Patents by Inventor Tarik Rahmanovic

Tarik Rahmanovic has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8266703
    Abstract: A system, method and computer program product are provided for prioritized network security. Initially, a risk assessment scan is conducted for identifying vulnerabilities on a network device. Next, network communications are identified that exploit the vulnerabilities identified by the risk assessment scan before identifying network communications that exploit other vulnerabilities. In other words, network communications are monitored for identifying any exploitation of the vulnerabilities identified by the risk assessment scan before identifying any exploitation of other vulnerabilities.
    Type: Grant
    Filed: September 12, 2007
    Date of Patent: September 11, 2012
    Assignee: McAfee, Inc.
    Inventors: James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier
  • Patent number: 8176553
    Abstract: A system, method and computer program product are provided. Initially, data is received from a remote source which is destined for a target. A portion of such data is discarded based on a predetermined set of rules utilizing a firewall. Further, the data is compared to a predetermined list of data associated with attacks utilizing an intrusion detection system. Based on the comparison, some of the data is marked as hostile. The data that is marked as hostile is then acted upon in order to prevent an attack.
    Type: Grant
    Filed: November 13, 2002
    Date of Patent: May 8, 2012
    Assignee: McAfee, Inc.
    Inventors: James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier, Anthony C. Osborne, Nishad P. Herath
  • Patent number: 7779468
    Abstract: A system and associated method/computer program product are provided including an intrusion detection tool for determining whether network communications violate at least one of a plurality of policies. Such policies are defined to detect potential attacks in the network communications. Further included is a vulnerability assessment scanning tool coupled to the intrusion detection tool. The vulnerability assessment scanning tool is adapted for performing a vulnerability assessment scan for identifying vulnerabilities.
    Type: Grant
    Filed: September 14, 2007
    Date of Patent: August 17, 2010
    Assignee: McAfee, Inc.
    Inventors: James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier
  • Patent number: 7549168
    Abstract: A system, method and computer program product are provided. Commands are received for executing a risk-assessment scan from a remote computer utilizing a network. The commands are processed on a local computer utilizing an agent. Further, the risk-assessment scan is performed on the local computer in accordance with the processed commands to remotely detect local vulnerabilities on the local computer. Such agent includes a plurality of risk-assessment modules. Further, the commands execute the risk-assessment modules in a specific manner that is configured at the remote computer.
    Type: Grant
    Filed: June 29, 2006
    Date of Patent: June 16, 2009
    Assignee: McAfee, Inc.
    Inventors: James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier, Anthony C. Osborne, Nishad P. Herath
  • Patent number: 7424746
    Abstract: A system and associated method/computer program product are provided including an intrusion detection tool for determining whether network communications violate at least one of a plurality of policies. Such policies are defined to detect potential attacks in the network communications. Further included is a vulnerability assessment scanning tool coupled to the intrusion detection tool. The vulnerability assessment scanning tool is adapted for performing a vulnerability assessment scan for identifying vulnerabilities.
    Type: Grant
    Filed: April 2, 2003
    Date of Patent: September 9, 2008
    Assignee: McAfee, Inc.
    Inventors: James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier
  • Patent number: 7146642
    Abstract: A system, method and computer program product are provided for detecting modifications to risk assessment scanning caused by an intermediate device. Initially, a risk assessment scan is initiated on a target from a remote source utilizing a network. Next, it is determined whether the risk assessment scan involves an intermediate device coupled between the target and the remote source. Results of the risk assessment scan are then received from the target utilizing the network. If it is determined that the risk assessment scan involves the intermediate device, an administrator is notified for executing additional security measures.
    Type: Grant
    Filed: June 29, 2001
    Date of Patent: December 5, 2006
    Assignee: McAfee, Inc.
    Inventors: James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier, Anthony C. Osborne, Nishad P. Herath
  • Patent number: 7124181
    Abstract: A system, method and computer program product are provided for executing a risk-assessment scan with a variable timeout duration which is set based on network conditions. Initially, network conditions are measured in a network coupled between a source and a target. Subsequently, a risk-assessment scan is executed on the target from the source. A timeout is performed prior to making a determination that the target is failing to respond to the risk-assessment scan. Such timeout includes a variable duration which is set as a function of the measured network conditions.
    Type: Grant
    Filed: June 29, 2001
    Date of Patent: October 17, 2006
    Assignee: McAfee, Inc.
    Inventors: James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier, Anthony C. Osborne, Nishad P. Herath
  • Patent number: 7096503
    Abstract: A system, method and computer program product are provided for remotely detecting vulnerabilities on a local computer. Initially, an agent is installed on a local computer for receiving encrypted commands from a remote computer utilizing a network. Next, the commands are decrypted and processed on the local computer utilizing the agent. A risk-assessment scan is then performed on the local computer utilizing the agent in accordance with the processed commands for the purpose of remotely detecting local vulnerabilities on the local computer.
    Type: Grant
    Filed: June 29, 2001
    Date of Patent: August 22, 2006
    Assignee: McAfee, Inc.
    Inventors: James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier, Anthony C. Osborne, Nishad P. Herath
  • Patent number: 7003561
    Abstract: A system, method and computer program product are provided for minimizing the duration of a risk-assessment scan. Initially, a plurality of risk-assessment modules are selected each including vulnerability checks associated with a risk-assessment scan. Thereafter, a first set of ports is determined. Such first set of ports is required for communicating with network components subject to the risk-assessment modules associated with the risk-assessment scan. A port scan is subsequently executed on the first set of ports. Based on such port scan, a second set of ports is determined which includes ports unavailable for communicating with the network components subject to the risk-assessment modules associated with the risk-assessment scan. The risk-assessment modules associated with the second set of ports may then be disabled to minimize the duration of the risk-assessment scan.
    Type: Grant
    Filed: June 29, 2001
    Date of Patent: February 21, 2006
    Assignee: McAfee, Inc.
    Inventors: James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier, Anthony C. Osborne, Nishad P. Herath
  • Patent number: 6546493
    Abstract: A system, method and computer program product are provided for scanning a source of suspicious network communications. Initially, network communications are monitored for violations of policies. Then, it is determined whether the network communications violate at least one of the policies. Further, a source of the network communications that violate at least one of the policies is identified. Upon it being determined that the network communications violate at least one of the policies, the source of the network communications is automatically scanned.
    Type: Grant
    Filed: November 30, 2001
    Date of Patent: April 8, 2003
    Assignee: Networks Associates Technology, Inc.
    Inventors: James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier
  • Patent number: 6513122
    Abstract: A system, method and computer program product are provided for detecting attacks on a network. Initially, data is received from a remote source which is destined for a target. A portion of such data is then discarded based on a predetermined set of rules utilizing a firewall which is coupled to the remote source. Remaining data is subsequently passed to an intrusion detection system coupled between the firewall and the target. Such data is parsed to identify data representing text (i.e. ASCII or UNICODE text) therein utilizing the intrusion detection system. Thereafter, the data representing text- is compared to a predetermined list of data representing text-associated with attacks utilizing the intrusion detection system. Based on the comparison, some of the data representing text are marked as hostile. The data representing text-that are marked as hostile are then acted upon in order to prevent an attack.
    Type: Grant
    Filed: June 29, 2001
    Date of Patent: January 28, 2003
    Assignee: Networks Associates Technology, Inc.
    Inventors: James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier, Anthony C. Osborne, Nishad P. Herath