613 patents
Page 4 of 31
Utility
Cloud native virtual machine runtime protection
24 Oct 23
A system and method for cloud native virtual machine (VM) runtime protection.
Liron Levin, John Morello, Dima Stopel, Michael Velbaum, Itay Abramowsky, Isaac Schnitzer
Filed: 1 Dec 21
Utility
Network entity ID AAA
24 Oct 23
A set of data packets transmitted by an IoT device is received at a system.
Gong Cheng
Filed: 3 Feb 22
Utility
Network adaptive alert prioritization system
24 Oct 23
A method, including receiving, from multiple sources, respective sets of incidents, and respective suspiciousness labels for the incidents.
Yinnon Meshi, Rony Brailovsky, Jonathan Allon, Asaf Dahan, Gal Itzhak, Niv Sela
Filed: 10 Jan 22
Utility
Cellular internet of things battery drain prevention in mobile networks
24 Oct 23
Techniques for cellular Internet of Things (IoT) battery drain prevention in mobile networks (e.g., service provider networks for mobile subscribers) are disclosed.
Sachin Verma, Leonid Burakovsky
Filed: 19 Oct 21
Utility
Infrastructure as code resource definition correction system
19 Oct 23
A method, including accessing a corpus or infrastructure as code modules including respective resource definitions for provisioning and deploying a plurality of computing resources configured to execute one or more software applications.
Tohar Zand, Nimrod Kor, Rotem Avni, Naor David, Ariel Kruszyn
Filed: 18 Apr 22
Utility
In-line Detection of Algorithmically Generated Domains
19 Oct 23
Detection of algorithmically generated domains is disclosed.
Daiping Liu, Martin Walter, Ben Hua, Suquan Li, Fan Fei, Seokkyung Chung, Jun Wang, Wei Xu
Filed: 21 Jun 23
Utility
System and Method for Detecting Dictionary-based Dga Traffic
19 Oct 23
A system and method for detecting dictionary-based DGA traffic is provided.
Janos Szurdi, Weihan Jiang, David Qianshan He
Filed: 18 Apr 22
Utility
Method and System for Providing DNS Security Using Process Information
19 Oct 23
Domain Name System (DNS) security using process information is provided.
Zihang Xiao, Zhanhao Chen
Filed: 8 Dec 22
Utility
Network slice-based security in mobile networks
17 Oct 23
Techniques for providing network slice-based security in mobile networks (e.g., service provider networks for mobile subscribers) are disclosed.
Sachin Verma, Leonid Burakovsky
Filed: 12 Jan 23
Utility
Preventing Ransomware from Encrypting Files on a Target Machine
12 Oct 23
Techniques for preventing ransomware from encrypting files on a target machine are disclosed.
Eldar Aharoni, Vadim Goldstein, Mashav Sapir, Jenny Kitaichik
Filed: 14 Jun 23
Utility
Heidi: ML on Hypervisor Dynamic Analysis Data for Malware Classification
12 Oct 23
The present application discloses a method, system, and computer system for detecting malicious files.
Sujit Rokka Chhetri, Akshata Krishnamoorthy Rao, Daniel Raygoza, Esmid Idrizovic, William Redington Hewlett, II, Robert Jung
Filed: 7 Apr 22
Utility
Network layer signaling security with next generation firewall
10 Oct 23
Techniques for network layer signaling security with next generation firewall are disclosed.
Sachin Verma, Leonid Burakovsky
Filed: 10 Feb 22
Utility
Diameter security with next generation firewall
10 Oct 23
Techniques for Diameter security with next generation firewall are disclosed.
Sachin Verma, Leonid Burakovsky, Mingxu Huo, Fengliang Hu
Filed: 10 Feb 22
Utility
Consistent monitoring and analytics for security insights for network and security functions for a security service
10 Oct 23
Techniques for providing consistent monitoring and analytics for security insights for network and security functions for a security service are disclosed.
Anand Oswal, Arivu Mani Ramasamy, Kumar Ramachandran
Filed: 30 Oct 20
Utility
Multi-representational learning models for static analysis of source code
10 Oct 23
Techniques for multi-representational learning models for static analysis of source code are disclosed.
Brody James Kutt, William Redington Hewlett, II, Oleksii Starov, Yuchen Zhou, Fang Liu
Filed: 15 Nov 22
Utility
Application layer signaling security with next generation firewall
3 Oct 23
Techniques for application layer signaling security with next generation firewall are disclosed.
Sachin Verma, Leonid Burakovsky
Filed: 9 Feb 22
Utility
Dynamic per subscriber policy enablement for security platforms within service provider network environments
3 Oct 23
Techniques for dynamic per subscriber policy enablement for security platforms within service provider network environments are disclosed.
Mitchell Rappard, Leonid Burakovsky
Filed: 14 Dec 21
Utility
Fingerprint determination for network mapping
3 Oct 23
A set of identifying elements of a first network is determined from a set of data.
Timothy Junio, Matthew Kraning
Filed: 3 Jun 21
Utility
Pattern match-based detection in IoT security
3 Oct 23
Techniques for providing Internet of Things (IoT) security are disclosed.
Jun Du, Mei Wang, Hector Daniel Regalado, Jianhong Xia
Filed: 18 Jun 19
Utility
Bind shell attack detection
3 Oct 23
Methods, apparatus and computer program products implement embodiments of the present invention that include collecting data packets transmitted between multiple entities over a network, and grouping the packets at least according to their source and destination entities and their times, into connections to which the packets belong.
Yinnon Meshi, Idan Amit, Eyal Firstenberg, Jonathan Allon, Yaron Neuman
Filed: 15 Feb 21