Intrusion Detection Patents (Class 726/23)
-
Patent number: 11558747Abstract: The disclosed technology includes a method and system for preventing or reducing cyber-attacks in telecommunications networks, such as 5G networks. For example, a first node in a 5G network can detect that a first connected device is at risk of a cyber-attack based on one or more conditions and can broadcast to a plurality of nodes in the RAN that the first connected device is at risk of the cyber-attack. The first node can receive a first message from a second node of the plurality of nodes confirming or acknowledging that the first connected device is at risk of the cyber-attack. In response to receiving the first message from the second node confirming or acknowledging that the first connected device is at risk of the cyber-attack, the system can deauthorize the first connected device.Type: GrantFiled: June 22, 2021Date of Patent: January 17, 2023Assignee: T-Mobile USA, Inc.Inventors: Venson Shaw, Sunil Lingayat
-
Patent number: 11556637Abstract: A system for detecting security threats in a computing device receives a first set of signals from components of the computing device. The first set of signals includes intercommunication electrical signals between the components of the computing device and electromagnetic radiation signals propagated from the components of the computing device. The system extracts baseline features from the first set of signals. The baseline features represent a unique electrical signature of the computing device. The system extracts test features from a second set of signals received from the component of the system. The system determines whether there is a deviation between the test features and baseline features. If the system detects the deviation, the system determines that the computing device is associated with a particular anomaly that makes the computing device vulnerable to unauthorized access.Type: GrantFiled: April 5, 2021Date of Patent: January 17, 2023Assignee: Bank of America CorporationInventor: Shailendra Singh
-
Patent number: 11558266Abstract: A method and system are provided for monitoring a protected network. The method includes, in a scoring phase, receiving a learned model having clusters of learning requests of learning network traffic observed during non-strain operation of the protected network, wherein each cluster has an associated characteristic learning response time. The method further includes receiving a score request to score a network service request of the network traffic, classifying the network service request with one of the clusters by comparing fields of the network service request to fields used for clustering the learning requests with the cluster, calculating a score based on the characteristic learning response times generated for the learned cluster to which the network service request is classified, and adjusting supportive handling of the network service request based on the score.Type: GrantFiled: December 17, 2019Date of Patent: January 17, 2023Assignee: Arbor Networks, Inc.Inventor: Sean O'Hara
-
Patent number: 11556664Abstract: A threat management facility stores a number of entity models that characterize reportable events from one or more entities. A stream of events from compute instances within an enterprise network can then be analyzed using these entity models to detect behavior that is inconsistent or anomalous for one or more of the entities that are currently active within the enterprise network.Type: GrantFiled: April 12, 2019Date of Patent: January 17, 2023Assignee: Sophos LimitedInventors: Joseph H. Levy, Andrew J. Thomas, Daniel Salvatore Schiappa, Kenneth D. Ray
-
Patent number: 11558376Abstract: There may be provided a method that includes receiving or generating a first plurality (N) points within a first multi-dimensional space that has M dimensions; M being a positive integer that is smaller than N; wherein the N points represent one or more behaviors of the one or more IOT devices; wherein a clustering of the N points within the first multi-dimensional space results in at least some clusters that are inseparable from each other; generating a representation of the N points within a second multi-dimensional space that has at least N dimensions; wherein a clustering of the N points within the second multi-dimensional space results in clusters that are separable from each other; calculating projections of the N points on a sub-space that has a second plurality (Q) of dimensions; wherein Q is a function of a relationship between a number (K) of clusters and an allowed error (?); computing a core-set that comprises a weighted subset of the projections; clustering the projections of the weighted subsetType: GrantFiled: October 1, 2020Date of Patent: January 17, 2023Assignee: SHIELDIOT LTDInventors: Ohad Levin, Dan Feldman
-
Patent number: 11558402Abstract: Techniques for providing network traffic security in a virtualized environment are described. A threat aware controller uses a threat feed provided by a threat intelligence service to establish a threat detection engine on virtual switches. The threat aware controller and threat detection engine work together to detect any anomalous or malicious behavior of network traffic on the virtual switch and established virtual network functions to quickly detect, verify, and isolate network threats.Type: GrantFiled: October 28, 2019Date of Patent: January 17, 2023Assignee: Cisco Technology, Inc.Inventors: Balaji Sundararajan, Alberto Rodriguez Natal, Yegappan Lakshmanan, Fabio R. Maino, Anand Oswal
-
Patent number: 11558421Abstract: Systems, methods, and media are used to identify phishing attacks. A notification of a phishing attempt with a parameter associated with a recipient of the phishing attempt is received at a security management node. In response, an indication of the phishing attempt is presented in a phishing attempt search interface. The phishing attempt search interface may be used to search for additional recipients, identify which recipients have been successfully targeted, and provide a summary of the recipients. Using this information, appropriate security measures in response to the phishing attempt for the recipients may be performed.Type: GrantFiled: August 9, 2021Date of Patent: January 17, 2023Assignee: ServiceNow, Inc.Inventors: Deepakeswaran Sundaragopal Kolingivadi, Amit Sharma, Santosh Reddy Poreddy, Sachin Shivarama Nayak
-
Patent number: 11556638Abstract: A system and method for generating event-specific handling instructions for accelerating a threat mitigation of a cybersecurity event includes identifying a cybersecurity event; generating a cybersecurity event digest based on the cybersecurity event, computing a cybersecurity hashing-based signature of the cybersecurity event based on the cybersecurity event digest; searching, based on the distinct cybersecurity hashing-based signature of the cybersecurity event, an n-dimensional space comprising a plurality of historical cybersecurity event hashing-based signatures; returning one or more historical cybersecurity events or historical cybersecurity alerts homogeneous to the cybersecurity event based on the search; deriving one or more cybersecurity event-specific handling actions for the cybersecurity event based on identifying a threat handling action corresponding to each of the one or more historical cybersecurity events or historical cybersecurity alerts homogeneous to the cybersecurity event; and executiType: GrantFiled: June 27, 2022Date of Patent: January 17, 2023Assignee: Expel, Inc.Inventors: Peter Silberman, Dan Whalen, Matt Berninger, Paul Diebold, Ben Kawecki
-
Patent number: 11558416Abstract: A communication brokering device receives, from a first device, a measurement of at least one of a bit-error-rate (BER) or a signal-to-noise ratio (SNR) associated with receipt of a transmission at the first device. The communication brokering device determines whether the first device is vulnerable to message interception or eavesdropping based on the measurement of the at least one of the BER or the SNR. The communication brokering device controls communications between at least one second device and the first device based on the determination of whether the first device is vulnerable to message interception or eavesdropping.Type: GrantFiled: May 6, 2021Date of Patent: January 17, 2023Assignee: Verizon Patent and Licensing Inc.Inventor: Shukri Wakid
-
Patent number: 11558409Abstract: Provided is a process that includes: obtaining with a distributed application comprising an identity management system, a first password; comparing with the distributed application, the first password to a set of compromised credentials within a database external to the network-accessible resource; receiving one or more passwords that match the first password based on the comparison; determining with the distributed application whether the one or more passwords satisfy a criterion; and in response to the determination that the one or more passwords satisfy the criterion, causing the first user associated with a first account and the first password to be notified that the first password has been compromised.Type: GrantFiled: October 29, 2019Date of Patent: January 17, 2023Assignee: SpyCloud, Inc.Inventors: David Endler, Alen Puzic, Edward Ross
-
Patent number: 11552993Abstract: A method of collecting training data related to a branded phishing URL may comprise retrieving a phishing URL impersonating a brand; fetching a final webpage referenced thereby; determining the main language of the textual content thereof; rendering graphical representation(s) of the final webpage; extracting, from the source of URLs, information including the retrieved phishing URL, a brand, a type and a date associated therewith and storing the extracted information together with the final webpage and the rendered graphical representation(s). A message that contains a URL matching the phishing URL may then be retrieved. The main language of the textual content of the message may be determined and graphical representations thereof rendered. A record may be updated with the message, the main language and the rendered graphical representations, which may be made accessible as training data to train users to recognize phishing websites and messages.Type: GrantFiled: October 18, 2021Date of Patent: January 10, 2023Assignee: VADE USA, INCORPORATEDInventors: Adrien Gendre, Olivier Lemarié, Sébastien Goutal
-
Patent number: 11552977Abstract: A computer implemented method of identifying anomalous behavior of a computer system in a set of intercommunicating computer systems, each computer system in the set being uniquely identifiable, the method including monitoring communication between computer systems in the set for a predetermined baseline time period to generate a baseline vector representation of each of the systems; monitoring communication between computer systems in the set for a subsequent predetermined time period to generate a subsequent vector representation of each of the systems; comparing baseline and subsequent vector representations corresponding to a target computer system using a vector similarity function to identify anomalous behavior of the target system in the subsequent time period compared to the baseline time period, wherein a vector representation of the target system for a time period is generated based on a deterministic walk of a graph representation of communications between the computer systems in which nodes of theType: GrantFiled: January 9, 2020Date of Patent: January 10, 2023Assignee: British Telecommunications Public Limited CompanyInventor: Michael Gibson
-
Patent number: 11552929Abstract: Systems and methods for improving the catch rate of attacks/malware by a cooperating group of network security devices are provided. According to one embodiment, a security management device configured in a protected network, maintains multiple dynamic IP address lists including an NGFW deep detection list, a DDoS deep detection list, a NGFW block list and a DDoS block list. The security management device, continuously updates the lists based on updates provided by a cooperating group of network security devices based on network traffic observed by the network security devices. In response to receipt of a request from a NGFW device or a DDoS mitigation device associated with the protected network, the security management device provides the requestor with the requested dynamic IP address lists for use in connection with processing network traffic by the requestor.Type: GrantFiled: June 10, 2019Date of Patent: January 10, 2023Assignee: Fortinet, Inc.Inventor: Aldo Di Mattia
-
Patent number: 11552980Abstract: Systems and methods are provided for determining whether or not users of a communication network are implementing Multi-Factor Authentication (MFA) when authenticating with an entity's business tools, applications, and cloud services. This information can be used as component in the calculation of a risk score that can help quantify and assess the risk posture of the entity. In some embodiments, network traffic flow metadata may be used to anonymously identify user data to assess the entity's use of MFA in determining enterprise risk that may not rely on questionnaires, surveys, manual data entry, and/or interviews. Embodiments of the application can produce a real-time analysis of the security risk of the system.Type: GrantFiled: June 17, 2020Date of Patent: January 10, 2023Assignee: CyberLucent Inc.Inventor: Michael Trentini
-
Patent number: 11552967Abstract: Systems and methods for performing graph-based analysis of computing system threats and incidents, and determining response and/or mitigation actions for the threats and incidents, are described. In some embodiments, the systems and methods generate node graphs of computing system threat artifacts, and perform actions to identify recommended resolutions to the threats, based on information derived from the generated node graphs.Type: GrantFiled: December 22, 2020Date of Patent: January 10, 2023Assignee: McAfee, LLCInventors: Elisabeth Maida, Roselle Safran
-
Patent number: 11551137Abstract: Machine learning adversarial campaign mitigation on a computing device. The method may include deploying an original machine learning model in a model environment associated with a client device; deploying a classification monitor in the model environment to monitor classification decision outputs in the machine learning model; detecting, by the classification monitor, a campaign of adversarial classification decision outputs in the machine learning model; applying a transformation function to the machine learning model in the model environment to transform the adversarial classification decision outputs to thwart the campaign of adversarial classification decision outputs; determining a malicious attack on the client device based in part on detecting the campaign of adversarial classification decision outputs; and implementing a security action to protect the computing device against the malicious attack.Type: GrantFiled: April 30, 2019Date of Patent: January 10, 2023Assignee: CA, Inc.Inventors: Javier Echauz, Andrew B. Gardner, John Keith Kenemer, Jasjeet Dhaliwal, Saurabh Shintre
-
Patent number: 11546767Abstract: A method performed by a system includes instantiating a vulnerability-risk-threat (VRT) service for a security edge protection proxy (SEPP) element of a 5G telecommunications network. The system intercepts and parameterizes network traffic of the SEPP element to identify network functions (NFs) or associated services that requires cybersecurity protection and selects security resources for protecting the identified NFs or associated services. The system prioritizes an NF or associated service that is most frequently used (MFU) or most recently used (MRU) and then allocates the security resources in accordance with the prioritization.Type: GrantFiled: January 21, 2021Date of Patent: January 3, 2023Assignee: T-Mobile USA, Inc.Inventors: Venson Shaw, Gaviphat Lekutai
-
Patent number: 11546356Abstract: The present invention discloses a technique for extending threat information and/or generating new threat information by analyzing packet headers flowing through a network using threat information obtained by analyzing malware behavior or the like.Type: GrantFiled: February 8, 2019Date of Patent: January 3, 2023Assignee: Nippon Telegraph and Telephone CorporationInventor: Yuichi Nakatani
-
Patent number: 11546371Abstract: Disclosed are systems and methods for countering a cyber-attack on computing devices by means of which users are interacting with services, which store personal data on the users. Data is collected about the services with which the users are interacting by means of the devices, as well as data about the devices themselves. The collected data is analyzed to detect when a cyber-attack on the devices is occurring as a result of a data breach of personal data on users from the online service. A cluster of the computing devices of different users of the online service experiencing the same cyber attack is identified. Attack vectors are identified based on the characteristics of the cyber attack experienced by the computing devices in the cluster. Actions are selected for countering the cyber-attack based on the identified attack vector and are sent to the devices of all users of the corresponding cluster.Type: GrantFiled: December 22, 2020Date of Patent: January 3, 2023Assignee: AO Kaspersky LabInventors: Vladislav V. Martynenko, Alexey M. Romanenko
-
Patent number: 11546373Abstract: Cryptocurrency based malware and ransomware detection systems and methods are disclosed herein. An example method includes analyzing a plurality of malware or ransomware attacks to determine cryptocurrency payment address of malware or ransomware attacks, building a malware or ransomware attack database with the cryptocurrency payment addresses of the plurality of malware or ransomware attacks, identifying a proposed cryptocurrency transaction that includes an address that is included in the malware or ransomware attack database, and denying the proposed cryptocurrency transaction.Type: GrantFiled: November 15, 2019Date of Patent: January 3, 2023Assignee: CipherTrace, Inc.Inventors: David Jevans, Rudi Cilibrasi
-
Patent number: 11544070Abstract: The present disclosure is directed to systems and methods for mitigating or eliminating the effectiveness of a side-channel based attack, such as one or more classes of an attack commonly known as Spectre. Novel instruction prefixes, and in certain embodiments one or more corresponding instruction prefix parameters, may be provided to enforce a serialized order of execution for particular instructions without serializing an entire instruction flow, thereby improving performance and mitigation reliability over existing solutions. In addition, improved mitigation of such attacks is provided by randomizing both the execution branch history as well as the source address of each vulnerable indirect branch, thereby eliminating the conditions required for such attacks.Type: GrantFiled: July 28, 2021Date of Patent: January 3, 2023Assignee: Intel CorporationInventors: Rodrigo Branco, Kekai Hu, Ke Sun, Henrique Kawakami
-
Patent number: 11544378Abstract: The present invention relates to a method for access control of a multimedia system to a secure operating system and a mobile terminal for implementing the method. The method includes the steps of: initiating an application access request for selecting a trusted application from a client application of a multimedia system to a secure operating system; making a decision as to whether the client application is a malicious application, and if not, proceeding to a next step, if yes, returning Selection Failure to the client application and performing an interrupt handling; sending the application access request from the multimedia system to the secure system; and acquiring, at the secure operating system, the trusted application based on the application access request and returning the trusted application to the multimedia system.Type: GrantFiled: March 28, 2017Date of Patent: January 3, 2023Assignee: CHINA UNIONPAY CO., LTD.Inventors: Chengqian Chen, Yu Zhou, Wei Guo
-
Patent number: 11546328Abstract: A device is authenticated for communication over a network based on a sensor data signature and a traffic pattern signature. The sensor data signature and the traffic pattern signature identify the device. A determination is made whether the sensor data signature corresponds to one of a plurality of recognized sensor data signatures. A determination is also made whether the traffic pattern signature of the device corresponds to one of a plurality of recognized traffic pattern signatures. The device is authenticated for communication over the network responsive to determining that the sensor data signature corresponds to one of the plurality of recognized sensor data signatures and the traffic pattern signature corresponds to one of the plurality of recognized traffic pattern signatures.Type: GrantFiled: January 24, 2019Date of Patent: January 3, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Rafael Anton Eichelberger, Carlos Gomez Gallego, Sebastien Tandel, Juliano Cardoso Vacaro
-
Patent number: 11544390Abstract: A mechanism for probabilistically determining the contents of an encrypted file is provided, such that a transfer of the encrypted file can be restricted according to rules associated with an unencrypted version of the file. Embodiments generate a file size table of a subset of files, where each entry of the file size table includes a size information regarding the unencrypted file. Embodiments compare the size of the encrypted file against the file sizes and compressed file size ranges to determine whether the encrypted file has a match. If the size of the encrypted file has a single match in the table, then there is a high probability that the file associated with the matching entry is the unencrypted version of the encrypted file. Rules associated with restricting access of the file related to the matching entry can be used to control transfer of the encrypted file.Type: GrantFiled: May 5, 2020Date of Patent: January 3, 2023Assignee: Forcepoint LLCInventor: Benjamin Shih
-
Patent number: 11538037Abstract: A device receives first transaction information associated with a first transaction, and a first transaction account utilized for the first transaction and associated with a first financial institution. The device determines, based on a fraud model, that the first transaction is to be denied due to potential fraud associated with the first transaction account and receives second transaction information associated with a second transaction, and a second transaction account utilized for the second transaction and associated with a second financial institution. The device processes the first transaction information and the second transaction information, with a matching model, to determine whether the first transaction information matches the second transaction information and determines that the first transaction was incorrectly denied when the first transaction information matches the second transaction information within a predetermined threshold.Type: GrantFiled: May 29, 2020Date of Patent: December 27, 2022Assignee: Capital One Services, LLCInventors: Colin Hart, Joshua Edwards, Francisco Perezleon, Molly Johnson, Kaitlin Newman, Angelina Wu, Jason Ji
-
Patent number: 11539722Abstract: Example methods and systems for a computer system to perform security threat detection are described. In one example, a computer system may intercept an egress packet from a virtualized computing instance to pause forwarding of the egress packet towards a destination and obtain process information associated a process from which the egress packet originates. The computer system may initiate security analysis based on the process information. In response to determination that the process is a potential security threat based on the security analysis, the egress packet may be dropped, and a remediation action performed. Otherwise, the egress packet may be forwarded towards the destination.Type: GrantFiled: July 14, 2020Date of Patent: December 27, 2022Assignee: VMWARE, INC.Inventors: Baibhav Singh, Jayant Jain
-
Patent number: 11539739Abstract: A system and method for protecting cloud-hosted applications against hypertext transfer protocol (HTTP) flood distributed denial-of-service (DDoS) attacks are provided. The method includes collecting telemetries from a plurality of sources deployed in at least one cloud computing platform hosting a protected cloud-hosted application; providing at least one rate-based feature and at least one rate-invariant feature based on the collected telemetries, wherein the rate-based feature and the rate-invariant feature demonstrate behavior of at least HTTP traffic directed to the protected cloud-hosted application; evaluating the at least one rate-based feature and the at least one rate-invariant feature to determine whether the behavior of the at least HTTP traffic indicates a potential HTTP flood DDoS attack; and causing execution of a mitigation action when an indication of a potential HTTP flood DDoS attack is determined.Type: GrantFiled: August 24, 2017Date of Patent: December 27, 2022Assignee: RADWARE, LTD.Inventors: Ehud Doron, Nir Ilani, David Aviv, Yotam Ben Ezra, Amit Bismut, Yuriy Arbitman
-
Patent number: 11539721Abstract: In one embodiment, a service receives traffic telemetry data regarding encrypted traffic sent by an endpoint device in a network. The service analyzes the traffic telemetry data to infer characteristics of an application on the endpoint device that generated the encrypted traffic. The service receives, from a monitoring agent on the endpoint device, application telemetry data regarding the application. The service determines that the application is evasive malware based on the characteristics of the application inferred from the traffic telemetry data and on the application telemetry data received from the monitoring agent on the endpoint device. The service initiates performance of a mitigation action in the network, after determining that the application on the endpoint device is evasive malware.Type: GrantFiled: June 25, 2020Date of Patent: December 27, 2022Assignee: Cisco Technology, Inc.Inventors: Blake Harrell Anderson, David McGrew, Vincent E. Parla, Jan Jusko, Martin Grill, Martin Vejman
-
Patent number: 11537871Abstract: A computer architecture may comprise a processor, a memory, and a differential memory subsystem (DMS). A learning engine is stored on the memory and configured to present data to an expert user, to receive user sensory input measuring reactions related to the presented data, and to create an attention map based thereon. The attention map is indicative of portions of the presented data on which the expert user focused. The learning engine is configured to annotate the attention map with the natural language input labels and to train a neural network based on the user sensory input. The learning engine is configured to create a model based on the trained neural network, to provide an application program for an output target; and to instruct the output target via the application program to detect and remedy anomalous activity. The DMS is physically separate and configured for experimental data processing functions.Type: GrantFiled: April 25, 2018Date of Patent: December 27, 2022Assignee: FUJITSU LIMITEDInventor: James Montantes
-
Patent number: 11531769Abstract: According to an embodiment, an information processing apparatus includes: a memory on which first/second processing applications are stored, the first processing application being a secure application; and a processor that is coupled to the memory and executes the first and second processing applications. The first processing application includes an issuance module, a first communication module, and a log verification module. The issuance module issues a command to call a function of the second processing application and links the command to a verification rule. The first communication module transmits, to the second processing application, a command execution request including command identification information that identifies the command, and receives, from the second processing application, an execution log including an execution result of the command identified by the command identification information.Type: GrantFiled: August 29, 2019Date of Patent: December 20, 2022Assignee: Kabushiki Kaisha ToshibaInventors: Jun Kanai, Shinya Takumi, Yoshikazu Hanatani
-
Patent number: 11533388Abstract: A device and a method for analyzing service-oriented communication in a communications network. A data packet includes a first header of an application layer for service-oriented communication, and a second header of a presentation layer, a session layer, a transport layer, a network layer, a data link layer, or a physical layer. The data packet is analyzed based on information concerning a sender and/or receiver of the data packet from the first header and as a function of information concerning a sender and/or receiver from the second header, for whether or not the data packet meets a criterion, the criterion defining a setpoint value for the sender and/or receiver in the first header as a function of the content of the second header, and/or the criterion defining a setpoint value for the sender and/or receiver in the second header as a function of the content of the first header.Type: GrantFiled: July 1, 2020Date of Patent: December 20, 2022Assignee: Robert Bosch GmbHInventors: Andreas Weber, Janin Wolfinger, Jens Gramm, Michael Herrmann
-
Patent number: 11531753Abstract: Techniques for preventing ransomware from encrypting files on a target machine are disclosed. In some embodiments, a system/process/computer program product for preventing ransomware from encrypting files on a target machine includes monitoring file system activities on a computing device; detecting an unauthorized activity associated with a honeypot file or honeypot folder; and performing an action based on a policy in response to the unauthorized activity associated with the honeypot file or honeypot folder.Type: GrantFiled: April 12, 2021Date of Patent: December 20, 2022Assignee: Palo Alto Networks, Inc.Inventors: Eldar Aharoni, Vadim Goldstein, Mashav Sapir, Jenny Kitaichik
-
Patent number: 11531764Abstract: A computer-implemented method for checking the integrity of a target computer program to be executed in a computer system.Type: GrantFiled: April 2, 2020Date of Patent: December 20, 2022Assignee: Fossid ABInventor: Johan Larsson
-
System and methods for iterative synthetic data generation and refinement of machine learning models
Patent number: 11531883Abstract: Embodiments of the present invention provide an improvement to convention machine model training techniques by providing an innovative system, method and computer program product for the generation of synthetic data using an iterative process that incorporates multiple machine learning models and neural network approaches. A collaborative system for receiving data and continuously analyzing the data to determine emerging patterns is provided. Common characteristics of data from the identified emerging patterns are broadened in scope and used to generate a synthetic data set using a generative neural network approach. The resulting synthetic data set is narrowed based on analysis of the synthetic data as compared to the detected emerging patterns, and can then be used to further train one or more machine learning models for further pattern detection.Type: GrantFiled: August 12, 2019Date of Patent: December 20, 2022Assignee: BANK OF AMERICA CORPORATIONInventor: Eren Kursun -
Patent number: 11533293Abstract: Domains and IPs are scored using domain resolution data to identify malicious domains and IPs. A domain and IP resolution graph for a set of domains and IPs in a system. A seed set of known malicious domains and known malicious IPs is selected from a malicious domain and malicious IP database. A graphical probabilistic propagation inference from the domain and IP resolution graph and the seed set of known malicious domains and known malicious IPs is generated. A malicious score is calculated for each domain in the set of domains and each IP in the set of IPs, and the malicious domain and malicious IP database is updated.Type: GrantFiled: February 14, 2020Date of Patent: December 20, 2022Assignee: AT&T Intellectual Property I, L.P.Inventors: Swapna Buccapatnam Tirumala, Fei Wu, Carolyn Roche Johnson
-
Patent number: 11526608Abstract: Methods and systems for determining an affiliation of a given software with target software are provided. The method comprises: receiving a software source code of the given software; executing the software source code in an isolated program environment to identify at least one outgoing request of the given software, the at least one outgoing request being indicative of at least one respective function of the software source code; generating, based on the at least one outgoing request, a respective function identifier associated with the at least one respective function; applying at least one classifier to the respective function identifier to determine a likelihood parameter indicative of the given software being affiliated to a respective target software; in response to the likelihood parameter being equal to or greater than a predetermined likelihood parameter threshold: identifying the given software as being affiliated to the respective target software.Type: GrantFiled: October 22, 2020Date of Patent: December 13, 2022Assignee: GROUP IB TDS, LTDInventors: Pavel Vladimirovich Slipenchuk, Ilia Sergeevich Pomerantsev
-
Patent number: 11526530Abstract: Provide is a visualization system that enables generation of a “dashboard” of individual visualizations. In further embodiments, the system enables users to quickly and easily generate these visualizations and integrate complex filters, queries, aggregations, etc., with simple UI input. The visualizations can be provided as a service that requests information from an underlying database. The database itself may also be hosted as a service, permitting granular and native database functions layered with the visualization architecture. The system can support additional functionality and access management to generate visualizations that can be shared with other users and/or integrated into websites, blogs, etc. The system can handle the complex logic, data interactions, dynamic data transformation, dynamic authorization, etc., needed to manage data rules (e.g., access rules layered over database permission based control, summarization/aggregation requirements, etc.Type: GrantFiled: June 8, 2020Date of Patent: December 13, 2022Assignee: MongoDB, Inc.Inventors: Tom Hollander, Eliot Horowitz, Thomas Rueckstiess
-
Patent number: 11522907Abstract: Apparatus and methods for mitigating network attacks, such as by dynamically re-routing traffic. Various disclosed embodiments manipulate path-based routing of the backbone network to insert a scrubbing appliance within the backbone network topology, rather than using traditional network addressed tunnels in the edge network. In one implementation, traffic entering the backbone network ingress peer routers (from either another backbone network, or an edge network) is normally destination-address routed via the backbone to its appropriate egress router based on a path label; however, when a Distributed Denial of Service (DDoS) attack is detected, the ingress peer router inserts an additional hop into the path label that redirects dirty traffic to a substantially centralized scrubbing appliance. The benefits of the disclosed solutions include, among other things, significantly reduced attack response/recovery times without significant capital outlays.Type: GrantFiled: July 1, 2019Date of Patent: December 6, 2022Assignee: TIME WARNER CABLE ENTERPRISES LLCInventors: Wesley George, Raymond Sliteris
-
Patent number: 11522887Abstract: A cyber-threat coordinator-component identifies devices and/or users that are in a breach state of a benchmark of parameters, utilized by AI models, that correspond to the normal pattern of life for the network. The cyber-threat coordinator-component sends an external communication to selected network devices in order to initiate actions with that network device in order to change a behavior of a detected threat of at least one a user and/or a device acting abnormal to the normal pattern of life on the network. The initiated actions are also targeted to minimize an impact on other network devices and users that are i) currently active in the network and ii) that are not in breach of being outside the normal behavior benchmark.Type: GrantFiled: February 19, 2019Date of Patent: December 6, 2022Assignee: Darktrace Holdings LimitedInventor: Matthew Dunn
-
Patent number: 11520883Abstract: Systems, methods, and computer-readable media for cybersecurity are disclosed. The systems and methods may involve receiving, by an application capable of JavaScript execution, code for execution; executing, before execution of the received code, an intercepting code, wherein the intercepting code is configured to intercept at least one application programming interface (API) invocation by the received code; intercepting, by the intercepting code, an API invocation by the received code; determining that the intercepted API invocation results in a manipulation of a backing store object; and modifying an execution of the intercepted API invocation, wherein the modified execution results in a nonpredictable environment state.Type: GrantFiled: January 13, 2022Date of Patent: December 6, 2022Assignee: Seraphic Algorithms Ltd.Inventor: Avihay Cohen
-
Patent number: 11522909Abstract: A method for preventing denial of service attacks which are distributed attacks is applied in a target service provider server, a platform server, and a botnet service provider server. The target service provider server determines a first SDN controller according to an attack protection request, and issues a first flow rule. The target service provider server directs data flow of a network equipment to a first cleaning center and controls the first cleaning center to identify the attacking or malicious element in the data flow according to the first flow rule. The platform server receives the attacking element in the data flow sent by the target service provider server, and regards the same as malicious traffic. The platform server generates an attack report, and sends the attack report to the botnet service provider server to notify the botnet service provider server to clean or filter out the malicious traffic.Type: GrantFiled: November 10, 2020Date of Patent: December 6, 2022Assignee: Nanning FuLian FuGui Precision Industrial Co., Ltd.Inventor: Cheng-Yen Tsai
-
Patent number: 11523293Abstract: A wireless network monitoring system is disclosed. In one general aspect, it includes a wireless network interface operative to access traffic on a wireless network that is connected to other devices and to a WAN access point, and capture logic responsive to the wireless network interface and operative to capture datagrams communicated between one or more of the other devices on the wireless network and the WAN access point. Inspection logic is responsive to the capture logic and operative to inspect the captured datagrams to detect conditions of concern related to the other devices on the wireless network, and conditional response logic is responsive to the inspection logic and operative to initiate actions in response to the detection of conditions of concern by the inspection logic.Type: GrantFiled: October 12, 2021Date of Patent: December 6, 2022Inventor: Levi Gundert
-
Hierarchical consensus protocol framework for implementing electronic transaction processing systems
Patent number: 11514448Abstract: The disclosed embodiments relate to implementation of an electronic framework, also referred to as a protocol or architecture, for electronically achieving, recording and implementing, via an electronic communications network, consensus among participants for the definition, implementation and operation of an electronic transaction processing system as a precursor to the operation of that transaction processing system in processing transactions according to the consensus among the participants. The disclosed consensus framework provides a system and protocol by which new electronic transaction processing systems may be developed and implemented among participants via an electronic negotiation and implementation of the operational rules therefore. The disclosed embodiments eliminate the need for out of band consensus negotiations and provide flexibility for participants to negotiate acceptable operational rules which can support complex transactional processes in an electronic environment.Type: GrantFiled: July 11, 2017Date of Patent: November 29, 2022Assignee: Chicago Mercantile Exchange Inc.Inventor: Stanislav Liberman -
Patent number: 11516669Abstract: The disclosure includes embodiments for an ego vehicle to detect misbehavior. According to some embodiments, a method includes receiving a V2X message from an attacker. The V2X message includes V2X data describing a location of an object at a target time. The method includes receiving a set of CPMs from a set of remote devices. The set of CPMs include remote sensor data describing a free space region within the roadway environment. The method includes determining a relevant subset of the CPMs include remote sensor data that is relevant to detecting misbehavior. The method includes determining, based at least in part on the remote sensor data of the relevant subset, that the object is not located at the location at the target time. The method includes detecting the misbehavior by the attacker based on the determination that the object is not located at the location at the target time.Type: GrantFiled: September 22, 2020Date of Patent: November 29, 2022Inventors: Takayuki Shimizu, John Kenney, Michael Clifford, Hongsheng Lu
-
Patent number: 11516237Abstract: Methods and systems for visualization of data associated with events detected on a monitored server host, and control of the host, are provided. A system may detect an incident on a remote server host. The system may present scores and activity graphs on a user interface for a human operator to review. The user interface may include animated activity graphs to show the progress of a past malicious event. The user interface may emphasize, de-emphasize, and/or hide subgraphs. The user interface may include quick-action buttons and wizards to permit users to immediately kill processes or isolate a computer from the network. The user interface may include controls to bulk-tag detected events associated with a subgraph. The user interface may present notifications/dashboards of significant malicious events in progress and update same when a new event rises in incident score into the top 10.Type: GrantFiled: July 30, 2020Date of Patent: November 29, 2022Assignee: CrowdStrike, Inc.Inventor: Alexander J. Graul
-
Patent number: 11513878Abstract: Aspects of the disclosure relate to the field of detecting a behavioral anomaly in an application. In one exemplary aspect, a method may comprise retrieving and identifying at least one key metric from historical usage information for an application on a computing device. The method may comprise generating a regression model configured to predict usage behavior associated with the application and generating a statistical model configured to identify outliers in the data associated with the at least one key metric. The method may comprise receiving usage information in real-time for the application. The method may comprise predicting, using the regression model, a usage pattern for the application indicating expected values of the at least one key metric. In response to determining that the usage information does not correspond to the predicted usage pattern and does not comprise a known outlier, the method may comprise detecting the behavioral anomaly.Type: GrantFiled: February 22, 2021Date of Patent: November 29, 2022Assignee: Acronis International GmbHInventors: Andrey Kulaga, Stanislav Protasov, Serguei Beloussov
-
Patent number: 11509691Abstract: There are provided systems and methods for protecting from directory enumeration using honeypot pages within a network directory. A service provider, such as an electronic transaction processor for digital transactions, may have an internal network that is utilized by employees, developers, and other end users within the organization of the service provider. When internal devices become compromised or internal users act maliciously, they may attempt to enumerate a directory to find hidden pages that have secret or sensitive data. The service provider may therefore detect a scan of an internal directory having files paths to files and pages and may deploy honeypot pages that change an error status. Further, the service provider may add a process or operation to log additional data on these honeypot pages and/or change a byte size of the corresponding pages to confuse the enumeration attempt and obtain true source information.Type: GrantFiled: May 15, 2020Date of Patent: November 22, 2022Assignee: PAYPAL, INC.Inventor: George Chen Kaidi
-
Patent number: 11507845Abstract: Implementations include processing a set of documents using an auto-encoder to provide a first sub-set of documents, the first sub-set of documents including electronic documents with a relatively high likelihood of providing true positives in an auditing process, processing a sub-set of documents using a set of auto-generated rules to provide a second sub-set of documents, the second sub-set of documents including electronic documents with a relatively high likelihood of providing false positives in an auditing process, and defining a master set of documents for the auditing process based on the sub-set of documents, the first sub-set of documents, and the second sub-set of documents, the master set of documents including at least a portion of the sub-set of documents, and at least a portion of the first sub-set of documents, and being absent the second sub-set of documents.Type: GrantFiled: December 7, 2018Date of Patent: November 22, 2022Assignee: Accenture Global Solutions LimitedInventors: Xin Zuo, Lijuan Zhou, Wei Qian, Benjamin Duffy
-
Patent number: 11509687Abstract: Techniques and systems for determining a malicious derivative entity within a network are provided herein. A method for determining a malicious derivative entity may include receiving, by a network-based authentication system, a plurality of network transactions. A first attribute of a network transaction within the plurality of network transactions may be identified. The method may also include identifying a plurality of entities for the first attribute. The network-based authentication system may generate a first visual representation of a relationship between the first attribute and the plurality of derivative entities. Each of the derivative entities and the first attribute may be represented as nodes within the first visual representation. A first score for each of the nodes may be determined based on a degree of centrality of the nodes within the first visual representation. One network transaction may be blocked based on at least one node exceeding a first threshold.Type: GrantFiled: July 14, 2020Date of Patent: November 22, 2022Assignee: The Western Union CompanyInventors: Noel Brandt, Robert Enzaldo, Charles Champion, Brent Lemieux
-
Patent number: 11507742Abstract: Methods and systems for parsing log records. A method involves receiving a log record including data regarding a network device's operation and providing the log record to a natural language processing model. The natural language processing model may analyze the log record to identify items in the log record and relationships between items in the log record.Type: GrantFiled: June 27, 2019Date of Patent: November 22, 2022Assignee: Rapid7, Inc.Inventor: Wah-Kwan Lin