Protecting Computing Devices From Malicious Activity
Y Chen, R Samadani, KY Sung - US Patent App. 15/428,915, 2018 - Google Patents
Embodiments provide methods of protecting computing devices from malicious activity. A
processor of a networking device may monitor network traffic flows of network computing …
processor of a networking device may monitor network traffic flows of network computing …
Systems and methods for modifying file backups in response to detecting potential ransomware
L Gu, I Sokolov - US Patent 10,742,665, 2020 - Google Patents
A computer-implemented method for modifying file backups in response to detecting
potential ransomware may include (1) detecting, during a file backup process, an anomaly …
potential ransomware may include (1) detecting, during a file backup process, an anomaly …
Detecting attackers who target containerized clusters
H Shayevitz, Y Fried, M Kubovsky - US Patent 10,382,484, 2019 - Google Patents
A method for operation of a deception management server, for detecting and hindering
attackers who target containerized clusters of a network, including learning the network …
attackers who target containerized clusters of a network, including learning the network …
Comprehensive risk assessment in a heterogeneous dynamic network
SV Lokamathe, RMA BHATTACHAR… - US Patent …, 2020 - Google Patents
Systems and methods of the present disclosure provide comprehensive risk assessment in a
heterogeneous dynamic network. The framework enables “view” and “analyses” of complete …
heterogeneous dynamic network. The framework enables “view” and “analyses” of complete …
Multi-factor deception management and detection for malicious actions in a computer network
S Touboul, H Levin, S Roubach, A Mischari… - US Patent …, 2018 - Google Patents
A network surveillance system, including a management server within a network of
resources in which users access the resources in the network based on credentials …
resources in which users access the resources in the network based on credentials …
System and method for creation, deployment and management of augmented attacker map
S Touboul, H Levin, S Roubach, A Mischari… - US Patent …, 2018 - Google Patents
A system for network surveillance to detect attackers, including a deception management
server within a network of resources, including a deployment module managing and …
server within a network of resources, including a deployment module managing and …
Detecting malicious domains and client addresses in DNS traffic
DB Rodriguez, Y Pan - US Patent 10,382,478, 2019 - Google Patents
In one embodiment, a device in a network constructs a graph based on Domain Name
System (DNS) traffic in which vertices of the graph correspond to client addresses from the …
System (DNS) traffic in which vertices of the graph correspond to client addresses from the …
Systems and methods for alert prioritization using security events graph
RJ Canzanese, JD Batson - US Patent 11,539,749, 2022 - Google Patents
The technology disclosed includes a system to group secu rity alerts generated in a
computer network and prioritize grouped security alerts for analysis. The system includes …
computer network and prioritize grouped security alerts for analysis. The system includes …
Detecting malicious activity by using endemic network hosts as decoys
T Sela, M Baz - US Patent 10,404,747, 2019 - Google Patents
A system for detecting malicious activity in networks, including a deception manager having
administrative credentials for a network, planting deceptions within network hosts, and …
administrative credentials for a network, planting deceptions within network hosts, and …
Abusive traffic detection
V Cazin, N Rival - US Patent 9,967,273, 2018 - Google Patents
Aspects of an abuse detection system for a web service include an abuse detection engine
executing on a server. The abuse detection engine includes a pre-processing module for …
executing on a server. The abuse detection engine includes a pre-processing module for …