Patents by Inventor Steven E. Noel

Steven E. Noel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230300032
    Abstract: Described herein are systems and methods for grouping computing devices in a computing network and predicting future communications links between computing devices for the purpose of developing a computing network microsegmentation policy. In one or more examples, the systems and methods described herein can predict future links in a computing network using a plurality of combinations of node similarity, node grouping, and link prediction methods. Each unique combination of methods can be assessed by comparing the predicted links to observed network traffic to determine the quality of the prediction. The quality of prediction can be assessed by generate F1 curves for each combination of methods. The combination with the highest quality prediction can then be selected and tuned (by adjusting a threshold associated with the combination). Once tuned, the selected combination (i.e., model) can then be used generate and/or modify a microsegmentation policy associated with the computing network.
    Type: Application
    Filed: March 16, 2023
    Publication date: September 21, 2023
    Applicant: The MITRE Corporation
    Inventors: Steven E. NOEL, Vipin SWARUP
  • Publication number: 20230111177
    Abstract: Disclosed herein are system, method, and computer program product embodiments for creating cyber situational understanding in an operational environment. An embodiment operates by normalizing streaming cyber information for a plurality of cyberspace entities and generating cyber-graphs based on relationships between two or more of the plurality of cyberspace entities. A cyber-threat inquiry of the cyber-graphs returns potential cyber-threats that are subsequently visualized as an overlay on a corresponding operational environment.
    Type: Application
    Filed: October 7, 2021
    Publication date: April 13, 2023
    Applicant: The MITRE Corporation
    Inventors: Steven E. NOEL, Man M. Sapra, Stephen F. Purdy, Jeremy T. Martin, Mandira D. Hegde, Brianna L. Chen
  • Publication number: 20230065398
    Abstract: Methods and systems are described for assessing a computer network using a graph model. In some instances, the methods comprise: receiving data from at least one data stream of a plurality of data streams, wherein the plurality of data streams comprise computer network data provided by one or more data brokers, and wherein the data received from different data streams of the plurality comprise different data formats; converting the data received from the at least one data stream to a common data format comprising a node or an edge; updating a graph model comprising a plurality of nodes and edges stored within a graph database according to the node or edge of the converted data; and providing a user of the computer network with a visualization of a status of the computer network.
    Type: Application
    Filed: August 27, 2021
    Publication date: March 2, 2023
    Applicant: The MITRE Corporation
    Inventors: Stephen F. PURDY, Steven E. NOEL, Edward A. OVERLY, Annie T. O'ROURKE
  • Publication number: 20220414228
    Abstract: Methods and systems for translating a natural language user query into a graph database query are described. In some instances, the methods may comprise receiving a first input from a user comprising a natural language query regarding data in a graph database; processing the natural language query using a named entity recognition (NER) machine learning model to extract named entities from the natural language query and tag them according to an entity type; processing the tagged named entities using a semantic similarity algorithm to identify corresponding nodes and edges, and their associated properties, in the graph database; processing the natural language query using an intent classification machine learning model to determine a user intent for the natural language query; and applying a user intent-based template to the identified nodes and edges to formulate a graph database query that corresponds to the natural language query.
    Type: Application
    Filed: December 6, 2021
    Publication date: December 29, 2022
    Applicant: The MITRE Corporation
    Inventors: Christine M. DIFONZO, Steven E. NOEL
  • Patent number: 8719943
    Abstract: Disclosed is a system for correlating intrusion events using attack graph distances. The system includes an attack graph generator, an exploit distance calculator, an intrusion detector, an event report/exploit associator, an event graph creator, an event graph distance calculator, a correlation value calculator, and a coordinated attack analyzer. An attack graph is constructed for exploits and conditions in a network. The exploit distance calculator determines exploit distances for exploit pair(s). The intrusion detector generates event. Events are associated with exploits. Event graph distances are calculated. Correlation values are calculated for event pair(s) using event graph distances. The correlation values are analyzed using a correlation threshold to detect coordinated attacks.
    Type: Grant
    Filed: May 8, 2012
    Date of Patent: May 6, 2014
    Assignee: George Mason Intellectual Properties, Inc.
    Inventors: Steven E Noel, Sushil Jajodia, Eric B Robertson
  • Publication number: 20120227108
    Abstract: Disclosed is a system for correlating intrusion events using attack graph distances. The system includes an attack graph generator, an exploit distance calculator, an intrusion detector, an event report/exploit associator, an event graph creator, an event graph distance calculator, a correlation value calculator, and a coordinated attack analyzer. An attack graph is constructed for exploits and conditions in a network. The exploit distance calculator determines exploit distances for exploit pair(s). The intrusion detector generates event. Events are associated with exploits. Event graph distances are calculated. Correlation values are calculated for event pair(s) using event graph distances. The correlation values are analyzed using a correlation threshold to detect coordinated attacks.
    Type: Application
    Filed: May 8, 2012
    Publication date: September 6, 2012
    Inventors: Steven E. Noel, Eric B. Robertson, Sushil Jajodia
  • Patent number: 8181252
    Abstract: Disclosed is a system for correlating intrusion events using attack graph distances. The system includes an attack graph generator, an exploit distance calculator, an intrusion detector, an event report/exploit associator, an event graph creator, an event graph distance calculator, a correlation value calculator, and a coordinated attack analyzer. An attack graph is constructed for exploits and conditions in a network. The exploit distance calculator determines exploit distances for exploit pair(s). The intrusion detector generates event. Events are associated with exploits. Event graph distances are calculated. Correlation values are calculated for event pair(s) using event graph distances. The correlation values are analyzed using a correlation threshold to detect coordinated attacks.
    Type: Grant
    Filed: April 12, 2010
    Date of Patent: May 15, 2012
    Assignee: George Mason Intellectual Properties, Inc.
    Inventors: Sushil Jajodia, Steven E Noel, Eric B Robertson
  • Patent number: 7904962
    Abstract: Disclosed is a system for modeling, analyzing, and responding to network attacks. Machines are mapped to components, components are mapped to vulnerabilities, and vulnerabilities are mapped to exploits. Each of the exploits includes at least one precondition mapped to at least one postcondition. An attack graph which defines inter-exploit distances is generated using at least one of the exploits. The attack graph is aggregated. At least one hardening option is determined using the aggregated attack graph. Hardening options include applying at least one corrective measure to at least one initial condition, where the initial condition is the initial state of a precondition.
    Type: Grant
    Filed: March 10, 2006
    Date of Patent: March 8, 2011
    Assignee: George Mason Intellectual Properties, Inc.
    Inventors: Sushil Jajodia, Steven E. Noel, Pramod Kalapa, Brian C. O'Berry, Michael A. Jacobs, Eric B. Robertson, Robert G. Weierbach
  • Publication number: 20100192226
    Abstract: Disclosed is a system for correlating intrusion events using attack graph distances. The system includes an attack graph generator, an exploit distance calculator, an intrusion detector, an event report/exploit associator, an event graph creator, an event graph distance calculator, a correlation value calculator, and a coordinated attack analyzer. An attack graph is constructed for exploits and conditions in a network. The exploit distance calculator determines exploit distances for exploit pair(s). The intrusion detector generates event. Events are associated with exploits. Event graph distances are calculated. Correlation values are calculated for event pair(s) using event graph distances. The correlation values are analyzed using a correlation threshold to detect coordinated attacks.
    Type: Application
    Filed: April 12, 2010
    Publication date: July 29, 2010
    Inventors: Steven E. Noel, Eric B. Robertson, Sushil Jajodia
  • Patent number: 7735141
    Abstract: Disclosed is a system for correlating intrusion events using attack graph distances. The system includes an attack graph generator, an exploit distance calculator, an intrusion detector, an event report/exploit associator, an event graph creator, an event graph distance calculator, a correlation value calculator, and a coordinated attack analyzer. An attack graph is constructed for exploits and conditions in a network. The exploit distance calculator determines exploit distances for exploit pair(s). The intrusion detector generates event. Events are associated with exploits. Event graph distances are calculated. Correlation values are calculated for event pair(s) using event graph distances. The correlation values are analyzed using a correlation threshold to detect coordinated attacks.
    Type: Grant
    Filed: March 10, 2006
    Date of Patent: June 8, 2010
    Inventors: Steven E. Noel, Eric B. Robertson, Sushil Jajodie
  • Publication number: 20100058456
    Abstract: Embodiments of the present invention identify locations to deploy IDS sensor(s) within a network infrastructure and prioritize IDS alerts using attack graph analysis. An attack graph that describes exploitable vulnerability(ies) within a network infrastructure is aggregated into protection domains. Edge(s) that have exploit(s) between two protection domains are identified. Sets that contain edge(s) serviced by a common network traffic device are defined. Set(s) that collectively contain all of the edge(s) are selected. The common network traffic device(s) that service the selected sets are identified as the location(s) to deploy IDS sensor(s) within the network infrastructure.
    Type: Application
    Filed: August 26, 2009
    Publication date: March 4, 2010
    Inventors: Sushil Jajodia, Steven E. Noel
  • Patent number: 7627900
    Abstract: Disclosed is framework for aggregating network attack graphs. A network may be represented as a dependency graph. Condition set(s), exploit set(s) and machine set(s) may be generated using information from the dependency graph. Exploit-condition set(s) may be generated using the condition set(s) and the exploit set(s). Machine-exploit set(s) may be generated using the exploit-condition set(s) and machine set(s).
    Type: Grant
    Filed: March 10, 2006
    Date of Patent: December 1, 2009
    Assignee: George Mason Intellectual Properties, Inc.
    Inventors: Steven E. Noel, Sushil Jajodia
  • Patent number: 7555778
    Abstract: Disclosed is a network hardening mechanism. The mechanism: generates a dependency graph from a multitude of exploits; constructs a goal conditions expression which may then be used to determine set(s) of safe network configurations. A subset of these safe network configuration sets may then be selected for implementation using hardening costs as a criterion.
    Type: Grant
    Filed: October 17, 2005
    Date of Patent: June 30, 2009
    Assignee: George Mason Intellectual Properties, Inc.
    Inventors: Steven E. Noel, Sushil Jajodia, Brian C. O'Berry, Michael A. Jacobs