Patents by Inventor Roy Hodgman

Roy Hodgman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220197930
    Abstract: Disclosed herein are methods, systems, and processes to optimize role level identification for computing resource allocation to perform security operations in networked computing environments. A role level classifier to process a training dataset that corresponds to a clean title is generated from a subset of entities associated with the clean title. An initial effective title determined by the role level classifier based on processing the training dataset is assigned to an entity. A new effective title based on feature differences between the initial effective title and the clean title is re-assigned to the entity. Performance of the generating, the assigning, and the re-assigning is repeated using the new effective title instead of the clean title.
    Type: Application
    Filed: March 9, 2022
    Publication date: June 23, 2022
    Applicant: Rapid7, Inc.
    Inventors: Vasudha Shivamoggi, Wah-Kwan Lin, Roy Hodgman
  • Patent number: 11368474
    Abstract: Analyzing and reporting anomalous internet traffic data by accepting a request for a connection to a virtual security appliance, collecting attribute data about the connection, applying an alert module to the data, and automatically generating an alert concerning an identified incident. An alert system for analyzing and reporting the anomalous internet traffic data. A processor to analyze and report anomalous internet traffic data.
    Type: Grant
    Filed: April 10, 2018
    Date of Patent: June 21, 2022
    Assignee: Rapid7, Inc.
    Inventors: Roy Hodgman, Wah-Kwan Lin, Vasudha Shivamoggi
  • Publication number: 20220182407
    Abstract: Approaches provide for securing an electronic environment. A threat analysis service can obtain data for devices, users, and threats from disparate sources and can correlate users to devices and threats to build an understanding of an electronic environment's operational, organizational, and security concerns in order to provide customized security strategies and remediations. Additionally, the threat analysis service can develop a model of an electronic environment's behavior by monitoring and analyzing various the data from the data sources. The model can be updated such that the threat analysis service can tailor its orchestration to complement existing operational processes.
    Type: Application
    Filed: February 17, 2022
    Publication date: June 9, 2022
    Applicant: Rapid7, Inc.
    Inventors: Roy Hodgman, Kwan Lin, Vasudha Shivamoggi
  • Patent number: 11356463
    Abstract: Methods and systems for detecting malicious processes. Methods described herein gather data regarding process locations and calculate one or more inequality indicators related to the process paths based on economic principles. Instances of inequality with respect to process paths may indicate a path is uncommon and therefore the associated binary is used for malicious purposes.
    Type: Grant
    Filed: September 18, 2019
    Date of Patent: June 7, 2022
    Assignee: Rapid7, Inc.
    Inventors: Roy Hodgman, Oliver Keyes, Wah-Kwan Lin, Michael Scutt, Timothy Stiller
  • Patent number: 11310200
    Abstract: A method and system for classifying malicious locators where a processor is trained on a set of known malicious locators using a non-supervised learning procedure. Once trained, the processor may classify new locators as being generated by a particular generation kit.
    Type: Grant
    Filed: January 30, 2020
    Date of Patent: April 19, 2022
    Assignee: Rapid7, Inc.
    Inventors: Roy Hodgman, Aditya Kuppa, Suchin Gururangan, Andrew Reece
  • Patent number: 11301494
    Abstract: Methods, systems, and processes to optimize role level identification for computing resource allocation to perform security operations in networked computing environments. A role level classifier to process a training dataset that corresponds to a clean title is generated from a subset of entities associated with the clean title. An initial effective title determined by the role level classifier based on processing the training dataset is assigned to an entity. A new effective title based on feature differences between the initial effective title and the clean title is re-assigned to the entity. Performance of the generating, the assigning, and the re-assigning is repeated using the new effective title instead of the clean title.
    Type: Grant
    Filed: October 8, 2018
    Date of Patent: April 12, 2022
    Assignee: Rapid7, Inc.
    Inventors: Vasudha Shivamoggi, Wah-Kwan Lin, Roy Hodgman
  • Patent number: 11290479
    Abstract: Approaches provide for securing an electronic environment. A threat analysis service can obtain data for devices, users, and threats from disparate sources and can correlate users to devices and threats to build an understanding of an electronic environment's operational, organizational, and security concerns in order to provide customized security strategies and remediations. Additionally, the threat analysis service can develop a model of an electronic environment's behavior by monitoring and analyzing various the data from the data sources. The model can be updated such that the threat analysis service can tailor its orchestration to complement existing operational processes.
    Type: Grant
    Filed: August 11, 2018
    Date of Patent: March 29, 2022
    Assignee: Rapid7, Inc.
    Inventors: Roy Hodgman, Wah-Kwan Lin, Vasudha Shivamoggi
  • Patent number: 11223638
    Abstract: Methods and systems for classifying network users. The system may receive a classification of a user account on a network and network activity data associated with the user account. Upon detecting a discrepancy between the expected behavior of the user account based on its classification and the present behavior of the user account, the system may obtain a corroborating result from one or more directory sources. An alert may then be issued based on the detected discrepancy and the corroborating result.
    Type: Grant
    Filed: December 27, 2018
    Date of Patent: January 11, 2022
    Assignee: Rapid7, Inc.
    Inventor: Roy Hodgman
  • Publication number: 20210385253
    Abstract: Disclosed herein are methods, systems, and processes to detect valid clusters and eliminate spurious clusters in cybersecurity-based computing environments. A cluster detection and elimination model is trained by accessing a dataset with raw data that includes data points associated with computing devices in a network and applying two or more different clustering methodologies independently to the dataset. The resulting cluster detection and elimination model is used to compare two or more clusters to determine whether a cluster from one clustering methodology matches another cluster from another clustering methodology based on centroid locations and shared data points.
    Type: Application
    Filed: August 24, 2021
    Publication date: December 9, 2021
    Applicant: Rapid7, Inc.
    Inventors: Vasudha Shivamoggi, Roy Hodgman, Wah-Kwan Lin
  • Publication number: 20210357510
    Abstract: Methods and systems for assessing a vulnerability of a network device. The systems and methods described herein combine data regarding locally discovered vulnerabilities and exposed services with data regarding what executables are provided by software installed on the network device.
    Type: Application
    Filed: August 2, 2021
    Publication date: November 18, 2021
    Applicant: Rapid7, Inc.
    Inventors: Roy Hodgman, Jonathan Hart
  • Publication number: 20210360021
    Abstract: Methods and systems for identifying a network vulnerability. The system may gather data regarding a new or previously unknown network device, and compare the gathered data to one or more known devices that are scanned by a vulnerability assessment device. The vulnerability assessment device may then scan the previously unknown device upon a processor determining the previously unknown device shares at least one feature with a known device that is scanned.
    Type: Application
    Filed: August 2, 2021
    Publication date: November 18, 2021
    Applicant: Rapid7, Inc.
    Inventors: Justin Pagano, Roy Hodgman
  • Patent number: 11128667
    Abstract: Disclosed herein are methods, systems, and processes to detect valid clusters and eliminate spurious clusters in cybersecurity-based computing environments. A cluster detection and elimination model is trained by accessing a dataset with raw data that includes data points associated with computing devices in a network and applying two or more different clustering methodologies independently to the dataset. The resulting cluster detection and elimination model is used to compare two or more clusters to determine whether a cluster from one clustering methodology matches another cluster from another clustering methodology based on centroid locations and shared data points.
    Type: Grant
    Filed: November 29, 2018
    Date of Patent: September 21, 2021
    Assignee: Rapid7, Inc.
    Inventors: Vasudha Shivamoggi, Roy Hodgman, Wah-Kwan Lin
  • Publication number: 20210288998
    Abstract: Disclosed herein are methods, systems, and processes for monitoring scan attempts in a network. A virtual security appliance with multiple ports is deployed in a network. One or more ports are obfuscated via the virtual security appliance to make the various ports appear to be closed. An address of the virtual security appliance within the network is modified, the several ports are adjusted to assume a predetermined profile, a network neighbor's profile is discovered and emulated, and a received connection attempt intended for the virtual security appliance is monitored.
    Type: Application
    Filed: March 15, 2021
    Publication date: September 16, 2021
    Applicant: Rapid7, Inc.
    Inventors: Roy Hodgman, Jeff Myers
  • Publication number: 20210288986
    Abstract: Disclosed herein are methods, systems, and processes for detecting data exfiltration. A data exfiltration event in a network is detected. Traffic data regarding outgoing traffic of a source in the network associated with the data exfiltration event is received. A logarithmic transformation is applied to the traffic data to generate transformed data. An outlier identification technique is selected based on the transformed data and is executed on the transformed data to determine that the outgoing traffic is indicative of the data exfiltration event. An alert is generated in response to the determination that the outgoing traffic is indicative of the data exfiltration event.
    Type: Application
    Filed: June 2, 2021
    Publication date: September 16, 2021
    Applicant: Rapid7, Inc.
    Inventors: Dustin Myers, Vasudha Shivamoggi, Roy Hodgman
  • Patent number: 11115431
    Abstract: Methods and systems for identifying a network vulnerability. The system may gather data regarding a new or previously unknown network device, and compare the gathered data to one or more known devices that are scanned by a vulnerability assessment device. The vulnerability assessment device may then scan the previously unknown device upon a processor determining the previously unknown device shares at least one feature with a known device that is scanned.
    Type: Grant
    Filed: October 5, 2018
    Date of Patent: September 7, 2021
    Assignee: Rapid7, Inc.
    Inventors: Justin Pagano, Roy Hodgman
  • Patent number: 11113405
    Abstract: Methods and systems for assessing a vulnerability of a network device. The systems and methods described herein combine data regarding locally discovered vulnerabilities and exposed services with data regarding what executables are provided by software installed on the network device.
    Type: Grant
    Filed: April 10, 2018
    Date of Patent: September 7, 2021
    Assignee: Rapid7, Inc.
    Inventors: Roy Hodgman, Jonathan Hart
  • Patent number: 11102222
    Abstract: Methods and systems for scanning a network. The disclosed methods may involve receiving a list of a plurality of target devices and scanning a first device to determine if a particular port and protocol combination appears to be open on the first device. Upon determining that a particular port and protocol combination appears to be open on the first device, the method involves interrogating the first device before or during scanning of a second device to gather data regarding a service running on the first device.
    Type: Grant
    Filed: June 17, 2019
    Date of Patent: August 24, 2021
    Assignee: Rapid7, Inc.
    Inventors: Roy Hodgman, Jonathan Hart
  • Patent number: 11057410
    Abstract: Methods and systems for detecting a data exfiltration event on a network. The method includes receiving traffic data and applying a transformation to transform the traffic data at least closer to a normal distribution. The method further includes selecting at least one outlier identification technique based on a property of the transformed data, and then executing the at least one selected identification technique to determine whether the traffic data is indicative of a data exfiltration event.
    Type: Grant
    Filed: February 27, 2019
    Date of Patent: July 6, 2021
    Assignee: Rapid7, Inc.
    Inventors: Dustin Myers, Vasudha Shivamoggi, Roy Hodgman
  • Patent number: 10979454
    Abstract: Methods and devices for monitoring scan attempts in a network. Various embodiments provide enhancements to existing honeypot devices. These enhancements may include at least one of: (1) a port access module configured to make at least one honeypot port appear to be closed; (2) a mobility module configured to change the address of the honeypot within the network; (3) an emulation module configured to discover a network neighbor's profile and further configured to emulate the network neighbor's profile.
    Type: Grant
    Filed: August 21, 2019
    Date of Patent: April 13, 2021
    Assignee: Rapid7, Inc.
    Inventors: Roy Hodgman, Jeffrey D. Myers
  • Patent number: 10965699
    Abstract: Approaches provide for monitoring attempted network activity such as network port connections and corresponding payloads of network data obtained by a network device and, based on the attempted connections and/or payloads, identifying malicious network activity in real time. For example, network activity obtained from a plurality of network devices in a service provider environment can be monitored to attempt to detect compliance with appropriate standards and/or any of a variety of resource usage guidelines (e.g., network behavioral standards or other such rules, guidelines, or network behavior tests) based at least in part on network port connection activity with respect to at least one network device. If it is determined that network activity is not in compliance with the usage guidelines, or other such network behavior test, the system can take one or more remedial actions, which can include generating a notification identifying the malicious network activity.
    Type: Grant
    Filed: June 12, 2018
    Date of Patent: March 30, 2021
    Assignee: Rapid7, Inc.
    Inventor: Roy Hodgman