122 patents
Page 6 of 7
Utility
Identifying and Classifying Community Attacks
12 Aug 20
A method by one or more electronic devices for identifying and classifying community attacks.
Shiri MARGEL, Amit LEIBOVITZ
Filed: 29 Dec 19
Utility
Method for Generating a Human Likeness Score
12 Aug 20
One embodiment of the invention is a method utilizing a CAPTCHA to generate a human likeness score including blocks: a) receiving a user solution to the CAPTCHA; b) receiving a user interaction pattern descriptive of an interaction undertaken by the user, through a graphical interface of the CAPTCHA, to achieve the user solution; c) determining the accuracy of the user solution; d) comparing the user interaction pattern against an interaction model generated from interaction patterns of previous users; e) calculating the human likeness score based upon the determination of block c) and the comparison of block d), wherein the human likeness score lies within a continuum of human likeness scores.
Tyler James PAXTON, Reid Michael TATORIS, Benjamin TRENDA, Elvis JAKUPOVIC, Steven P. BURKETT, Adam Michael JANOWER
Filed: 5 Feb 20
Utility
Chunk-scanning of Web Application Layer Requests to Reduce Delays
22 Jul 20
A method by a web application layer attack detector communicatively coupled between web application clients and web application servers.
Boris ZINGERMAN, Uri SHAPEN
Filed: 17 Jan 19
Utility
Infrastructure Distributed Denial of Service Protection
22 Jul 20
A method of providing infrastructure protection for a server of a network organization, the method including announcing an internet protocol (IP) address range associated with the network organization using a border gateway protocol (BGP) on an edge server of a distributed network of edge servers.
Dvir Shapira, Ehud Cohen, Tomer Bronshtein, Eyal Leshem, Alon Ludmer
Filed: 2 Apr 20
Utility
Infrastructure Distributed Denial of Service Protection
22 Jul 20
A method of providing infrastructure protection for a server of a network organization, the method including announcing an IP address range associated with the network organization using a border gateway protocol on an edge router of a scrubbing center associated with the network organization.
Dvir Shapira, Ehud Cohen, Tomer Bronshtein, Eyal Leshem, Alon Ludmer
Filed: 2 Apr 20
Utility
Using Access Logs for Network Entities Type Classification
1 Jul 20
A method by a security system implemented by one or more electronic devices for detecting attacks on one or more databases hosted by one or more database servers.
Shiri MARGEL, Yury GEILER
Filed: 25 Dec 18
Utility
Monitoring and Preventing Use of Weak Cryptographic Logic
1 Jul 20
A runtime application self protection (RASP) plug-in monitors for, and prevents, invocation of unacceptably weak cryptographic processing requested by an application.
Kunal Anand
Filed: 16 Oct 19
Utility
Monitoring and Preventing Outbound Network Connections In Runtime Applications
1 Jul 20
A runtime application self protection (RASP) plug-in logic monitors for, and prevents, outbound network connections that are initiated by server application logic and that are not intended by the application logic.
Kunal Anand, Richard Meester, II, Joseph Rozner, Martin Ryan
Filed: 16 Oct 19
Utility
Generating Collection Rules Based on Security Rules
1 Jul 20
A computing device is described that is coupled to a set of web application layer attack detectors (ADs), which are coupled between clients and web application servers.
Nadav Avital ARBEL, Luda LAZAR, Gilad YEHUDAI
Filed: 27 Dec 18
Utility
Selective Database Logging with Smart Sampling
17 Jun 20
A method by a security analysis server to generate a traffic monitoring rule.
Ehud ESHET, Ophir BLEIBERG
Filed: 12 Dec 18
Utility
Techniques for botnet detection and member identification
1 Jun 20
A botnet identification module identifies members of one or more botnets based upon network traffic destined to one or more servers over time, and provides sets of botnet sources to a traffic monitoring module.
Nitzan Niv
Filed: 23 Feb 17
Utility
Infrastructure Distributed Denial of Service Protection
20 May 20
A method of providing infrastructure protection for a network that includes IP addresses as low as a single IP address.
Dvir Shapira, Ehud Cohen, Tomer Bronshtein, Eyal Leshem, Alon Ludmer
Filed: 21 Jan 20
Utility
Techniques for Securely Detecting Compromises of Enterprise End Stations Utilizing Tunnel Tokens
29 Apr 20
A method in a cloud network to detect compromises within an enterprise network based on tokens tunneled outside of the enterprise network to the cloud network.
Amichai SHULMAN, Sagie DULCE, Daniella GOIHMAN-SHUSTER, Shahar BEN-HADOR
Filed: 29 Dec 19
Utility
Data Based Web Application Firewall
25 Mar 20
A method for protecting information from databases includes a web application firewall and a database activity monitor.
Shiri MARGEL, Itsik MANTIN, Amichai SHULMAN, Daniella GOIHMAN-SHUSTER
Filed: 16 Apr 19
Utility
Continuous Database Security and Compliance
26 Feb 20
A method implemented by a security system for selectively triggering different ones of a plurality of database assessment scans for a database The method includes monitoring for occurrences of a first class of database operations that have been determined to require only rerunning subsets of the plurality of database assessment scans to determine whether results of the plurality of database assessment scan shave changed, responsive to detecting an occurrence of one or more database operations of the first class, selecting one or more of the subsets to be rerun based on which of the database operations of the first class occurred, and triggering performance of only the selected one or more of the subsets to determine whether the results of the plurality of database assessment scans have changed.
Avidan REICH, Amichai SHULMAN, Michael CHERNY
Filed: 21 Aug 18
Utility
Infrastructure distributed denial of service (DDoS) protection
24 Feb 20
A method of providing infrastructure protection for a network that includes IP addresses as low as a single IP address.
Dvir Shapira, Ehud Cohen, Tomer Bronshtein, Eyal Leshem, Alon Ludmer
Filed: 19 Jun 17
Utility
Techniques for securely detecting compromises of enterprise end stations utilizing tunnel tokens
17 Feb 20
A token tunnel server (TTS) within an enterprise network receives packets from a source address directed to a destination address (both of the enterprise network) that were caused to be originated by an attacker.
Amichai Shulman, Sagie Dulce, Daniella Goihman-Shuster, Shahar Ben-Hador
Filed: 19 Jun 16
Utility
CorrectedTechniques for Securely Detecting Compromises of Enterprise End Stations Utilizing Tunnel Tokens
29 Jan 20
A token tunnel server (TTS) within an enterprise network receives packets from a source address directed to a destination address (both of the enterprise network) that were caused to be originated by an attacker.
Amichai SHULMAN, Sagie DULCE, Daniella GOIHMAN-SHUSTER, Shahar BEN-HADOR
Filed: 19 Jun 16
Utility
Aggregating Alerts of Malicious Events for Computer Security
4 Dec 19
A method of processing malicious events in a network infrastructure determines features of malicious events detected by a firewall of an attack analyzer.
Gilad Yehudai, Itsik Mantin, Lior Fisch, Shelly Hershkovitz, Amichai Shulman, Moran Rachel Ambar
Filed: 4 Jun 18
Utility
Coordinated Detection and Differentiation of Denial of Service Attacks
13 Nov 19
An analyzer module (AM) within a same protected network and on-premise with a server detects and distinguishes between types of Denial-of-Service (DoS) attacks.
Tal Arieh BE'ERY, Amichai SHULMAN
Filed: 22 Jul 19