Patents by Inventor Simon Ian Arnell
Simon Ian Arnell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10764393Abstract: The present disclosure relates to a network device that determines a persistent network identity for a networked device. Specifically, the network device receives a service request that includes an identifier for a second network device in a sub-network among a plurality of sub-networks. The identifier uniquely corresponds to the second network device during a limited period of time. At least one sub-networks are unreachable by the service request. The network device aggregates partial networked device profiles corresponding to the second network device received from other network devices in at least the at least one sub-networks to generate a networked device profile. Moreover, the network device searches at least one caches to obtain the networked device profile based on the identifier in the service request, and correlates the identifier to a persistent network identity corresponding to the second network device based on the networked device profile.Type: GrantFiled: April 21, 2016Date of Patent: September 1, 2020Assignee: Hewlett Packard Enterprise Development LPInventors: Marco Casassa Mont, Yolanta Beresna, Simon Ian Arnell, Nipun Balan Thekkummal
-
Patent number: 10749895Abstract: Examples relate to handling network threats. In one example, a computing device may: receive, from a threat detector, threat data associated with a particular network device included in a plurality of network devices; identify, based on the threat data, a particular analytics operation for assisting with remediation of a threat associated with the threat data; identify, based on the threat data, additional data for performing the particular analytics operation; cause reconfiguration of at least one of the plurality of network devices, the reconfiguration causing each of the reconfigured network devices to i) collect the additional data, and ii) provide the additional data to an analytics device; and receive, from the analytics device, particular analytics results of the particular analytics operation.Type: GrantFiled: November 17, 2015Date of Patent: August 18, 2020Assignee: Hewlett Packard Enterprise Development LPInventors: Simon Ian Arnell, Marco Casassa Mont, Yolanta Beresna, Theofrastos Koulouris, Jon Potter
-
Patent number: 10686814Abstract: Examples relate to detecting network anomalies. In one example, a computing device may: receive, from each of a plurality of packet capture devices of a private network, domain name system (DNS) query packets that were sent by a particular client computing device operating on the private network, each DNS query packet specifying i) a destination DNS server, ii) a query domain name, and iii) a source address that specifies the particular client computing device; provide at least one of the DNS query packets to a DNS traffic analyzer that is trained to identify DNS anomalies based on characteristics of the DNS query packets; receive anomaly output from the DNS traffic analyzer, the anomaly output indicating a DNS anomaly that was identified for the DNS query packets; and in response to receiving the anomaly output, provide a user device with data specifying the identified DNS anomaly.Type: GrantFiled: April 10, 2015Date of Patent: June 16, 2020Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Simon Ian Arnell, Marco Casassa Mont, David Andrew Graves, Edward Reynolds, Niall Lawrence Saunders
-
Patent number: 10666672Abstract: Examples relate to collecting domain name system traffic. In one example, a computing device may: receive, from a first intermediary network device, a DNS query packet that was sent by a client computing device operating on a private network, the DNS query packet specifying i) a query domain name, and ii) a source address that specifies the client computing device; store, in a data storage device, a query record specifying the query domain name and the source address specified by the DNS query packet; receive, from a second intermediary network device, a DNS response packet; determine that the DNS response packet specifies a response domain name that matches the query domain name; in response to the determination, extract, from the DNS response packet, a resolved address that corresponds to the response domain name; and store, in the query record, the resolved address specified by the DNS response packet.Type: GrantFiled: August 31, 2015Date of Patent: May 26, 2020Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Simon Ian Arnell, Marco Casassa Mont, Yolanta Beresna
-
Patent number: 10325092Abstract: Examples relate to dynamically adjusting a model for a security operations center (“SOC”). As such, the examples disclosed herein enable constructing a customer storage model over a set of time periods for a customer based on a set of resources of the SOC, a storage distribution model received from the customer related to expected usage of the set of resources, and a threat landscape for the customer. The customer storage model may be revised for a second time period based on actual storage use of the customer during a first time period, and a projection of an amount of data to be consumed in the second time period based on the threat landscape. Allocation of the resources in the SOC may be revised for the second time period based on the revision to the customer storage model.Type: GrantFiled: March 11, 2015Date of Patent: June 18, 2019Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Marco Casassa Mont, Simon Ian Arnell, Mihaela Gittler
-
Patent number: 10250627Abstract: Remediating a security threat to a network includes obtaining, from a network, security information about the network to determine traffic patterns of the network, identifying, based on the traffic patterns of the network, a security threat to the network, determining, from a playbook library and a workflow library, a workflow template and at least one software-defined networking (SDN) flow rule template to remediate the security threat, and deploying, via a SDN controller, a SDN flow rule based on the at least one SDN flow rule template in the network to remediate the security threat by altering a control path of the network.Type: GrantFiled: July 31, 2014Date of Patent: April 2, 2019Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Marco Casassa Mont, Simon Ian Arnell
-
Publication number: 20180337943Abstract: Examples relate to handling network threats. In one example, a computing device may: receive, from a threat detector, threat data associated with a particular network device included in a plurality of network devices; identify, based on the threat data, a particular analytics operation for assisting with remediation of a threat associated with the threat data; identify, based on the threat data, additional data for performing the particular analytics operation; cause reconfiguration of at least one of the plurality of network devices, the reconfiguration causing each of the reconfigured network devices to i) collect the additional data, and ii) provide the additional data to an analytics device; and receive, from the analytics device, particular analytics results of the particular analytics operation.Type: ApplicationFiled: November 17, 2015Publication date: November 22, 2018Inventors: Simon Ian ARNELL, Marco CASASSA MONT, Yolanta BERESNA, Theofrastos KOULOURIS, Jon POTTER
-
Publication number: 20180139224Abstract: Examples relate to collecting domain name system traffic. In one example, a computing device may: receive, from a first intermediary network device, a DNS query packet that was sent by a client computing device operating on a private network, the DNS query packet specifying i) a query domain name, and ii) a source address that specifies the client computing device; store, in a data storage device, a query record specifying the query domain name and the source address specified by the DNS query packet; receive, from a second intermediary network device, a DNS response packet; determine that the DNS response packet specifies a response domain name that matches the query domain name; in response to the determination, extract, from the DNS response packet, a resolved address that corresponds to the response domain name; and store, in the query record, the resolved address specified by the DNS response packet.Type: ApplicationFiled: August 31, 2015Publication date: May 17, 2018Inventors: Simon Ian Arnell, Marco Casassa Mont, Yolanta Beresna
-
Publication number: 20170295196Abstract: Examples relate to detecting network anomalies. In one example, a computing device may: receive, from each of a plurality of packet capture devices of a private network, domain name system (DNS) query packets that were sent by a particular client computing device operating on the private network, each DNS query packet specifying i) a destination DNS server, ii) a query domain name, and iii) a source address that specifies the particular client computing device; provide at least one of the DNS query packets to a DNS traffic analyzer that is trained to identify DNS anomalies based on characteristics of the DNS query packets; receive anomaly output from the DNS traffic analyzer, the anomaly output indicating a DNS anomaly that was identified for the DNS query packets; and in response to receiving the anomaly output, provide a user device with data specifying the identified DNS anomaly.Type: ApplicationFiled: April 10, 2015Publication date: October 12, 2017Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Simon Ian ARNELL, Marco CASASSA MONT, David Andrew GRAVES, Edward REYNOLDS, Niall Lawrence SAUNDERS
-
Publication number: 20170228537Abstract: Examples relate to dynamically adjusting a model for a security operations center (“SOC”). As such, the examples disclosed herein enable constructing a customer storage model over a set of time periods for a customer based on a set of resources of the SOC, a storage distribution model received from the customer related to expected usage of the set of resources, and a threat landscape for the customer. The customer storage model may be revised for a second time period based on actual storage use of the customer during a first time period, and a projection of an amount of data to be consumed in the second time period based on the threat landscape. Allocation of the resources in the SOC may be revised for the second time period based on the revision to the customer storage model.Type: ApplicationFiled: March 11, 2015Publication date: August 10, 2017Inventors: Marco Casassa Mont, Simon Ian Arnell, Mihaela Gittler
-
Publication number: 20170223039Abstract: Remediating a security threat to a network includes obtaining, from a network, security information about the network to determine traffic patterns of the network, identifying, based on the traffic patterns of the network, a security threat to the network, determining, from a playbook library and a workflow library, a workflow template and at least one software-defined networking (SDN) flow rule template to remediate the security threat, and deploying, via a SDN controller, a SDN flow rule based on the at least one SDN flow rule template in the network to remediate the security threat by altering a control path of the network.Type: ApplicationFiled: July 31, 2014Publication date: August 3, 2017Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Marco Casassa Mont, Simon Ian Arnell
-
Publication number: 20170214711Abstract: Creating a security report for a customer network includes obtaining from a customer network, security information about the customer network, preparing, based on modification rules, the security information to create modified security information, analyzing, based on big data threat analytics, the security threats to create a number of metrics, refining the number of metrics using a refining model, creating, based on the refined number of metrics used as an input for model-based predictive analytics and the security threats, a security report representing security intelligence for the customer network in which the number of metrics are refined by a refining model and used as an input for the model-based predictive analytics.Type: ApplicationFiled: July 31, 2014Publication date: July 27, 2017Inventors: Simon Ian Arnell, Neil Passingham, Marco Casassa Mont