Patents by Inventor Ruth Bernstein
Ruth Bernstein has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10796444Abstract: Systems, and method and computer readable media that store instructions for calculating signatures, utilizing signatures and the like.Type: GrantFiled: November 17, 2019Date of Patent: October 6, 2020Inventors: Igal Raichelgauz, Ruth Bernstein
-
Publication number: 20200311960Abstract: Systems, and method and computer readable media that store instructions for calculating signatures, utilizing signatures and the like.Type: ApplicationFiled: November 17, 2019Publication date: October 1, 2020Inventors: IGAL RAICHELGAUZ, Ruth Bernstein
-
Patent number: 9690645Abstract: Determining suspected root causes of anomalous network behavior includes identifying anomalous components in a network exhibiting anomalous behavior from a plurality of network components, assigning a likelihood score to network components based on a scoring policy that considers recent change events affecting the anomalous components, and identifying a subset of the network components that are suspected to be root causes based on the likelihood score.Type: GrantFiled: December 4, 2012Date of Patent: June 27, 2017Assignee: Hewlett Packard Enterprise Development LPInventors: Eran Samuni, Ira Cohen, Ruth Bernstein
-
Patent number: 9565203Abstract: There is provided a computer implemented method for detecting anomalous behavior in a network, comprising: receiving data representing at least one network activity, each network activity representing a certain data access event involving certain network entities; extracting from the data the certain network entities involved in the respective network activity; retrieving at least one relevant diversity value from a network behavior model based on the extracted certain network entities, wherein the network behavior model includes at least one diversity value, wherein each respective diversity value represents a certain relationship between at least one network entity and at least one network entity type; calculating an abnormality score for the received network activity based on the retrieved relevant diversity values; and classifying the network activity as anomalous or normal based on the calculated abnormality score.Type: GrantFiled: November 13, 2014Date of Patent: February 7, 2017Assignee: Cyber-Ark Software Ltd.Inventors: Ruth Bernstein, Andrey Dulkin
-
Patent number: 9497206Abstract: A method for identifying anomalies in a group of network addresses includes building a model of the group of network addresses and identifying a network address as anomalous based on the deviation of the network address from the model. The model is built from a group of network addresses. The network addresses are input and parsed into one or more address trees. A ripeness score is maintained for each of the nodes in the address trees, based, at least in part, on the number of occurrences of the network address portion represented by the node. Nodes having respective ripeness scores within a specified range are classified as ripe nodes, and may be indicative of normal behavior, and nodes having respective ripeness scores outside the specified range of ripeness scores are classified as unripe, and may be indicative of anomalous behavior.Type: GrantFiled: April 16, 2014Date of Patent: November 15, 2016Assignee: Cyber-Ark Software Ltd.Inventors: Ruth Bernstein, Andrey Dulkin, Assaf Weiss, Aviram Shmueli
-
Publication number: 20160162348Abstract: A method for automated detection of a real IT system problem may include obtaining monitor measurements of metrics associated with activities of a plurality of configuration items of the IT system. The method may also include detecting anomalies in the monitor measurements. The method may further include grouping concurrent anomalies of the detected anomalies corresponding to configuration items of the plurality of configuration items which are topologically linked to be regarded as a system anomaly. The method may further include calculating a significance score for the system anomaly, and determining that the system anomaly relates to a real system problem based on the calculated significance score.Type: ApplicationFiled: February 9, 2016Publication date: June 9, 2016Inventors: Ruth Bernstein, Ira Cohen, Eran Samuni
-
Publication number: 20160142435Abstract: There is provided a computer implemented method for detecting anomalous behavior in a network, comprising: receiving data representing at least one network activity, each network activity representing a certain data access event involving certain network entities; extracting from the data the certain network entities involved in the respective network activity; retrieving at least one relevant diversity value from a network behavior model based on the extracted certain network entities, wherein the network behavior model includes at least one diversity value, wherein each respective diversity value represents a certain relationship between at least one network entity and at least one network entity type; calculating an abnormality score for the received network activity based on the retrieved relevant diversity values; and classifying the network activity as anomalous or normal based on the calculated abnormality score.Type: ApplicationFiled: November 13, 2014Publication date: May 19, 2016Inventors: Ruth BERNSTEIN, Andrey Dulkin
-
Patent number: 9292408Abstract: A method for automated detection of a real IT system problem may include obtaining monitor measurements of metrics associated with activities of a plurality of configuration items of the IT system. The method may also include detecting anomalies in the monitor measurements. The method may further include grouping concurrent anomalies of the detected anomalies corresponding to configuration items of the plurality of configuration items which are topologically linked to be regarded as a system anomaly. The method may further include calculating a significance score for the system anomaly, and determining that the system anomaly relates to a real system problem based on the calculated significance score.Type: GrantFiled: September 21, 2011Date of Patent: March 22, 2016Assignee: Hewlett Packard Enterprise Development LPInventors: Ruth Bernstein, Ira Cohen, Eran Samuni
-
Publication number: 20150347214Abstract: Determining suspected root causes of anomalous network behavior includes identifying anomalous components in a network exhibiting anomalous behavior from a plurality of network components, assigning a likelihood score to network components based on a scoring policy that considers recent change events affecting the anomalous components, and identifying a subset of the network components that are suspected to be root causes based on the likelihood score.Type: ApplicationFiled: December 4, 2012Publication date: December 3, 2015Inventors: Eran Samuni, Ira Cohen, Ruth Bernstein
-
Publication number: 20150304349Abstract: A method for identifying anomalies in a group of network addresses includes building a model of the group of network addresses and identifying a network address as anomalous based on the deviation of the network address from the model. The model is built from a group of network addresses. The network addresses are input and parsed into one or more address trees. A ripeness score is maintained for each of the nodes in the address trees, based, at least in part, on the number of occurrences of the network address portion represented by the node. Nodes having respective ripeness scores within a specified range are classified as ripe nodes, and may be indicative of normal behavior, and nodes having respective ripeness scores outside the specified range of ripeness scores are classified as unripe, and may be indicative of anomalous behavior.Type: ApplicationFiled: April 16, 2014Publication date: October 22, 2015Applicant: Cyber-Ark Software Ltd.Inventors: Ruth Bernstein, Andrey Dulkin, Assaf Weiss, Aviram Shmueli
-
Patent number: 9087089Abstract: A method and system comprise abstracting configuration items (CI) in at least a first anomaly and a second anomaly based on type of CI. Further, CIs are matched of a common type between the first and second anomalies based on a cost function. Additionally, a similarity score is computed for the first and second anomalies based, at least in part, on the cost function of the matched CI's and based on topology of the first and second anomalies.Type: GrantFiled: June 9, 2010Date of Patent: July 21, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: Ruth Bernstein, Ira Cohen, Chen Kahana
-
Patent number: 8930773Abstract: Methods, systems, and computer-readable media with executable instructions stored thereon for determining root cause are provided. A method for determining root cause can include receiving values for at least one performance metric for each of a plurality of components of an IT system to establish a normal value for each of the performance metrics, receiving an abnormal value that differs from the normal value for at least one of the plurality of components of the IT system, and determining a probability that the at least one of the plurality of components of the IT system is a root cause of the abnormal value.Type: GrantFiled: April 16, 2012Date of Patent: January 6, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: Ruth Bernstein, Ira Cohen, Eran Samuni, Keren Gattegno
-
Patent number: 8924797Abstract: At least one value of abnormal metrics is identified as being an abnormal dimension value. A dominant dimension related to the anomaly is identified based on the identified abnormal dimension value.Type: GrantFiled: April 16, 2012Date of Patent: December 30, 2014Assignee: Hewlett-Packard Developmet Company, L.P.Inventors: Ruth Bernstein, Ira Cohen
-
Publication number: 20140229768Abstract: A method for automated detection of a real IT system problem may include obtaining monitor measurements of metrics associated with activities of a plurality of configuration items of the IT system. The method may also include detecting anomalies in the monitor measurements. The method may further include grouping concurrent anomalies of the detected anomalies corresponding to configuration items of the plurality of configuration items which are topologically linked to be regarded as a system anomaly. The method may further include calculating a significance score for the system anomaly, and determining that the system anomaly relates to a real system problem based on the calculated significance score.Type: ApplicationFiled: September 21, 2011Publication date: August 14, 2014Inventors: Ruth Bernstein, Ira Cohen, Eran Samuni
-
Publication number: 20140032552Abstract: Defining relationships are described. Defining relationships can include retrieving a number of event notifications that correspond to a number of nodes. Defining relationships can include defining a number of group patterns that correspond to the number of event notifications. Defining relationships can also include grouping the number of nodes into a number of groups that correlate with the number of group patterns, the number of groups defining a number of relationships between the number of nodes. Defining relationships can include assigning a number of weights to the number of relationships between the number of nodes, wherein the number of weights are based on a strength of the number of relationships between the number of nodes.Type: ApplicationFiled: July 30, 2012Publication date: January 30, 2014Inventors: Ira Cohen, Ruth Bernstein, Yonatan Ben Simhon
-
Patent number: 8635498Abstract: Embodiments of methods and systems for analyzing performance of an application are provided. In that regard, an embodiment of a method for analyzing performance, among others, comprises collecting performance metric data from the application over time; segmenting the performance metric data into time segments representing sets of contiguous time samples which exhibit similar performance metric behavior; determining the presence of an anomaly in a time segment; and correlating the anomalous segment with other data available to the system to determine the cause of the anomaly.Type: GrantFiled: October 16, 2008Date of Patent: January 21, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventors: Chen Kahana, Ruth Bernstein, Ifat Gavish
-
Publication number: 20130275816Abstract: At least one value of abnormal metrics is identified as being an abnormal dimension value. A dominant dimension related to the anomaly is identified based on the identified abnormal dimension value.Type: ApplicationFiled: April 16, 2012Publication date: October 17, 2013Inventors: RUTH BERNSTEIN, IRA COHEN
-
Publication number: 20130275812Abstract: Methods, systems, and computer-readable media with executable instructions stored thereon for determining root cause are provided. A method for determining root cause can include receiving values for at least one performance metric for each of a plurality of components of an IT system to establish a normal value for each of the performance metrics, receiving an abnormal value that differs from the normal value for at least one of the plurality of components of the IT system, and determining a probability that the at least one of the plurality of components of the IT system is a root cause of the abnormal value.Type: ApplicationFiled: April 16, 2012Publication date: October 17, 2013Inventors: Ruth Bernstein, Ira Cohen, Eran Samuni, Keren Gattegno
-
Publication number: 20130080451Abstract: A method and system comprise abstracting configuration items (CI) in at least a first anomaly and a second anomaly based on type of CI. Further, CIs are matched of a common type between the first and second anomalies based on a cost function. Additionally, a similarity score is computed for the first and second anomalies based, at least in part, on the cost function of the matched CI's and based on topology of the first and second anomalies.Type: ApplicationFiled: June 9, 2010Publication date: March 28, 2013Inventors: Ruth Bernstein, Ira Cohen, Chen Kahana
-
Publication number: 20110276836Abstract: Embodiments of methods and systems for analyzing performance of an application are provided. In that regard, an embodiment of a method for analyzing performance, among others, comprises collecting performance metric data from the application over time; segmenting the performance metric data into time segments representing sets of contiguous time samples which exhibit similar performance metric behaviour; determining the presence of an anomaly in a time segment; and correlating the anomalous segment with other data available to the system to determine the cause of the anomaly.Type: ApplicationFiled: October 16, 2008Publication date: November 10, 2011Inventors: Chen Kahana, Ruth Bernstein, Ifat Gavish