Patents by Inventor Stefan Achleitner

Stefan Achleitner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240427902
    Abstract: A computer-implemented method is presented for identifying vulnerable software from a computer system. The method includes: identifying name of a given software component in a vulnerability database by analyzing text of an entry in the vulnerability database using a large language model, where entries in the vulnerability database have known vulnerabilities; identifying a patch for the given software component in a source code repository by analyzing text of the entry in the vulnerability database using the large language model; identifying the patch for the given software component in the source code repository by analyzing text in the source code repository using the large language model; and reporting the given software component as being vulnerable in response to identifying the patch for the given software component in the source code repository.
    Type: Application
    Filed: March 13, 2024
    Publication date: December 26, 2024
    Applicant: Dynatrace LLC
    Inventors: Stefan ACHLEITNER, Simon AMMER, Benjamin BUZEK
  • Publication number: 20240396908
    Abstract: Detection of command and control malware is disclosed. A network traffic session is monitored. Automatic feature identification for real-time malicious command and control traffic detection based on a request header of the monitored network traffic session using a deep learning model is performed.
    Type: Application
    Filed: August 7, 2024
    Publication date: November 28, 2024
    Inventors: Ajaya Neupane, Yuwen Dai, Stefan Achleitner, Yu Fu, Shengming Xu
  • Patent number: 12107872
    Abstract: Detection of command and control malware is disclosed. A network traffic session is monitored. Automatic feature identification for real-time malicious command and control traffic detection based on a request header of the monitored network traffic session using a deep learning model is performed.
    Type: Grant
    Filed: January 18, 2022
    Date of Patent: October 1, 2024
    Assignee: Palo Alto Networks, Inc.
    Inventors: Ajaya Neupane, Yuwen Dai, Stefan Achleitner, Yu Fu, Shengming Xu
  • Publication number: 20240291854
    Abstract: An inline malicious traffic detector captures handshake messages in a session with a security protocol. The inline malicious traffic detector comprises a classifier that generates a verdict for the session indicating malicious or benign. The classifier is trained on labelled sessions using custom features generated from handshake messages. Based on determining that the session is malicious using features of the handshake messages, the inline malicious traffic detector blocks the session.
    Type: Application
    Filed: April 30, 2024
    Publication date: August 29, 2024
    Inventors: Lei Xu, Stefan Achleitner, Yu Fu, Shengming Xu
  • Patent number: 12061696
    Abstract: Techniques for sample traffic based self-learning malware detection are disclosed. In some embodiments, a system/process/computer program product for sample traffic based self-learning malware detection includes receiving a plurality of samples for malware detection analysis using a sandbox; executing each of the plurality of samples in the sandbox and monitoring network traffic during execution of each of the plurality of samples in the sandbox; detecting that one or more of the plurality of samples is malware based on automated analysis of the monitored network traffic using a command and control (C2) machine learning (ML) model if there is not a prior match with an intrusion prevention system (LPS) signature; and performing an action in response to detecting that the one or more of the plurality of samples is malware based on the automated analysis of the monitored network traffic using the C2 ML model. In some embodiments, the IPS signatures and C2 ML model are automatically generated and trained.
    Type: Grant
    Filed: June 9, 2023
    Date of Patent: August 13, 2024
    Assignee: Palo Alto Networks, Inc.
    Inventors: Yanhui Jia, Matthew W. Tennis, Stefan Achleitner, Taojie Wang, Hui Gao, Shengming Xu
  • Patent number: 11997130
    Abstract: An inline malicious traffic detector captures handshake messages in a session with a security protocol. The inline malicious traffic detector comprises a classifier that generates a verdict for the session indicating malicious or benign. The classifier is trained on labelled sessions using custom features generated from handshake messages. Based on determining that the session is malicious using features of the handshake messages, the inline malicious traffic detector blocks the session.
    Type: Grant
    Filed: September 7, 2021
    Date of Patent: May 28, 2024
    Assignee: Palo Alto Networks, Inc.
    Inventors: Lei Xu, Stefan Achleitner, Yu Fu, Shengming Xu
  • Patent number: 11991199
    Abstract: An anomaly detection model is trained to detect malicious traffic sessions with a low rate of false positives. A sample feature extractor extracts tokens corresponding to human-readable substrings of incoming unstructured payloads in a traffic session. The tokens are correlated with a list of malicious traffic features and frequent malicious traffic features across the traffic session are aggregated into a feature vector of malicious traffic feature frequencies. An anomaly detection model trained on feature vectors for unstructured malicious traffic samples predicts the traffic session as malicious or unclassified. The anomaly detection model is trained and updated based on its' ongoing false positive rate and malicious traffic features in the list of malicious traffic features that result in a high false positive rate are removed.
    Type: Grant
    Filed: January 27, 2023
    Date of Patent: May 21, 2024
    Assignee: Palo Alto Networks, Inc.
    Inventors: Stefan Achleitner, Chengcheng Xu
  • Publication number: 20240037231
    Abstract: Techniques for sample traffic based self-learning malware detection are disclosed. In some embodiments, a system/process/computer program product for sample traffic based self-learning malware detection includes receiving a plurality of samples for malware detection analysis using a sandbox; executing each of the plurality of samples in the sandbox and monitoring network traffic during execution of each of the plurality of samples in the sandbox; detecting that one or more of the plurality of samples is malware based on automated analysis of the monitored network traffic using a command and control (C2) machine learning (ML) model if there is not a prior match with an intrusion prevention system (LPS) signature; and performing an action in response to detecting that the one or more of the plurality of samples is malware based on the automated analysis of the monitored network traffic using the C2 ML model. In some embodiments, the IPS signatures and C2 ML model are automatically generated and trained.
    Type: Application
    Filed: June 9, 2023
    Publication date: February 1, 2024
    Inventors: Yanhui Jia, Matthew W. Tennis, Stefan Achleitner, Taojie Wang, Hui Gao, Shengming Xu
  • Patent number: 11888874
    Abstract: Application-initiated network traffic is intercepted and analyzed by an application firewall in order to identify streams of traffic for a target application. An application signature generator preprocesses the raw data packets from the intercepted network traffic by tokenizing the data packets and then weighting each token according to its importance for application identification. The weighted features for each data packet are clustered using an unsupervised learning model, and the resulting clusters are iteratively refined and re-clustered using a proximity score between the clusters and feature vectors for key tokens for the target application. The application signature generator generates a signature for the clusters corresponding to the target application which the application firewall implements for filtering network traffic.
    Type: Grant
    Filed: October 31, 2022
    Date of Patent: January 30, 2024
    Assignee: Palo Alto Networks, Inc.
    Inventor: Stefan Achleitner
  • Publication number: 20240022577
    Abstract: The present application discloses a method, system, and computer system for detecting malicious files. The method includes obtaining network traffic, pre-filtering the network traffic based at least in part on a first set of features for traffic reduction, and using a detection model in connection with determining whether the filtered network traffic comprises malicious traffic, the detection model being based at least in part on a second set of features for malware detection.
    Type: Application
    Filed: July 12, 2022
    Publication date: January 18, 2024
    Inventors: Yu Fu, Lei Xu, Jin Chen, Zhibin Zhang, Bo Qu, Stefan Achleitner
  • Publication number: 20240022600
    Abstract: The present application discloses a method, system, and computer system for detecting malicious SQL or command injection strings. The method includes obtaining an SQL or command injection string and determining whether the command injection string is malicious based at least in part on a machine learning model.
    Type: Application
    Filed: July 12, 2022
    Publication date: January 18, 2024
    Inventors: Zhibin Zhang, Jin Chen, Yu Fu, Stefan Achleitner, Bo Qu, Lei Xu
  • Patent number: 11714903
    Abstract: Techniques for sample traffic based self-learning malware detection are disclosed. In some embodiments, a system/process/computer program product for sample traffic based self-learning malware detection includes receiving a plurality of samples for malware detection analysis using a sandbox; executing each of the plurality of samples in the sandbox and monitoring network traffic during execution of each of the plurality of samples in the sandbox; detecting that one or more of the plurality of samples is malware based on automated analysis of the monitored network traffic using a command and control (C2) machine learning (ML) model if there is not a prior match with an intrusion prevention system (IPS) signature; and performing an action in response to detecting that the one or more of the plurality of samples is malware based on the automated analysis of the monitored network traffic using the C2 ML model. In some embodiments, the IPS signatures and C2 ML model are automatically generated and trained.
    Type: Grant
    Filed: July 29, 2022
    Date of Patent: August 1, 2023
    Assignee: Palo Alto Networks, Inc.
    Inventors: Yanhui Jia, Matthew W. Tennis, Stefan Achleitner, Taojie Wang, Hui Gao, Shengming Xu
  • Publication number: 20230231857
    Abstract: Detection of command and control malware is disclosed. A network traffic session is monitored. Automatic feature identification for real-time malicious command and control traffic detection based on a request header of the monitored network traffic session using a deep learning model is performed.
    Type: Application
    Filed: January 18, 2022
    Publication date: July 20, 2023
    Inventors: Ajaya Neupane, Yuwen Dai, Stefan Achleitner, Yu Fu, Shengming Xu
  • Publication number: 20230179618
    Abstract: An anomaly detection model is trained to detect malicious traffic sessions with a low rate of false positives. A sample feature extractor extracts tokens corresponding to human-readable substrings of incoming unstructured payloads in a traffic session. The tokens are correlated with a list of malicious traffic features and frequent malicious traffic features across the traffic session are aggregated into a feature vector of malicious traffic feature frequencies. An anomaly detection model trained on feature vectors for unstructured malicious traffic samples predicts the traffic session as malicious or unclassified. The anomaly detection model is trained and updated based on its' ongoing false positive rate and malicious traffic features in the list of malicious traffic features that result in a high false positive rate are removed.
    Type: Application
    Filed: January 27, 2023
    Publication date: June 8, 2023
    Inventors: Stefan Achleitner, Chengcheng Xu
  • Patent number: 11616798
    Abstract: An anomaly detection model is trained to detect malicious traffic sessions with a low rate of false positives. A sample feature extractor extracts tokens corresponding to human-readable substrings of incoming unstructured payloads in a traffic session. The tokens are correlated with a list of malicious traffic features and frequent malicious traffic features across the traffic session are aggregated into a feature vector of malicious traffic feature frequencies. An anomaly detection model trained on feature vectors for unstructured malicious traffic samples predicts the traffic session as malicious or unclassified. The anomaly detection model is trained and updated based on its' ongoing false positive rate and malicious traffic features in the list of malicious traffic features that result in a high false positive rate are removed.
    Type: Grant
    Filed: August 21, 2020
    Date of Patent: March 28, 2023
    Assignee: Palo Alto Networks, Inc.
    Inventors: Stefan Achleitner, Chengcheng Xu
  • Publication number: 20230092159
    Abstract: Application-initiated network traffic is intercepted and analyzed by an application firewall in order to identify streams of traffic for a target application. An application signature generator preprocesses the raw data packets from the intercepted network traffic by tokenizing the data packets and then weighting each token according to its importance for application identification. The weighted features for each data packet are clustered using an unsupervised learning model, and the resulting clusters are iteratively refined and re-clustered using a proximity score between the clusters and feature vectors for key tokens for the target application. The application signature generator generates a signature for the clusters corresponding to the target application which the application firewall implements for filtering network traffic.
    Type: Application
    Filed: October 31, 2022
    Publication date: March 23, 2023
    Inventor: Stefan Achleitner
  • Publication number: 20230075094
    Abstract: An inline malicious traffic detector captures handshake messages in a session with a security protocol. The inline malicious traffic detector comprises a classifier that generates a verdict for the session indicating malicious or benign. The classifier is trained on labelled sessions using custom features generated from handshake messages. Based on determining that the session is malicious using features of the handshake messages, the inline malicious traffic detector blocks the session.
    Type: Application
    Filed: September 7, 2021
    Publication date: March 9, 2023
    Inventors: Lei Xu, Stefan Achleitner, Yu Fu, Shengming Xu
  • Patent number: 11528285
    Abstract: Application-initiated network traffic is intercepted and analyzed by an application firewall in order to identify streams of traffic for a target application. An application signature generator preprocesses the raw data packets from the intercepted network traffic by tokenizing the data packets and then weighting each token according to its importance for application identification. The weighted features for each data packet are clustered using an unsupervised learning model, and the resulting clusters are iteratively refined and re-clustered using a proximity score between the clusters and feature vectors for key tokens for the target application. The application signature generator generates a signature for the clusters corresponding to the target application which the application firewall implements for filtering network traffic.
    Type: Grant
    Filed: December 16, 2019
    Date of Patent: December 13, 2022
    Assignee: Palo Alto Networks, Inc.
    Inventor: Stefan Achleitner
  • Publication number: 20220368701
    Abstract: A natural language processor extracts features from batches of unstructured traffic. A feature weighted distance engine computes a distance matrix between pairs of feature vectors for sessions of unstructured traffic using a weight vector that assigns importance to relative placement of features in feature vectors. The distance function used to compute the distance matrix with the weight vector is conducive to generating high-quality clusters and patterns in unstructured traffic. The sessions of unstructured traffic are clustered according to the pairwise distance matrix. Generated clusters are merged with clusters for previously analyzed sessions of unstructured traffic. A pattern identification engine extracts patterns from the merged clusters that correspond to behavior of applications generating the unstructured traffic.
    Type: Application
    Filed: May 17, 2021
    Publication date: November 17, 2022
    Inventor: Stefan Achleitner
  • Publication number: 20220060491
    Abstract: An anomaly detection model is trained to detect malicious traffic sessions with a low rate of false positives. A sample feature extractor extracts tokens corresponding to human-readable substrings of incoming unstructured payloads in a traffic session. The tokens are correlated with a list of malicious traffic features and frequent malicious traffic features across the traffic session are aggregated into a feature vector of malicious traffic feature frequencies. An anomaly detection model trained on feature vectors for unstructured malicious traffic samples predicts the traffic session as malicious or unclassified. The anomaly detection model is trained and updated based on its' ongoing false positive rate and malicious traffic features in the list of malicious traffic features that result in a high false positive rate are removed.
    Type: Application
    Filed: August 21, 2020
    Publication date: February 24, 2022
    Inventors: Stefan Achleitner, Chengcheng Xu