Patents by Inventor Tamer Aboualy
Tamer Aboualy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11621975Abstract: Prioritizing vulnerability scan results is provided. Vulnerability scan results data corresponding to a network of data processing systems are received from a vulnerability scanner. The vulnerability scan results data are parsed to group the vulnerability scan results data by vulnerability identifiers. A corresponding security threat information identifier is associated with each vulnerability identifier. A correlation of each associated security threat information identifier is performed with a set of current vulnerability exploit data that corresponds to that particular security threat information identifier. Current security threat information that affects host data processing systems in the network is determined based on the correlation between each associated security threat information identifier and its corresponding set of current vulnerability exploit data. The current security threat information is prioritized based on a number of corresponding current vulnerability exploit attacks.Type: GrantFiled: April 27, 2021Date of Patent: April 4, 2023Assignee: International Business Machines CorporationInventors: Steven Ocepek, Nevenko Zunic, Tamer Aboualy, Johnny A. Shaieb
-
Patent number: 11494488Abstract: A method, system, and computer program product for adaptive network provisioning. The method may include storing a plurality of use case records in a use case repository, where each use case record provides a diagnostic definition of a security threat to a SIEM environment. The method may also include storing metadata for a plurality of attributes of subscribers to the SIEM environment. The method may also include storing use cases that the subscribers have deployed from the use case repository. The method may also include setting up a new subscriber, where setting up the new subscriber includes: receiving a set of attributes of the new subscriber; searching a metadata store to identify subscribers with attributes that are similar to the set of attributes; and selecting an initial set of use cases for the new subscriber based on use cases deployed by the identified subscribers.Type: GrantFiled: October 14, 2020Date of Patent: November 8, 2022Assignee: International Business Machines CorporationInventors: Tousif Ahmed Syed, Tamer Aboualy, Dusty Boshoff
-
Publication number: 20220114252Abstract: A method, system, and computer program product for adaptive network provisioning. The method may include storing a plurality of use case records in a use case repository, where each use case record provides a diagnostic definition of a security threat to a SIEM environment. The method may also include storing metadata for a plurality of attributes of subscribers to the SIEM environment. The method may also include storing use cases that the subscribers have deployed from the use case repository. The method may also include setting up a new subscriber, where setting up the new subscriber includes: receiving a set of attributes of the new subscriber; searching a metadata store to identify subscribers with attributes that are similar to the set of attributes; and selecting an initial set of use cases for the new subscriber based on use cases deployed by the identified subscribers.Type: ApplicationFiled: October 14, 2020Publication date: April 14, 2022Inventors: Tousif Ahmed Syed, Tamer Aboualy, Dusty Boshoff
-
Patent number: 11283828Abstract: A method, computer program product and computer system to analyze network vulnerability expansion is provided. A processor receives network infrastructure data regarding a network. A processor identifies a plurality of vulnerabilities associated with one or more components of the network. A processor generates a architecture model based, at least in part, on the network infrastructure data and the plurality of vulnerabilities. A processor generates a vulnerability expansion model based, at least in part, on the architecture model. A processor determines a vulnerability expansion based, at least in part, on the vulnerability expansion model and at least one vulnerability of plurality of vulnerabilities being compromised.Type: GrantFiled: January 17, 2020Date of Patent: March 22, 2022Assignee: International Business Machines CorporationInventors: Simone Riccetti, Tamer Aboualy, Nevenko Zunic
-
Publication number: 20210250371Abstract: Prioritizing vulnerability scan results is provided. Vulnerability scan results data corresponding to a network of data processing systems are received from a vulnerability scanner. The vulnerability scan results data are parsed to group the vulnerability scan results data by vulnerability identifiers. A corresponding security threat information identifier is associated with each vulnerability identifier. A correlation of each associated security threat information identifier is performed with a set of current vulnerability exploit data that corresponds to that particular security threat information identifier. Current security threat information that affects host data processing systems in the network is determined based on the correlation between each associated security threat information identifier and its corresponding set of current vulnerability exploit data. The current security threat information is prioritized based on a number of corresponding current vulnerability exploit attacks.Type: ApplicationFiled: April 27, 2021Publication date: August 12, 2021Inventors: Steven Ocepek, Nevenko Zunic, Tamer Aboualy, Johnny A. Shaieb
-
Publication number: 20210226980Abstract: A method, computer program product and computer system to analyze network vulnerability expansion is provided. A processor receives network infrastructure data regarding a network. A processor identifies a plurality of vulnerabilities associated with one or more components of the network. A processor generates a architecture model based, at least in part, on the network infrastructure data and the plurality of vulnerabilities. A processor generates a vulnerability expansion model based, at least in part, on the architecture model. A processor determines a vulnerability expansion based, at least in part, on the vulnerability expansion model and at least one vulnerability of plurality of vulnerabilities being compromised.Type: ApplicationFiled: January 17, 2020Publication date: July 22, 2021Inventors: Simone Riccetti, Tamer Aboualy, Nevenko Zunic
-
Patent number: 11057418Abstract: Prioritizing vulnerability scan results is provided. Vulnerability scan results data corresponding to a network of data processing systems are received from a vulnerability scanner. The vulnerability scan results data are parsed to group the vulnerability scan results data by vulnerability identifiers. A corresponding security threat information identifier is associated with each vulnerability identifier. A correlation of each associated security threat information identifier is performed with a set of current vulnerability exploit data that corresponds to that particular security threat information identifier. Current security threat information that affects host data processing systems in the network is determined based on the correlation between each associated security threat information identifier and its corresponding set of current vulnerability exploit data. The current security threat information is prioritized based on a number of corresponding current vulnerability exploit attacks.Type: GrantFiled: October 15, 2018Date of Patent: July 6, 2021Assignee: International Business Machines CorporationInventors: Steven Ocepek, Nevenko Zunic, Tamer Aboualy, Johnny A. Shaieb
-
Patent number: 10951638Abstract: A method, computer system, and a computer program product for detecting a malicious activity with respect to an application hosted on a server is provided. The present invention may include collecting user activity data associated an application accessed remotely over a network and generating a graph from the collected user activity data. Each node of the graph may represent a set of user requests received from a user with respect to a location within the application and each connection between nodes may represent a user navigable path between locations within the application. The present invention may include storing the generated graph and monitoring subsequent user activity with respect to the application. The present invention may include detecting a subsequent user activity that does not match the stored graph.Type: GrantFiled: June 27, 2018Date of Patent: March 16, 2021Assignee: International Business Machines CorporationInventors: Tamer Aboualy, Recep Meric Degirmenci
-
Publication number: 20200120126Abstract: Prioritizing vulnerability scan results is provided. Vulnerability scan results data corresponding to a network of data processing systems are received from a vulnerability scanner. The vulnerability scan results data are parsed to group the vulnerability scan results data by vulnerability identifiers. A corresponding security threat information identifier is associated with each vulnerability identifier. A correlation of each associated security threat information identifier is performed with a set of current vulnerability exploit data that corresponds to that particular security threat information identifier. Current security threat information that affects host data processing systems in the network is determined based on the correlation between each associated security threat information identifier and its corresponding set of current vulnerability exploit data. The current security threat information is prioritized based on a number of corresponding current vulnerability exploit attacks.Type: ApplicationFiled: October 15, 2018Publication date: April 16, 2020Inventors: Steven Ocepek, Nevenko Zunic, Tamer Aboualy, Johnny A. Shaieb
-
Publication number: 20200007562Abstract: A method, computer system, and a computer program product for detecting a malicious activity with respect to an application hosted on a server is provided. The present invention may include collecting user activity data associated an application accessed remotely over a network and generating a graph from the collected user activity data. Each node of the graph may represent a set of user requests received from a user with respect to a location within the application and each connection between nodes may represent a user navigable path between locations within the application. The present invention may include storing the generated graph and monitoring subsequent user activity with respect to the application. The present invention may include detecting a subsequent user activity that does not match the stored graph.Type: ApplicationFiled: June 27, 2018Publication date: January 2, 2020Inventors: Tamer Aboualy, Recep Meric Degirmenci
-
Patent number: 8868709Abstract: A method including querying a service provider for functional and nonfunctional qualifications of the service provider to provide a service having functional and nonfunctional requirements; responsive to input from the service provider, receiving by a requestor the functional qualifications and nonfunctional qualifications of the service provider including attesting by a third party, not the service provider or requestor, to at least the nonfunctional qualifications of the service provider; evaluating the functional qualifications and attested to nonfunctional qualifications of the service provider; and selecting a service provider having functional and attested to nonfunctional qualifications complying with the functional and nonfunctional requirements of the requestor. The method may be performed on one or more computing devices. Also disclosed is a computer program product.Type: GrantFiled: May 3, 2011Date of Patent: October 21, 2014Assignee: International Business Machines CorporationInventors: Tamer Aboualy, Omkharan Arasaratnam, Stewart Wolfe, Nevenko Zunic
-
Patent number: 8572750Abstract: Methods, systems, and computer program products are provided herein for facilitating security in an information technology environment. Web application security vulnerabilities are discovered and addressed by means of virtual patches deployed to components of the information technology environment. An intelligent feedback loop is created to fill the void in the security of the web application when implemented in the specific information technology environment, thereby providing end-to-end security application management through dynamic, pre-emptive, and proactive security awareness and protection in the information technology environment. As new web application security vulnerabilities are discovered, the vulnerability is diagnosed and resolved to preemptively prevent exploitation of the security vulnerability.Type: GrantFiled: September 30, 2011Date of Patent: October 29, 2013Assignee: International Business Machines CorporationInventors: Ashish Patel, Tamer Aboualy
-
Publication number: 20130086688Abstract: Methods, systems, and computer program products are provided herein for facilitating security in an information technology environment. Web application security vulnerabilities are discovered and addressed by means of virtual patches deployed to components of the information technology environment. An intelligent feedback loop is created to fill the void in the security of the web application when implemented in the specific information technology environment, thereby providing end-to-end security application management through dynamic, pre-emptive, and proactive security awareness and protection in the information technology environment. As new web application security vulnerabilities are discovered, the vulnerability is diagnosed and resolved to preemptively prevent exploitation of the security vulnerability.Type: ApplicationFiled: September 30, 2011Publication date: April 4, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ashish Patel, Tamer Aboualy
-
Publication number: 20120284382Abstract: A method including querying a service provider for functional and nonfunctional qualifications of the service provider to provide a service having functional and nonfunctional requirements; responsive to input from the service provider, receiving by a requestor the functional qualifications and nonfunctional qualifications of the service provider including attesting by a third party, not the service provider or requestor, to at least the nonfunctional qualifications of the service provider; evaluating the functional qualifications and attested to nonfunctional qualifications of the service provider; and selecting a service provider having functional and attested to nonfunctional qualifications complying with the functional and nonfunctional requirements of the requestor. The method may be performed on one or more computing devices. Also disclosed is a computer program product.Type: ApplicationFiled: May 3, 2011Publication date: November 8, 2012Applicant: International Business Machines CorporationInventors: Tamer Aboualy, Omkharan Arasaratnam, Stewart Wolfe, Nevenko Zunic