Patents by Inventor Somesh Jha

Somesh Jha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090106183
    Abstract: Deterministic finite automata (DFAs) are popular solutions to deep packet inspection because they are fast and DFAs corresponding to multiple signatures are combinable into a single DFA. Combining such DFAs causes an explosive increase in memory usage. Extended finite automata (XFAs) are an alternative to DFAs that avoids state-space explosion problems. XFAs extend DFAs with a few bytes of “scratch memory” used to store bits and other data structures that record progress. Simple programs associated with automaton states and/or transitions manipulate this scratch memory. XFAs are deterministic in their operation, are equivalent to DFAs in expressiveness, and require no custom hardware support. Fully functional prototype XFA implementations show that, for most signature sets, XFAs are at least 10,000 times smaller than the DFA matching all signatures. XFAs are 10 times smaller and 5 times faster or 5 times smaller and 20 times faster than systems using multiple DFAs.
    Type: Application
    Filed: February 15, 2008
    Publication date: April 23, 2009
    Inventors: Cristian Estan, Randy D. Smith, Somesh Jha
  • Publication number: 20090070878
    Abstract: A malware prevention system monitors kernel level events of the operating system and applies user programmable or preprepared policies to those events to detect and block malware.
    Type: Application
    Filed: September 10, 2007
    Publication date: March 12, 2009
    Inventors: Hao Wang, Somesh Jha
  • Publication number: 20080047012
    Abstract: A network intrusion detection system combines the normally sequential steps of protocol analysis, normalization, and signature matching through the use of a regular expression to speed the monitoring of network data. The regular expression also allows the creation of a superset matcher, permitting multiple stages of matching of increased accuracy to produce additional throughput gains.
    Type: Application
    Filed: August 21, 2006
    Publication date: February 21, 2008
    Inventors: Shai Aharon Rubin, Somesh Jha, Barton Paul Miller
  • Publication number: 20060253906
    Abstract: Systems, methods and devices according to this invention include a plurality of defined modification rules for modifying a sequence of packets that form an attack on an intrusion detection system. These modification rules include both rules that expand the number of packets and rules that reduce the number of packets. The reducing rules can be applied to a given attack instance to identify one or more root attack instances. The expanding rules can then be applied to each root attack instance to generate a corpus of modified attack instances. The modification rules can preserve the semantics of the attack, so that any modified attack instance generated from the given attack instance remains a true attack. To test an intrusion detection system, the corpus of modified attack instances can be used to determine whether an intrusion detection system detects every modified attack instance.
    Type: Application
    Filed: December 5, 2005
    Publication date: November 9, 2006
    Inventors: Shai Rubin, Somesh Jha, Barton Miller
  • Publication number: 20060212942
    Abstract: An automatic technique for generating signatures for malicious network traffic performs a cluster analysis of known malicious traffic to create a signature in the form of a state machine. The cluster analysis may operate on semantically tagged data collected by connection or session and normalized to eliminate protocol specific features. The signature extractor may generalize the finite-state machine signatures to match network traffic not previously observed.
    Type: Application
    Filed: March 21, 2005
    Publication date: September 21, 2006
    Inventors: Paul Barford, Jonathon Giffin, Somesh Jha, Vinod Yegneswaran
  • Publication number: 20050028002
    Abstract: A technique for finding malicious code such as viruses in an executable binary file converts the executable binary to a function unique form to which function unique forms of virus code may be compared. By avoiding direct comparison of the expression of the viral code but looking instead at its function, obfuscation techniques intended to hide the virus code are substantially reduced in effectiveness.
    Type: Application
    Filed: July 29, 2003
    Publication date: February 3, 2005
    Inventors: Mihai Christodorescu, Somesh Jha