11 patents
Utility
Churn-aware Machine Learning for Cybersecurity Threat Detection
25 May 23
Churn-aware training of a classifier which reduces the difference between predictions of two different models, such as a prior generation of a classification model and a subsequent generation.
David Benjamin Krisiloff, Scott Coull
Filed: 25 Jan 23
Utility
Churn-aware Machine Learning for Cybersecurity Threat Detection
7 Oct 21
Churn-aware training of a classifier which reduces the difference between predictions of two different models, such as a prior generation of a classification model and a subsequent generation.
David Benjamin Krisiloff, Scott Coull
Filed: 7 Apr 20
Utility
System and Method for Heterogeneous Transferred Learning for Enhanced Cybersecurity Threat Detection
11 Mar 21
A method includes training a first machine learning model with a first dataset, to produce a first trained machine learning model to infer cybersecurity-oriented file properties and/or detect cybersecurity threats within a first domain.
Scott Eric COULL, David KRISILOFF, Giorgio SEVERI
Filed: 16 Aug 19
Utility
Systems and Methods for Attack Simulation on a Production Network
9 Dec 20
The disclosure is directed towards systems and methods for improving security in a computer network.
Christopher B. Key, Paul E. Holzberger
Filed: 23 Aug 20
Utility
Automated Enforcement of Security Policies in Cloud and Hybrid Infrastructure Environments
9 Dec 20
To prevent un-authorized accesses to data and resources available in workloads on an organization's or enterprise's computer network, various improvements to automated computer network security processes to enable them to enforce network security policies using native network security mechanisms to control communications to and/or from workload units of applications running on different nodes within hybrid computer network infrastructures having both traditional hardware resources and virtual resources provided by private and public cloud infrastructure services.
Lisun Joao Kung, Jose Renato Goncalves Santos, Sarowar Golam Sikder
Filed: 21 Jun 20
Utility
Methods and Apparatus for Graphical User Interface Environment for Creating Threat Response Courses of Action for Computer Networks
28 Oct 20
A graphical user interface provides network security administrators a tool to quickly and easily create one or more courses of action for automatic response to a network threat.
Christopher Nelson BAILEY, Bernd CONSTANT, Juan Manuel VELA
Filed: 17 Dec 19
Utility
Methods and Apparatus for Graphical User Interface Environment for Creating Threat Response Courses of Action for Computer Networks
30 Sep 20
A graphical user interface provides network security administrators a tool to quickly and easily create one or more courses of action for automatic response to a network threat.
Christopher Nelson BAILEY, Bernd CONSTANT, Juan Manuel VELA
Filed: 17 Dec 19
Utility
System and Method for Detecting Cyberattacks Impersonating Legitimate Sources
5 Aug 20
A system and method for detecting phishing cyberattacks.
Muhammad Zain ul abadin Gardezi, Mohsin Saeed, Hassan Ahmad, Fahim Abbasi, Farrukh Shahzad
Filed: 22 Dec 19
Utility
Dynamic Adaptive Defense for Cyber-security Threats
29 Jul 20
Disclosed is a cyber-security system that is configured to aggregate and unify data from multiple components and platforms on a network.
Bernard THOMAS, David SCOTT, Fred BROTT, Paul SMITH
Filed: 5 Apr 20
Utility
Intelligent System for Mitigating Cybersecurity Risk by Analyzing Domain Name System Traffic
1 Apr 20
A system, method and computer-readable medium for mitigating cybersecurity risk by analyzing domain name system (DNS) traffic, including detecting a network communication propagated over a computer network, the network communication comprising a domain identifier, monitoring DNS traffic to and from one or more DNS servers relating to the domain identifier, the DNS traffic including one or more DNS queries and one or more corresponding responses, extracting information from the monitored DNS traffic to generate a record identifier, updating a DNS metadata record stored in memory and associated with the record identifier based at least in part on the monitored DNS traffic, the DNS metadata record including one or more occurrence metrics associated with instances of the domain identifier in previous DNS traffic, determining whether the one or more occurrence metrics are indicative of a cybersecurity risk, and activating one or more mitigation actions based at least in part on a determination that the one or more occurrence metrics are indicative of the cybersecurity risk.
Ken BAGNALL, Ralph CASEY, John JENSEN
Filed: 27 Sep 18
Utility
Intelligent System for Mitigating Cybersecurity Risk by Analyzing Domain Name System Traffic Metrics
1 Apr 20
A system, method and computer-readable medium for mitigating cybersecurity risk by analyzing domain name system (DNS) traffic metrics, including detecting a network communication propagated over a computer network, the network communication comprising a domain identifier, determining DNS traffic metadata corresponding to the domain identifier, the DNS traffic metadata being determined based on monitored DNS traffic associated with the domain identifier to one or more DNS servers, the DNS traffic metadata comprising a count of DNS queries associated with the domain identifier and a rate of DNS queries associated with the domain identifier, determining whether the count of DNS queries and the rate of DNS queries are indicative of a cybersecurity risk, and activating one or more mitigation actions based at least in part on a determination that the count of DNS queries and the rate of DNS queries are indicative of a cybersecurity risk.
Ken BAGNALL, Ralph CASEY, John JENSEN
Filed: 27 Sep 18
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first