Patents by Inventor Shiri Margel

Shiri Margel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11750627
    Abstract: Techniques for detecting suspicious data object access requests indicative of potential insider threats are described. A suspicious access detection module (SADM) determines, based on access data describing a access requests issued on behalf of multiple users, groups of the users having similar patterns of accesses to resource groups, a set of the resource groups accessed by each of the user groups, and ones of the user groups that are to be considered nearby others of the user groups based on having a threshold amount of resource group access similarities. The SADM causes an alert to be generated responsive to a determination that a subsequent access request is suspicious because it accesses a data object of a resource group that is not within the set of accessed resource groups of the issuing user's user group, and because the resource group is not within the sets of accessed resource groups of any nearby user groups.
    Type: Grant
    Filed: September 8, 2021
    Date of Patent: September 5, 2023
    Assignee: Imperva, Inc.
    Inventors: Guy Shtar, Shiri Margel
  • Patent number: 11537734
    Abstract: A method by a security system implemented by one or more electronic for detecting attacks on one or more databases. The method includes analyzing database logs of one or more databases to determine transaction characteristics of each of the one or more databases, selecting, for each of a plurality of database accesses to the one or more databases, one or more security rules to apply to that database access, wherein different security rules are selected for different ones of the plurality of database accesses depending on the determined transaction characteristics of the database being accessed, and causing, for each of the plurality of database accesses, the one or more security rules selected for that database access to be applied to that database access.
    Type: Grant
    Filed: September 10, 2020
    Date of Patent: December 27, 2022
    Assignee: Imperva, Inc.
    Inventors: Shiri Margel, Itsik Mantin, Guy Shtar, Yury Geiler
  • Patent number: 11470110
    Abstract: A method by one or more electronic devices for identifying and classifying community attacks. The method includes determining, for each of a plurality of enterprise networks, one or more incidents occurring in that enterprise network based on analyzing security alerts generated by a web application layer attack detector used to protect a web application hosted in that enterprise network, where each incident represents a group of security alerts that have been determined as being associated with the same security event, grouping incidents occurring across the plurality of enterprise networks into groups of incidents, where incidents that are determined as having similar features are grouped into the same group of incidents, and classifying each of one or more of the groups of incidents as being an industry-based attack or a spray-and-pray attack based on industry classifications of incidents within that group of incidents.
    Type: Grant
    Filed: December 30, 2019
    Date of Patent: October 11, 2022
    Assignee: Imperva, Inc.
    Inventors: Shiri Margel, Amit Leibovitz
  • Patent number: 11436358
    Abstract: A method for protecting information from databases includes a web application firewall and a database activity monitor. According to one aspect, a web gateway receives a request from a client device and provides the request to an application server to query a database. The web gateway receives sensitive data information describing requested data output by the database. The sensitive data information may include, for example, hints for detecting a type or structure of sensitive data output by the database. Additionally, the web gateway receives response data from the application server. The web gateway identifies sensitive data within the response data based on the sensitive data information. The web gateway protects the sensitive data to be provided to the client device using one or more data protection operations, which may include alerts, blocking policies, masking, or anomaly detection using machine learning algorithms.
    Type: Grant
    Filed: April 17, 2019
    Date of Patent: September 6, 2022
    Assignee: Imperva, Inc.
    Inventors: Shiri Margel, Itsik Mantin, Amichai Shulman, Daniella Goihman-Shuster
  • Publication number: 20220197929
    Abstract: A method by one or more electronic devices for detecting attacks on one or more databases. The method includes classifying, based on analyzing database logs of the one or more databases, each of a plurality of operating system (OS) accounts used to access the one or more databases into one of a plurality of OS account types, wherein the plurality of OS account types include a human OS account type and a service OS account type. The method further includes using a result of the classification of the plurality of OS accounts to detect attacks on the one or more databases.
    Type: Application
    Filed: March 8, 2022
    Publication date: June 23, 2022
    Applicant: Imperva, Inc.
    Inventors: Shiri MARGEL, Yury GEILER
  • Patent number: 11328076
    Abstract: A method by one or more electronic devices implementing a system for providing community-based data security, where the system is communicatively coupled to a plurality of database security analyzers, where each of the plurality of database security analyzers is configured to analyze data accesses to one or more databases associated with that database security analyzer. The method includes obtaining, for each of the plurality of database security analyzers, learning metadata generated by that database security analyzer, generating security parameters based on the learning metadata generated by the plurality of database security analyzers, and providing the security parameters to one or more of the plurality of database security analyzers to cause the one or more of the plurality of database security analyzers to apply the security parameters when analyzing data accesses to detect security incidents.
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: May 10, 2022
    Assignee: Imperva, Inc.
    Inventors: Doron Tzur, Shiri Margel, Itsik Mantin
  • Patent number: 11301496
    Abstract: A method by a security system implemented by one or more electronic devices for detecting attacks on one or more databases hosted by one or more database servers. The method includes classifying, based on analyzing database logs of the one or more databases, a plurality of network entities used to access the one or more databases into different network entity types, where one or more of the plurality of network entities can be classified into the same network entity type and using a result of the classification of the plurality of network entities to detect attacks on the one or more databases.
    Type: Grant
    Filed: December 26, 2018
    Date of Patent: April 12, 2022
    Assignee: Imperva, Inc.
    Inventors: Shiri Margel, Yury Geiler
  • Publication number: 20210400062
    Abstract: Techniques for detecting suspicious data object access requests indicative of potential insider threats are described. A suspicious access detection module (SADM) determines, based on access data describing a access requests issued on behalf of multiple users, groups of the users having similar patterns of accesses to resource groups, a set of the resource groups accessed by each of the user groups, and ones of the user groups that are to be considered nearby others of the user groups based on having a threshold amount of resource group access similarities. The SADM causes an alert to be generated responsive to a determination that a subsequent access request is suspicious because it accesses a data object of a resource group that is not within the set of accessed resource groups of the issuing user's user group, and because the resource group is not within the sets of accessed resource groups of any nearby user groups.
    Type: Application
    Filed: September 8, 2021
    Publication date: December 23, 2021
    Applicant: Imperva, Inc.
    Inventors: Guy SHTAR, Shiri MARGEL
  • Patent number: 11146573
    Abstract: Techniques for detecting suspicious data object access requests indicative of potential insider threats are described. A suspicious access detection module (SADM) determines, based on access data describing a access requests issued on behalf of multiple users, groups of the users having similar patterns of accesses to resource groups, a set of the resource groups accessed by each of the user groups, and ones of the user groups that are to be considered nearby others of the user groups based on having a threshold amount of resource group access similarities. The SADM causes an alert to be generated responsive to a determination that a subsequent access request is suspicious because it accesses a data object of a resource group that is not within the set of accessed resource groups of the issuing user's user group, and because the resource group is not within the sets of accessed resource groups of any nearby user groups.
    Type: Grant
    Filed: January 22, 2019
    Date of Patent: October 12, 2021
    Assignee: Imperva, Inc.
    Inventors: Guy Shtar, Shiri Margel
  • Publication number: 20200410128
    Abstract: A method by a security system implemented by one or more electronic for detecting attacks on one or more databases. The method includes analyzing database logs of one or more databases to determine transaction characteristics of each of the one or more databases, selecting, for each of a plurality of database accesses to the one or more databases, one or more security rules to apply to that database access, wherein different security rules are selected for different ones of the plurality of database accesses depending on the determined transaction characteristics of the database being accessed, and causing, for each of the plurality of database accesses, the one or more security rules selected for that database access to be applied to that database access.
    Type: Application
    Filed: September 10, 2020
    Publication date: December 31, 2020
    Applicant: Imperva, Inc.
    Inventors: Shiri MARGEL, Itsik MANTIN, Guy SHTAR, Yury GEILER
  • Publication number: 20200349270
    Abstract: A method by one or more electronic devices implementing a system for providing community-based data security, where the system is communicatively coupled to a plurality of database security analyzers, where each of the plurality of database security analyzers is configured to analyze data accesses to one or more databases associated with that database security analyzer. The method includes obtaining, for each of the plurality of database security analyzers, learning metadata generated by that database security analyzer, generating security parameters based on the learning metadata generated by the plurality of database security analyzers, and providing the security parameters to one or more of the plurality of database security analyzers to cause the one or more of the plurality of database security analyzers to apply the security parameters when analyzing data accesses to detect security incidents.
    Type: Application
    Filed: April 30, 2019
    Publication date: November 5, 2020
    Applicant: Imperva, Inc.
    Inventors: Doron TZUR, Shiri MARGEL, Itsik MANTIN
  • Patent number: 10803192
    Abstract: A method by a security system implemented by one or more electronic for detecting attacks on one or more databases. The method includes analyzing database logs of one or more databases to determine transaction characteristics of each of the one or more databases, selecting, for each of a plurality of database accesses to the one or more databases, one or more security rules to apply to that database access, wherein different security rules are selected for different ones of the plurality of database accesses depending on the determined transaction characteristics of the database being accessed, and causing, for each of the plurality of database accesses, the one or more security rules selected for that database access to be applied to that database access.
    Type: Grant
    Filed: May 31, 2018
    Date of Patent: October 13, 2020
    Assignee: Imperva, Inc.
    Inventors: Shiri Margel, Itsik Mantin, Guy Shtar, Yury Geiler
  • Patent number: 10771496
    Abstract: Techniques for detecting suspicious file access requests indicative of potential insider threats are described. A suspicious access detection module (SADM) determines, based on access data describing a access requests issued on behalf of multiple users, groups of the users having similar patterns of accesses to folders, a set of the folders accessed by each of the user groups, and ones of the user groups that are to be considered nearby others of the user groups based on having a threshold amount of folder access similarities. The SADM causes an alert to be generated responsive to a determination that a subsequent access request is suspicious because it accesses a file of a folder that is not within the set of accessed folders of the issuing user's user group, and because the folder is not within the sets of accessed folders of any nearby user groups.
    Type: Grant
    Filed: August 10, 2017
    Date of Patent: September 8, 2020
    Assignee: Imperva, Inc.
    Inventors: Guy Shtar, Shiri Margel
  • Publication number: 20200259861
    Abstract: A method by one or more electronic devices for identifying and classifying community attacks. The method includes determining, for each of a plurality of enterprise networks, one or more incidents occurring in that enterprise network based on analyzing security alerts generated by a web application layer attack detector used to protect a web application hosted in that enterprise network, where each incident represents a group of security alerts that have been determined as being associated with the same security event, grouping incidents occurring across the plurality of enterprise networks into groups of incidents, where incidents that are determined as having similar features are grouped into the same group of incidents, and classifying each of one or more of the groups of incidents as being an industry-based attack or a spray-and-pray attack based on industry classifications of incidents within that group of incidents.
    Type: Application
    Filed: December 30, 2019
    Publication date: August 13, 2020
    Applicant: Imperva, Inc.
    Inventors: Shiri MARGEL, Amit LEIBOVITZ
  • Publication number: 20200210455
    Abstract: A method by a security system implemented by one or more electronic devices for detecting attacks on one or more databases hosted by one or more database servers. The method includes classifying, based on analyzing database logs of the one or more databases, a plurality of network entities used to access the one or more databases into different network entity types, where one or more of the plurality of network entities can be classified into the same network entity type and using a result of the classification of the plurality of network entities to detect attacks on the one or more databases.
    Type: Application
    Filed: December 26, 2018
    Publication date: July 2, 2020
    Inventors: Shiri MARGEL, Yury GEILER
  • Publication number: 20200097676
    Abstract: A method for protecting information from databases includes a web application firewall and a database activity monitor. According to one aspect, a web gateway receives a request from a client device and provides the request to an application server to query a database. The web gateway receives sensitive data information describing requested data output by the database. The sensitive data information may include, for example, hints for detecting a type or structure of sensitive data output by the database. Additionally, the web gateway receives response data from the application server. The web gateway identifies sensitive data within the response data based on the sensitive data information.
    Type: Application
    Filed: April 17, 2019
    Publication date: March 26, 2020
    Inventors: Shiri MARGEL, Itsik MANTIN, Amichai SHULMAN, Daniella GOIHMAN-SHUSTER
  • Publication number: 20190311149
    Abstract: A method by a security system implemented by one or more electronic for detecting attacks on one or more databases. The method includes analyzing database logs of one or more databases to determine transaction characteristics of each of the one or more databases, selecting, for each of a plurality of database accesses to the one or more databases, one or more security rules to apply to that database access, wherein different security rules are selected for different ones of the plurality of database accesses depending on the determined transaction characteristics of the database being accessed, and causing, for each of the plurality of database accesses, the one or more security rules selected for that database access to be applied to that database access.
    Type: Application
    Filed: May 31, 2018
    Publication date: October 10, 2019
    Inventors: Shiri MARGEL, Itsik MANTIN, Guy SHTAR, Yury GEILER
  • Patent number: 10404712
    Abstract: Techniques for unobtrusively protecting against large-scale data breaches over time are described. A security gateway coupled between clients and servers receives data object (DO) access requests from the clients on behalf of users of an enterprise. Each of the users is allocated a budget for each of one or more time periods. The security gateway determines an access cost for each DO access request based on characteristics of the DO request, where lower access costs are indicative expected DO access consumption for users of the enterprise, and charges the determined access cost against the budget for that user corresponding to the time period when the DO access request was received. Alert messages are transmitted based on different ones of the users exceeding their budget(s), and the transmission of the DO access requests to the data object servers is not prevented.
    Type: Grant
    Filed: April 28, 2017
    Date of Patent: September 3, 2019
    Assignee: IMPERVA, INC.
    Inventors: Shiri Margel, Itsik Mantin, Amichai Shulman
  • Patent number: 10382400
    Abstract: Techniques related to preventing large-scale data breaches utilizing differentiated data object (DO) protection layers are described. A security gateway placed within a communication path between client end stations and servers receives DO access requests from the client end stations. The DOs are divided into a first subset that are currently classified as active and a second subset that are currently classified as inactive based upon a likelihood of further legitimate access to the DOs. Those of the DO access requests for DOs determined to be in the first subset are subjected to a first protection layer utilizing zero or more protection mechanisms. Those of the plurality of DO access requests for DOs not in the first subset are subjected to a second protection layer utilizing one or more protection mechanisms. Large-scale data breaches are efficiently prevented without disruption to legitimate DO access requests.
    Type: Grant
    Filed: April 28, 2017
    Date of Patent: August 13, 2019
    Assignee: IMPERVA, INC.
    Inventors: Shiri Margel, Itsik Mantin, Amichai Shulman
  • Publication number: 20190158513
    Abstract: Techniques for detecting suspicious data object access requests indicative of potential insider threats are described. A suspicious access detection module (SADM) determines, based on access data describing a access requests issued on behalf of multiple users, groups of the users having similar patterns of accesses to resource groups, a set of the resource groups accessed by each of the user groups, and ones of the user groups that are to be considered nearby others of the user groups based on having a threshold amount of resource group access similarities. The SADM causes an alert to be generated responsive to a determination that a subsequent access request is suspicious because it accesses a data object of a resource group that is not within the set of accessed resource groups of the issuing user's user group, and because the resource group is not within the sets of accessed resource groups of any nearby user groups.
    Type: Application
    Filed: January 22, 2019
    Publication date: May 23, 2019
    Inventors: Guy SHTAR, Shiri MARGEL