Patents by Inventor Yuval Altman

Yuval Altman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9306971
    Abstract: Malware detection techniques that detect malware by identifying the C&C communication between the malware and the remote host, and distinguish between communication transactions that carry C&C communication and transactions of innocent traffic. The system distinguishes between malware transactions and innocent transactions using malware identification models, which it adapts using machine learning algorithms. However, the number and variety of malicious transactions that can be obtained from the protected network are often too limited for effectively training the machine learning algorithms. Therefore, the system obtains additional malicious transactions from another computer network that is known to be relatively rich in malicious activity. The system is thus able to adapt the malware identification models based on a large number of positive examples—The malicious transactions obtained from both the protected network and the infected network.
    Type: Grant
    Filed: June 4, 2014
    Date of Patent: April 5, 2016
    Assignee: VERINT SYSTEMS LTD.
    Inventors: Yuval Altman, Assaf Yosef Keren, Ido Krupkin
  • Patent number: 9264446
    Abstract: Methods and systems for analyzing flows of communication packets. A front-end processor associates input packets with flows and forwards each flow to the appropriate unit, typically by querying a flow table that holds a respective classification for each active flow. In general, flows that are not yet classified are forwarded to the classification unit, and the resulting classification is entered in the flow table. Flows that are classified as requested for further analysis are forwarded to an appropriate flow analysis unit. Flows that are classified as not requested for analysis are not subjected to further processing, e.g., discarded or allowed to pass.
    Type: Grant
    Filed: January 25, 2012
    Date of Patent: February 16, 2016
    Assignee: VERINT SYSTEMS LTD.
    Inventors: Eithan Goldfarb, Yuval Altman, Naomi Frid, Gur Yaari
  • Patent number: 9203712
    Abstract: Methods and systems for identifying network users who communicate with the network (e.g., the Internet) via a given network connection. The disclosed techniques analyze traffic that flows in the network to determine, for example, whether the given network connection serves a single individual or multiple individuals, a single computer or multiple computers. A Profiling System (PS) acquires copies of data traffic that flow through network connections that connect computers to the WAN. The PS analyzes the acquired data, attempting to identify individuals who login to servers.
    Type: Grant
    Filed: March 3, 2014
    Date of Patent: December 1, 2015
    Assignee: VERINT SYSTEMS LTD.
    Inventor: Yuval Altman
  • Publication number: 20150215221
    Abstract: Systems and methods for extracting user identifiers over encrypted communication traffic are provided herein. An example method includes monitoring multiple flows of communication traffic. A sequence of messages is then sent to a user in accordance with a first temporal pattern. A flow whose activity has a second temporal pattern that matches the first pattern is then identified among the monitored flows. The identified flow is then associated with the user.
    Type: Application
    Filed: January 23, 2015
    Publication date: July 30, 2015
    Inventor: Yuval Altman
  • Patent number: 9053211
    Abstract: Methods and systems related to keyword searching processes. A list of keywords may be first represented by a set of short substrings. The substrings are selected such that an occurrence of a substring indicates a possible occurrence of one or more of the keywords. Input data may be initially pre-processed, so as to identify locations in the input data in which the substrings occur. Then, the identified locations are searched for occurrences of the actual keywords. The pre-processing scheme enables the keyword search process to search only in the identified locations of the substrings instead of over the entire input data.
    Type: Grant
    Filed: June 3, 2010
    Date of Patent: June 9, 2015
    Assignee: VERINT SYSTEMS LTD.
    Inventors: Eithan Goldfarb, Yuval Altman, Itsik Horovitz, Gur Yaari
  • Patent number: 8959329
    Abstract: Inspection of encrypted network traffic where multiple network connections are monitored that carry encrypted data, but only a subset of the network connections are decrypted and inspected. Typically, only network connections that are associated with designated target users whose encrypted data is to be inspected are decrypted. A Network Monitor Center (NMC) dynamically establishes a list of rules for selection of encrypted data connections. The rules are provided to a Secure data Inspection Appliance (SIA) that accepts some or all of the network user encrypted traffic and checks it against a rule table. When detecting an encrypted connection that matches the rule table, the SIA decrypts the connection and provides a copy of the connection plain data to the NMC. The NMC then inspects the plain data for security threats. Once a security threat is found in a connection, the NMC applies predefined consequent actions to this connection.
    Type: Grant
    Filed: April 13, 2012
    Date of Patent: February 17, 2015
    Assignee: Verint Sytems, Ltd..
    Inventor: Yuval Altman
  • Publication number: 20150026809
    Abstract: A malware detection system analyzes communication traffic to and/or from a certain host. The malware detection system uses the mismatch between host name and IP address to assign a quantitative score, which is indicative of the probability that the host is malicious. The system may use this score, for example, in combination with other indications, to decide whether the host in question is malicious or innocent. The overall decision may use, for example, a rule engine, machine learning techniques or any other suitable means. The malware detection system may also analyze alerts regarding hosts that are suspected of being malicious. The alerts may originate, for example, from Command & Control (C&C) detection, from an Intrusion Detection System (IDS), or from any other suitable source. A given alert typically reports a name of the suspected host and an IP address that allegedly belongs to that host.
    Type: Application
    Filed: July 22, 2014
    Publication date: January 22, 2015
    Inventors: Yuval Altman, Assaf Yosef Keren
  • Publication number: 20140359761
    Abstract: Malware detection techniques that detect malware by identifying the C&C communication between the malware and the remote host, and distinguish between communication transactions that carry C&C communication and transactions of innocent traffic. The system distinguishes between malware transactions and innocent transactions using malware identification models, which it adapts using machine learning algorithms. However, the number and variety of malicious transactions that can be obtained from the protected network are often too limited for effectively training the machine learning algorithms. Therefore, the system obtains additional malicious transactions from another computer network that is known to be relatively rich in malicious activity. The system is thus able to adapt the malware identification models based on a large number of positive examples—The malicious transactions obtained from both the protected network and the infected network.
    Type: Application
    Filed: June 4, 2014
    Publication date: December 4, 2014
    Inventors: Yuval Altman, Assaf Yosef Keren, Ido Krupkin
  • Publication number: 20140325653
    Abstract: Methods and systems for automated generation of malicious traffic signatures, for use in Intrusion Detection Systems (IDS). A rule generation system formulates IDS rules based on traffic analysis results obtained from a network investigation system. The rule generation system then automatically configures the IDS to apply the rules. An analysis process in the network investigation system comprises one or more metadata filters that are indicative of malicious traffic. An operator of the rule generation system is provided with a user interface that is capable of displaying the network traffic filtered in accordance with such filters.
    Type: Application
    Filed: April 28, 2014
    Publication date: October 30, 2014
    Applicant: Verint Systems Ltd.
    Inventors: Yuval Altman, Assaf Yosef Keren
  • Publication number: 20140201361
    Abstract: Methods and systems for identifying network users who communicate with the network (e.g., the Internet) via a given network connection. The disclosed techniques analyze traffic that flows in the network to determine, for example, whether the given network connection serves a single individual or multiple individuals, a single computer or multiple computers. A Profiling System (PS) acquires copies of data traffic that flow through network connections that connect computers to the WAN. The PS analyzes the acquired data, attempting to identify individuals who login to servers.
    Type: Application
    Filed: March 3, 2014
    Publication date: July 17, 2014
    Inventor: Yuval Altman
  • Patent number: 8767551
    Abstract: Methods and systems for managing the actions that are applied to packet flows by packet processing systems. A packet processing system maintains a flow table, i.e., a list of active flows and respective actions to be applied to the flows. The system classifies each incoming packet into a respective flow, and processes the packet in accordance with the action that is specified for this flow in the flow table. Typically, the system deletes a packet flow from the flow table when it becomes inactive, e.g., when no packets belonging to the flow arrive within a certain time-out period.
    Type: Grant
    Filed: January 25, 2012
    Date of Patent: July 1, 2014
    Assignee: Verint Systems, Ltd.
    Inventors: Eithan Goldfarb, Yuval Altman, Naomi Frid, Gur Yaari
  • Publication number: 20140165198
    Abstract: Methods and systems for malware detection techniques, which detect malware by identifying the Command and Control (C&C) communication between the malware and the remote host, and distinguish between communication transactions that carry C&C communication and transactions of innocent traffic. The fine-granularity features are examined, which are present in the transactions and are indicative of whether the transactions are exchanged with malware. A feature comprises an aggregated statistical property of one or more features of the transactions, such as average, sum median or variance, or of any suitable function or transformation of the features.
    Type: Application
    Filed: October 23, 2013
    Publication date: June 12, 2014
    Applicant: Verint Systems Ltd.
    Inventor: Yuval Altman
  • Patent number: 8665728
    Abstract: Methods and systems for identifying network users who communicate with the network (e.g., the Internet) via a given network connection. The disclosed techniques analyze traffic that flows in the network to determine, for example, whether the given network connection serves a single individual or multiple individuals, a single computer or multiple computers. A Profiling System (PS) acquires copies of data traffic that flow through network connections that connect computers to the WAN. The PS analyzes the acquired data, attempting to identify individuals who login to servers.
    Type: Grant
    Filed: October 27, 2011
    Date of Patent: March 4, 2014
    Assignee: Verint Systems, Ltd.
    Inventor: Yuval Altman
  • Publication number: 20120290829
    Abstract: Inspection of encrypted network traffic where multiple network connections are monitored that carry encrypted data, but only a subset of the network connections are decrypted and inspected. Typically, only network connections that are associated with designated target users whose encrypted data is to be inspected are decrypted. A Network Monitor Center (NMC) dynamically establishes a list of rules for selection of encrypted data connections. The rules are provided to a Secure data Inspection Appliance (SIA) that accepts some or all of the network user encrypted traffic and checks it against a rule table. When detecting an encrypted connection that matches the rule table, the SIA decrypts the connection and provides a copy of the connection plain data to the NMC. The NMC then inspects the plain data for security threats. Once a security threat is found in a connection, the NMC applies predefined consequent actions to this connection.
    Type: Application
    Filed: April 13, 2012
    Publication date: November 15, 2012
    Applicant: VERINT SYSTEMS LTD.
    Inventor: Yuval Altman
  • Publication number: 20120215909
    Abstract: Methods and systems for analyzing flows of communication packets. A front-end processor associates input packets with flows and forwards each flow to the appropriate unit, typically by querying a flow table that holds a respective classification for each active flow. In general, flows that are not yet classified are forwarded to the classification unit, and the resulting classification is entered in the flow table. Flows that are classified as requested for further analysis are forwarded to an appropriate flow analysis unit. Flows that are classified as not requested for analysis are not subjected to further processing, e.g., discarded or allowed to pass.
    Type: Application
    Filed: January 25, 2012
    Publication date: August 23, 2012
    Applicant: VERINT SYSTEMS LTD.
    Inventors: Eithan Goldfarb, Yuval Altman, Naomi Frid, Gur Yaari
  • Publication number: 20120213074
    Abstract: Methods and systems for managing the actions that are applied to packet flows by packet processing systems. A packet processing system maintains a flow table, i.e., a list of active flows and respective actions to be applied to the flows. The system classifies each incoming packet into a respective flow, and processes the packet in accordance with the action that is specified for this flow in the flow table. Typically, the system deletes a packet flow from the flow table when it becomes inactive, e.g., when no packets belonging to the flow arrive within a certain time-out period.
    Type: Application
    Filed: January 25, 2012
    Publication date: August 23, 2012
    Applicant: VERINT SYSTEMS LTD.
    Inventors: Eithan Goldfarb, Yuval Altman, Naomi Frid, Gur Yaari
  • Publication number: 20120106378
    Abstract: Methods and systems for identifying network users who communicate with the network (e.g., the Internet) via a given network connection. The disclosed techniques analyze traffic that flows in the network to determine, for example, whether the given network connection serves a single individual or multiple individuals, a single computer or multiple computers. A Profiling System (PS) acquires copies of data traffic that flow through network connections that connect computers to the WAN. The PS analyzes the acquired data, attempting to identify individuals who login to servers.
    Type: Application
    Filed: October 27, 2011
    Publication date: May 3, 2012
    Applicant: VERINT SYSTEMS LTD.
    Inventor: Yuval Altman
  • Publication number: 20100313267
    Abstract: Methods and systems related to keyword searching processes. A list of keywords may be first represented by a set of short substrings. The substrings are selected such that an occurrence of a substring indicates a possible occurrence of one or more of the keywords. Input data may be initially pre-processed, so as to identify locations in the input data in which the substrings occur. Then, the identified locations are searched for occurrences of the actual keywords. The pre-processing scheme enables the keyword search process to search only in the identified locations of the substrings instead of over the entire input data.
    Type: Application
    Filed: June 3, 2010
    Publication date: December 9, 2010
    Applicant: VERINT SYSTEMS LTD.
    Inventors: Eithan Goldfarb, Yuval Altman, Itsik Horovitz, Gur Yaari
  • Patent number: 7836171
    Abstract: A method for monitoring communication includes intercepting one or more communication links, which are part of a communication system that includes a plurality of the communication links. Data content that is carried by the one or more communication links is decoded. First and second mathematical fingerprints related to the one or more intercepted communication links are computed by evaluating statistical characteristics of the data content decoded from the one or more communication links. The first and second fingerprints are compared to produce a matching result, and a predefined action is performed with respect to the one or more communication links responsively to the matching result.
    Type: Grant
    Filed: March 27, 2007
    Date of Patent: November 16, 2010
    Assignee: Verint Americas Inc.
    Inventor: Yuval Altman
  • Publication number: 20080239976
    Abstract: A method for monitoring communication includes intercepting one or more communication links, which are part of a communication system that includes a plurality of the communication links. Data content that is carried by the one or more communication links is decoded. First and second mathematical fingerprints related to the one or more intercepted communication links are computed by evaluating statistical characteristics of the data content decoded from the one or more communication links. The first and second fingerprints are compared to produce a matching result, and a predefined action is performed with respect to the one or more communication links responsively to the matching result.
    Type: Application
    Filed: March 27, 2007
    Publication date: October 2, 2008
    Inventor: Yuval Altman