10 patents
Utility
Hole punching abuse
21 Nov 23
It is provided a method, comprising monitoring if a firewall receives a first packet and a second packet, wherein the first packet is directed to a IP address and a first port number; the second packet is directed to the IP address and a second port number; a hole through a firewall is punched for the IP address a hole port number different from the first port number and the second port number; the first packet has a first payload; the second packet has a second payload; and the method comprises checking if the first payload is substantially the same as the second payload; causing the firewall to block the first packet and the second packet if the firewall receives the first packet and the second packet and the first payload is substantially the same as the second payload.
Jarno Niemelä
Filed: 16 Apr 20
Utility
Method of threat detection in a computer network security system
7 Nov 23
A method comprising: receiving raw data related to one or more network nodes, wherein dissimilar data types are aligned as input events; filtering one or more of the input events by using an adjustable threshold that is based on a filtering score, wherein the filtering score is an estimate of the likelihood that the input event is followed by a security related detection; processing only input events passed through the filtering by an enrichment process; and analysing the data received from the enrichment process for generating a security related decision.
Matti Aksela
Filed: 6 Mar 20
Utility
Method of threat detection
7 Nov 23
There is provided a method comprising: detecting a new process start at a network node of a computer network; determining that said process requires external code modules; observing the times at which one or more external code modules required by the new process are loaded relative to the process starting time; determining that the usage of an external code module required by the new process is anomalous when the time elapsed between the start of the process and loading of said external code module lies outside predetermined expected boundaries; and taking further action to protect the network node and/or the computer network based on determining that the usage of the external code module required by the detected new process is anomalous.
Paolo Palumbo, Dmitriy Komashinskiy
Filed: 10 Nov 20
Utility
Method for identifying network devices in computer network and an apparatus configured to identify network devices in computer network
22 Aug 23
A method for identifying devices in a computer network includes collecting data points including device related parameters/information from a device accessing network resources, determining a string distance between the set of collected data points with the data sets collected from previously known network devices and selecting the smallest string distance value and/or highest similarity score.
Yury Yakovlev, Elio Alejandro Govea Aguilar
Filed: 17 Jun 22
Utility
Method for inspection and filtering of TCP streams in gateway router
15 Aug 23
A method of monitoring traffic by a router acting as a gateway between a first and second network is described.
Yury Yakovlev, Tero Kilkanen, Markus Palonen
Filed: 6 May 20
Utility
Probing and responding to computer network security breaches
9 May 23
A method of probing and responding to a security breach in a computer network security system includes defining first and second rules and defining a model to output a probability that a security breach has occurred based on an input and to generate commands.
Paolo Palumbo, Dmitry Komashinskiy, Szymon Grzybowski
Filed: 7 Dec 18
Utility
Threat control method and system
14 Mar 23
A method including: establishing an internal swarm intelligence network including security agent modules of a plurality of interconnected network nodes of a local computer network, collecting data related to the respective network nodes, sharing information based on the collected data in the established internal swarm intelligence network, and using the collected data and information received from the internal swarm intelligence network for generating and adapting models related to the respective network node nodes.
Matti Aksela, Mika Stahlberg
Filed: 11 Nov 19
Utility
Spam detection
7 Feb 23
A method of determining that a client is likely engaged in the sending of spam emails via a network node.
Heikki Hannikainen
Filed: 13 Feb 20
Utility
Network vulnerability detection
13 Dec 22
A method for monitoring a directory environment of a computer network to detect vulnerabilities.
Jacques Louw, Keith Kirton
Filed: 13 May 20
Utility
Network security
15 Nov 22
There is provided a network security method in a computer network.
Yury Yakovlev, Gabor Gunyho, Andrey Rusetskiy
Filed: 22 May 20
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first