Patents by Inventor Stuart Millar
Stuart Millar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
HASHING TECHNIQUES FOR ASSOCIATING ASSETS RELATED TO EVENTS WITH ADDRESSABLE COMPUTER NETWORK ASSETS
Publication number: 20250030557Abstract: Techniques for associating assets related to events detected in at least one computer network with respective assets in an asset catalog for the at least one computer network. The techniques comprising: obtaining information about an event related to a first asset, the information specifying computer network addressing information for the first asset; generating a signature of the first asset from the computer network addressing information using at least one trained machine learning model, wherein the signature comprises a numeric representation of the first asset; associating the first asset with at least one asset in the asset catalog using the signature and at least one signature of the at least one asset in the asset catalog, wherein the at least one signature was previously determined using the at least one trained machine learning model; and outputting information identifying the at least one asset with which the first asset was associated.Type: ApplicationFiled: October 4, 2024Publication date: January 23, 2025Applicant: Rapid7, Inc.Inventors: Stuart Millar, Ralph McTeggart -
Publication number: 20250005167Abstract: Various embodiments include systems and methods of implementing a machine learning model for calculating confidence scores associated with potential security vulnerabilities. The machine learning model is trained using vulnerability data associated with a set of previously identified vulnerabilities, where the vulnerability data indicates whether a previously identified vulnerability is a true positive or a false positive. In some embodiments, scan traffic data may be obtained. The scan traffic data may be associated with potential security vulnerabilities detected via scan engine(s) that implement application security testing. The machine learning model may be used to determine respective confidence scores for each potential security vulnerability. According to some embodiments, responsive to a request for scan findings associated with a particular application, the respective confidence scores may be displayed via a vulnerability analysis graphical user interface.Type: ApplicationFiled: September 12, 2024Publication date: January 2, 2025Applicant: Rapid7, Inc.Inventors: Stuart Millar, Denis Podgurskii
-
Publication number: 20240430273Abstract: Some embodiments provide a vulnerability data processing system that uses machine learning (ML) to identify anomalous vulnerability data among vulnerability data acquired for configuring vulnerability detection of a computer network security system configured to monitor a computing environment. The system obtains vulnerability data that comprises values of a vulnerability parameter. The system generates datapoints representing values of the vulnerability parameter included in the obtained vulnerability data. The system clusters the datapoints to obtain vulnerability parameter clusters. The system identifies anomalous vulnerability data using the vulnerability parameter clusters.Type: ApplicationFiled: June 20, 2023Publication date: December 26, 2024Inventors: Stuart Millar, Gudlaugur Finnbogason
-
Patent number: 12143505Abstract: Techniques for associating assets related to events detected in at least one computer network with respective assets in an asset catalog for the at least one computer network. The techniques comprising: obtaining information about an event related to a first asset, the information specifying computer network addressing information for the first asset; generating a signature of the first asset from the computer network addressing information using at least one trained machine learning model, wherein the signature comprises a numeric representation of the first asset; associating the first asset with at least one asset in the asset catalog using the signature and at least one signature of the at least one asset in the asset catalog, wherein the at least one signature was previously determined using the at least one trained machine learning model; and outputting information identifying the at least one asset with which the first asset was associated.Type: GrantFiled: May 10, 2024Date of Patent: November 12, 2024Assignee: Rapid7, Inc.Inventors: Stuart Millar, Ralph McTeggart
-
Patent number: 12118095Abstract: Various embodiments include systems and methods of implementing a machine learning model for calculating confidence scores associated with potential security vulnerabilities. The machine learning model is trained using vulnerability data associated with a set of previously identified vulnerabilities, where the vulnerability data indicates whether a previously identified vulnerability is a true positive or a false positive. In some embodiments, scan traffic data may be obtained. The scan traffic data may be associated with potential security vulnerabilities detected via scan engine(s) that implement application security testing. The machine learning model may be used to determine respective confidence scores for each potential security vulnerability. According to some embodiments, responsive to a request for scan findings associated with a particular application, the respective confidence scores may be displayed via a vulnerability analysis graphical user interface.Type: GrantFiled: July 30, 2021Date of Patent: October 15, 2024Assignee: Rapid7, Inc.Inventors: Stuart Millar, Denis Podgurskii
-
Publication number: 20240333737Abstract: Machine learning techniques for updating a configuration of a computer network security system operating in a cloud computing environment. The techniques include obtaining a plurality of datasets containing information about a respective plurality of events detected by the computer network security system in the cloud computing environment; generating, using at least one trained ML model, a plurality of signatures representing the plurality of events, the generating comprising processing the plurality of datasets using the at least one trained ML model to obtain the plurality of signatures; clustering the plurality of signatures to obtain signature clusters representing clusters of events in the plurality of events; identifying a particular event cluster from among the clusters of events; and updating the configuration of the computer network security system based on characteristics of events in the identified particular event cluster.Type: ApplicationFiled: March 31, 2023Publication date: October 3, 2024Inventors: Pojan Shahrivar, Stuart Millar
-
Publication number: 20240333768Abstract: Machine learning techniques for updating a configuration of a computer network security system operating in a cloud computing environment. The techniques include obtaining a plurality of datasets containing information about a respective plurality of events detected by the computer network security system in the cloud computing environment; generating, using at least one trained ML model, a plurality of signatures representing the plurality of events, the generating comprising processing the plurality of datasets using the at least one trained ML model to obtain the plurality of signatures; clustering the plurality of signatures to obtain signature clusters representing clusters of events in the plurality of events; identifying a particular event cluster from among the clusters of events; and updating the configuration of the computer network security system based on characteristics of events in the identified particular event cluster.Type: ApplicationFiled: March 31, 2023Publication date: October 3, 2024Inventors: Pojan Shahrivar, Stuart Millar
-
Publication number: 20240297795Abstract: Techniques for associating assets related to events detected in at least one computer network with respective assets in an asset catalog for the at least one computer network. The techniques comprising: obtaining information about an event related to a first asset, the information specifying computer network addressing information for the first asset; generating a signature of the first asset from the computer network addressing information using at least one trained machine learning model, wherein the signature comprises a numeric representation of the first asset; associating the first asset with at least one asset in the asset catalog using the signature and at least one signature of the at least one asset in the asset catalog, wherein the at least one signature was previously determined using the at least one trained machine learning model; and outputting information identifying the at least one asset with which the first asset was associated.Type: ApplicationFiled: May 10, 2024Publication date: September 5, 2024Applicant: Rapid7, Inc.Inventors: Stuart Millar, Ralph McTeggart
-
Patent number: 12003362Abstract: Techniques for associating assets related to events detected in at least one computer network with respective assets in an asset catalog for the at least one computer network. The techniques comprising: obtaining information about an event related to a first asset, the information specifying computer network addressing information for the first asset; generating a signature of the first asset from the computer network addressing information using at least one trained machine learning model, wherein the signature comprises a numeric representation of the first asset; associating the first asset with at least one asset in the asset catalog using the signature and at least one signature of the at least one asset in the asset catalog, wherein the at least one signature was previously determined using the at least one trained machine learning model; and outputting information identifying the at least one asset with which the first asset was associated.Type: GrantFiled: March 27, 2023Date of Patent: June 4, 2024Assignee: Rapid7, Inc.Inventors: Stuart Millar, Ralph McTeggart
-
Publication number: 20240039911Abstract: Techniques for verifying correctness of associations between assets related to events detected in at least one computer network and assets in an asset catalog for the at least one computer network. The techniques include obtaining information specifying a first asset and a first set of assets with which the first asset was previously associated; generating a signature of the first asset from the computer network addressing information for the first asset; generating a hashed signature by applying a locality sensitive hashing (LSH) technique to the signature; associating the first asset with a second set of assets in the asset catalog using the hashed signature and at least one hashed signature of the at least one asset in the asset catalog; and when it is determined that the second set of includes the first set, outputting an indication that the first asset was correctly associated with the first set of assets.Type: ApplicationFiled: March 27, 2023Publication date: February 1, 2024Applicant: Rapid7, Inc.Inventors: Stuart Millar, Ralph McTeggart
-
Publication number: 20240039733Abstract: Techniques for verifying correctness of associations between assets related to events detected in at least one computer network and assets in an asset catalog for the at least one computer network. The techniques include: obtaining information specifying a first asset and a first set of assets with which the first asset was previously associated; generating a signature of the first asset from computer network addressing information for the first asset using at least one trained machine learning model; associating the first asset with a second set of assets using the signature and at least one signature of the at least one asset, wherein the at least one signature was previously determined using the at least one trained machine learning model; and when it is determined that the second set includes the first set, outputting an indication that the first asset was correctly associated with the first set of assets.Type: ApplicationFiled: March 27, 2023Publication date: February 1, 2024Applicant: Rapid7, Inc.Inventors: Stuart Millar, Ralph McTeggart
-
Publication number: 20240039779Abstract: Techniques for associating assets related to events detected in at least one computer network with respective assets in an asset catalog for the at least one computer network. The techniques comprising: obtaining information about an event related to a first asset, the information specifying computer network addressing information for the first asset; generating a signature of the first asset from the computer network addressing information using at least one trained machine learning model, wherein the signature comprises a numeric representation of the first asset; associating the first asset with at least one asset in the asset catalog using the signature and at least one signature of the at least one asset in the asset catalog, wherein the at least one signature was previously determined using the at least one trained machine learning model; and outputting information identifying the at least one asset with which the first asset was associated.Type: ApplicationFiled: March 27, 2023Publication date: February 1, 2024Applicant: Rapid7, Inc.Inventors: Stuart Millar, Ralph McTeggart
-
HASHING TECHNIQUES FOR ASSOCIATING ASSETS RELATED TO EVENTS WITH ADDRESSABLE COMPUTER NETWORK ASSETS
Publication number: 20240039730Abstract: Techniques for associating assets related to events detected in at least one computer network with respective assets in an asset catalog for the at least one computer network. The techniques include: while monitoring activity on the at least one computer network, obtaining information about an event related to a first asset, the information specifying computer network addressing information for the first asset; generating a signature of the first asset from the computer network addressing information; generating a hashed signature of the first asset by applying a locality sensitive hashing (LSH) technique to the signature; associating the first asset with at least one asset in the asset catalog using the hashed signature of the first asset and at least one hashed signature of the at least one asset in the asset catalog; and outputting information identifying the at least one asset with which the first asset was associated.Type: ApplicationFiled: March 27, 2023Publication date: February 1, 2024Applicant: Rapid7, Inc.Inventors: Stuart Millar, Ralph McTeggart -
Publication number: 20040110173Abstract: The invention relates to variants of the human growth gene (GH1) and, in particular, variants in the proximal promoter region thereof. Moreover, the invention relates to the interaction of said variants and how said interaction affects growth hormone expression.Type: ApplicationFiled: June 11, 2003Publication date: June 10, 2004Inventors: David Neil Cooper, Ann Marie Procter, David Stuart Millar, John Gregory