322 patents
Page 4 of 17
Utility
Deep Learning Pipeline to Detect Malicious Command and Control Traffic
20 Jul 23
Detection of command and control malware is disclosed.
Ajaya Neupane, Yuwen Dai, Stefan Achleitner, Yu Fu, Shengming Xu
Filed: 18 Jan 22
Utility
Iot Device Identification by Machine Learning with Time Series Behavioral and Statistical Features
20 Jul 23
Identifying Internet of Things (IoT) devices with packet flow behavior including by using machine learning models is disclosed.
Ke Tian, Yilin Zhao, Xiaoyi Duan, Jun Du
Filed: 18 Jan 22
Utility
Multi-perspective Security Context Per Actor
20 Jul 23
A flexible security system has been created that allows for fluid security operations that adapt to the dynamic nature of user behavior while also allowing the security related operations themselves to be dynamic.
Jeffrey James Fitz-Gerald, JR., Ashwath Sreenivasa Murthy
Filed: 24 Mar 23
Utility
Network Adaptive Alert Prioritization System
13 Jul 23
A method, including receiving, from multiple sources, respective sets of incidents, and respective suspiciousness labels for the incidents.
Yinnon Meshi, Rony Brailovsky, Jonathan Allon, Asaf Dahan, Gal Itzhak, Niv Sela
Filed: 10 Jan 22
Utility
Auto Generating Build Time Policies from Run Time Policies for Shift Left Security
6 Jul 23
Comprehensive matching allows for automated conversion from runtime policy rules to build time rules that can be applied to an IaC configuration file(s).
Krishnan Shankar Narayan, Shrikumar Narayan Chari
Filed: 31 Dec 21
Utility
Data Driven Customer Churn Analytics
29 Jun 23
A customer analytics ecosystem has been created that identifies factors in customer/account data that have correlations with customer churn based on statistical analysis, uses those factors to then predict likelihood of customer churn for customers, and generates recommendations to retain those customers identified as likely to attrite.
Guangyu Zhu, Julian Levart Aronowitz, Tomena Lionel Some, Venugopal Malyala
Filed: 27 Dec 21
Utility
Enhanced Identification of Sources of Delays In Packet Delivery along a Path
29 Jun 23
An initial test is executed to determine an end-to-end latency of a path between a source and a destination.
John Edward Bothe, Hristos Siakou
Filed: 28 Dec 21
Utility
Outbound/inbound Lateral Traffic Punting Based on Process Risk
29 Jun 23
Techniques for outbound/inbound lateral traffic punting based upon process risk are disclosed.
Ho Yu Lam, Robert Earle Ashley, Paul Theodore Mathison, Qiuming Li, Taylor Ettema
Filed: 23 Feb 23
Utility
Enhanced Cloud Infrastructure Security Through Runtime Visibility into Deployed Software
25 May 23
A system retrieves from cloud storage a packet(s) sampled from network traffic detected for software deployed on a cloud instance within a cloud environment.
Krishnan Shankar Narayan, Yonghui Cheng
Filed: 23 Nov 21
Utility
Network Slice-based Security In Mobile Networks
25 May 23
Techniques for providing network slice-based security in mobile networks (e.g., service provider networks for mobile subscribers) are disclosed.
Sachin Verma, Leonid Burakovsky
Filed: 12 Jan 23
Utility
Feedback Filtering of Time-series Metric Data
11 May 23
A cloud monitoring system is disclosed herein that uses a filtering paradigm after metric data aggregation and before storing in a repository that allows querying the metric data to significantly reduce the raw data stored into the repository.
Philip Simon Tuffs
Filed: 5 Nov 21
Utility
Malicious JS Detection Based on Automated User Interaction Emulation
4 May 23
Detection of malicious JavaScript based on automated user interaction emulation is disclosed.
Jin Chen, Tao Yan, Taojie Wang, Bo Qu
Filed: 2 Nov 21
Utility
Dynamically Scalable Application Firewall Deployment for Cloud Native Applications
27 Apr 23
A configuration of a cloud application exposed via a public IP address is duplicated with modifications to include a private IP address to expose the application internally.
Liron Levin, Isaac Schnitzer, Elad Shuster, Ory Segal
Filed: 27 Dec 22
Utility
Iot Device Identification with Packet Flow Behavior Machine Learning Model
27 Apr 23
Identifying Internet of Things (IoT) devices with packet flow behavior including by using machine learning models is disclosed.
Jialiang Zhang, Ke Tian, Fan Zhang
Filed: 17 Nov 22
Utility
Inline Identify and Block Dangling DNS Records
27 Apr 23
The present application discloses a method, system, and computer system for identifying dangling records.
Daiping Liu, Ruian Duan, Jun Wang
Filed: 26 Oct 21
Utility
Predictive DNS Cache to Improve Security and Performance
27 Apr 23
The present application discloses a method, system, and computer system for predicting responses to DNS queries.
Daiping Liu, Jun Wang, Wei Xu
Filed: 26 Oct 21
Utility
Managing Proxy Throughput Between Paired Transport Layer Connections
27 Apr 23
A proxy server can be configured to manage flow between terminated transport layer connections despite incongruous network conditions.
Yu Zhang, Harshavardhan Parandekar, Nazanin Magharei
Filed: 22 Oct 21
Utility
User entity normalization and association
20 Apr 23
Methods, apparatuses and computer program products implement embodiments of the present invention that include protecting a computer system by identifying multiple user identifiers associated with a single uses entity.
Netanel Rimer, Aviad Meyer, Yaron Neuman, Jonathan Allon
Filed: 20 Oct 21
Utility
Remote Attack Surface Discovery and Management
20 Apr 23
Techniques for identifying and managing an organization's remote attack surface that account for the fluid nature of the remote attack surface are described.
Matthew Stephen Kraning, Corey James Fredericks, Andrew Clayton Scott, Peter Thomas Dickinson
Filed: 21 Jul 22
Utility
Temporal Drift Detection
20 Apr 23
The present application discloses a method, system, and computer system for determining whether to train a machine learning model.
Nandini Ramanan, Claudionor Jose Nunes Coelho Junior
Filed: 21 Jan 22