64 patents
Page 4 of 4
Utility
CorrectedTechniques for Securely Detecting Compromises of Enterprise End Stations Utilizing Tunnel Tokens
29 Jan 20
A token tunnel server (TTS) within an enterprise network receives packets from a source address directed to a destination address (both of the enterprise network) that were caused to be originated by an attacker.
Amichai SHULMAN, Sagie DULCE, Daniella GOIHMAN-SHUSTER, Shahar BEN-HADOR
Filed: 19 Jun 16
Utility
Aggregating Alerts of Malicious Events for Computer Security
4 Dec 19
A method of processing malicious events in a network infrastructure determines features of malicious events detected by a firewall of an attack analyzer.
Gilad Yehudai, Itsik Mantin, Lior Fisch, Shelly Hershkovitz, Amichai Shulman, Moran Rachel Ambar
Filed: 4 Jun 18
Utility
Coordinated Detection and Differentiation of Denial of Service Attacks
13 Nov 19
An analyzer module (AM) within a same protected network and on-premise with a server detects and distinguishes between types of Denial-of-Service (DoS) attacks.
Tal Arieh BE'ERY, Amichai SHULMAN
Filed: 22 Jul 19
Utility
Detecting Attacks on Databases Based on Transaction Characteristics Determined from Analyzing Database Logs
9 Oct 19
A method by a security system implemented by one or more electronic for detecting attacks on one or more databases.
Shiri MARGEL, Itsik MANTIN, Guy SHTAR, Yury GEILER
Filed: 30 May 18