can be updated such that the threat analysis service can tailor its orchestration to complement existing operational processes.Type: ApplicationFiled: February 17, 2022Publication date: June 9, 2022Applicant: Rapid7, Inc.Inventors: Roy Hodgman, Kwan Lin, Vasudha Shivamoggi
-
Patent number: 11356463Abstract: Methods and systems for detecting malicious processes. Methods described herein gather data regarding process locations and calculate one or more inequality indicators related to the process paths based on economic principles. Instances of inequality with respect to process paths may indicate a path is uncommon and therefore the associated binary is used for malicious purposes.Type: GrantFiled: September 18, 2019Date of Patent: June 7, 2022Assignee: Rapid7, Inc.Inventors: Roy Hodgman, Oliver Keyes, Wah-Kwan Lin, Michael Scutt, Timothy Stiller
-
Patent number: 11310200Abstract: A method and system for classifying malicious locators where a processor is trained on a set of known malicious locators using a non-supervised learning procedure. Once trained, the processor may classify new locators as being generated by a particular generation kit.Type: GrantFiled: January 30, 2020Date of Patent: April 19, 2022Assignee: Rapid7, Inc.Inventors: Roy Hodgman, Aditya Kuppa, Suchin Gururangan, Andrew Reece
-
Patent number: 11301494Abstract: Methods, systems, and processes to optimize role level identification for computing resource allocation to perform security operations in networked computing environments. A role level classifier to process a training dataset that corresponds to a clean title is generated from a subset of entities associated with the clean title. An initial effective title determined by the role level classifier based on processing the training dataset is assigned to an entity. A new effective title based on feature differences between the initial effective title and the clean title is re-assigned to the entity. Performance of the generating, the assigning, and the re-assigning is repeated using the new effective title instead of the clean title.Type: GrantFiled: October 8, 2018Date of Patent: April 12, 2022Assignee: Rapid7, Inc.Inventors: Vasudha Shivamoggi, Wah-Kwan Lin, Roy Hodgman
-
Patent number: 11290479Abstract: Approaches provide for securing an electronic environment. A threat analysis service can obtain data for devices, users, and threats from disparate sources and can correlate users to devices and threats to build an understanding of an electronic environment's operational, organizational, and security concerns in order to provide customized security strategies and remediations. Additionally, the threat analysis service can develop a model of an electronic environment's behavior by monitoring and analyzing various the data from the data sources. The model can be updated such that the threat analysis service can tailor its orchestration to complement existing operational processes.Type: GrantFiled: August 11, 2018Date of Patent: March 29, 2022Assignee: Rapid7, Inc.Inventors: Roy Hodgman, Wah-Kwan Lin, Vasudha Shivamoggi
-
Patent number: 11223638Abstract: Methods and systems for classifying network users. The system may receive a classification of a user account on a network and network activity data associated with the user account. Upon detecting a discrepancy between the expected behavior of the user account based on its classification and the present behavior of the user account, the system may obtain a corroborating result from one or more directory sources. An alert may then be issued based on the detected discrepancy and the corroborating result.Type: GrantFiled: December 27, 2018Date of Patent: January 11, 2022Assignee: Rapid7, Inc.Inventor: Roy Hodgman
-
Publication number: 20210385253Abstract: Disclosed herein are methods, systems, and processes to detect valid clusters and eliminate spurious clusters in cybersecurity-based computing environments. A cluster detection and elimination model is trained by accessing a dataset with raw data that includes data points associated with computing devices in a network and applying two or more different clustering methodologies independently to the dataset. The resulting cluster detection and elimination model is used to compare two or more clusters to determine whether a cluster from one clustering methodology matches another cluster from another clustering methodology based on centroid locations and shared data points.Type: ApplicationFiled: August 24, 2021Publication date: December 9, 2021Applicant: Rapid7, Inc.Inventors: Vasudha Shivamoggi, Roy Hodgman, Wah-Kwan Lin
-
Publication number: 20210357510Abstract: Methods and systems for assessing a vulnerability of a network device. The systems and methods described herein combine data regarding locally discovered vulnerabilities and exposed services with data regarding what executables are provided by software installed on the network device.Type: ApplicationFiled: August 2, 2021Publication date: November 18, 2021Applicant: Rapid7, Inc.Inventors: Roy Hodgman, Jonathan Hart
-
Publication number: 20210360021Abstract: Methods and systems for identifying a network vulnerability. The system may gather data regarding a new or previously unknown network device, and compare the gathered data to one or more known devices that are scanned by a vulnerability assessment device. The vulnerability assessment device may then scan the previously unknown device upon a processor determining the previously unknown device shares at least one feature with a known device that is scanned.Type: ApplicationFiled: August 2, 2021Publication date: November 18, 2021Applicant: Rapid7, Inc.Inventors: Justin Pagano, Roy Hodgman
-
Patent number: 11128667Abstract: Disclosed herein are methods, systems, and processes to detect valid clusters and eliminate spurious clusters in cybersecurity-based computing environments. A cluster detection and elimination model is trained by accessing a dataset with raw data that includes data points associated with computing devices in a network and applying two or more different clustering methodologies independently to the dataset. The resulting cluster detection and elimination model is used to compare two or more clusters to determine whether a cluster from one clustering methodology matches another cluster from another clustering methodology based on centroid locations and shared data points.Type: GrantFiled: November 29, 2018Date of Patent: September 21, 2021Assignee: Rapid7, Inc.Inventors: Vasudha Shivamoggi, Roy Hodgman, Wah-Kwan Lin
-
Publication number: 20210288998Abstract: Disclosed herein are methods, systems, and processes for monitoring scan attempts in a network. A virtual security appliance with multiple ports is deployed in a network. One or more ports are obfuscated via the virtual security appliance to make the various ports appear to be closed. An address of the virtual security appliance within the network is modified, the several ports are adjusted to assume a predetermined profile, a network neighbor's profile is discovered and emulated, and a received connection attempt intended for the virtual security appliance is monitored.Type: ApplicationFiled: March 15, 2021Publication date: September 16, 2021Applicant: Rapid7, Inc.Inventors: Roy Hodgman, Jeff Myers
-
Publication number: 20210288986Abstract: Disclosed herein are methods, systems, and processes for detecting data exfiltration. A data exfiltration event in a network is detected. Traffic data regarding outgoing traffic of a source in the network associated with the data exfiltration event is received. A logarithmic transformation is applied to the traffic data to generate transformed data. An outlier identification technique is selected based on the transformed data and is executed on the transformed data to determine that the outgoing traffic is indicative of the data exfiltration event. An alert is generated in response to the determination that the outgoing traffic is indicative of the data exfiltration event.Type: ApplicationFiled: June 2, 2021Publication date: September 16, 2021Applicant: Rapid7, Inc.Inventors: Dustin Myers, Vasudha Shivamoggi, Roy Hodgman
-
Patent number: 11115431Abstract: Methods and systems for identifying a network vulnerability. The system may gather data regarding a new or previously unknown network device, and compare the gathered data to one or more known devices that are scanned by a vulnerability assessment device. The vulnerability assessment device may then scan the previously unknown device upon a processor determining the previously unknown device shares at least one feature with a known device that is scanned.Type: GrantFiled: October 5, 2018Date of Patent: September 7, 2021Assignee: Rapid7, Inc.Inventors: Justin Pagano, Roy Hodgman
-
Patent number: 11113405Abstract: Methods and systems for assessing a vulnerability of a network device. The systems and methods described herein combine data regarding locally discovered vulnerabilities and exposed services with data regarding what executables are provided by software installed on the network device.Type: GrantFiled: April 10, 2018Date of Patent: September 7, 2021Assignee: Rapid7, Inc.Inventors: Roy Hodgman, Jonathan Hart
-
Patent number: 11102222Abstract: Methods and systems for scanning a network. The disclosed methods may involve receiving a list of a plurality of target devices and scanning a first device to determine if a particular port and protocol combination appears to be open on the first device. Upon determining that a particular port and protocol combination appears to be open on the first device, the method involves interrogating the first device before or during scanning of a second device to gather data regarding a service running on the first device.Type: GrantFiled: June 17, 2019Date of Patent: August 24, 2021Assignee: Rapid7, Inc.Inventors: Roy Hodgman, Jonathan Hart
-
Patent number: 11057410Abstract: Methods and systems for detecting a data exfiltration event on a network. The method includes receiving traffic data and applying a transformation to transform the traffic data at least closer to a normal distribution. The method further includes selecting at least one outlier identification technique based on a property of the transformed data, and then executing the at least one selected identification technique to determine whether the traffic data is indicative of a data exfiltration event.Type: GrantFiled: February 27, 2019Date of Patent: July 6, 2021Assignee: Rapid7, Inc.Inventors: Dustin Myers, Vasudha Shivamoggi, Roy Hodgman
-
Patent number: 10979454Abstract: Methods and devices for monitoring scan attempts in a network. Various embodiments provide enhancements to existing honeypot devices. These enhancements may include at least one of: (1) a port access module configured to make at least one honeypot port appear to be closed; (2) a mobility module configured to change the address of the honeypot within the network; (3) an emulation module configured to discover a network neighbor's profile and further configured to emulate the network neighbor's profile.Type: GrantFiled: August 21, 2019Date of Patent: April 13, 2021Assignee: Rapid7, Inc.Inventors: Roy Hodgman, Jeffrey D. Myers
-
Patent number: 10965699Abstract: Approaches provide for monitoring attempted network activity such as network port connections and corresponding payloads of network data obtained by a network device and, based on the attempted connections and/or payloads, identifying malicious network activity in real time. For example, network activity obtained from a plurality of network devices in a service provider environment can be monitored to attempt to detect compliance with appropriate standards and/or any of a variety of resource usage guidelines (e.g., network behavioral standards or other such rules, guidelines, or network behavior tests) based at least in part on network port connection activity with respect to at least one network device. If it is determined that network activity is not in compliance with the usage guidelines, or other such network behavior test, the system can take one or more remedial actions, which can include generating a notification identifying the malicious network activity.Type: GrantFiled: June 12, 2018Date of Patent: March 30, 2021Assignee: Rapid7, Inc.Inventor: Roy Hodgman