Method and system for employing graph analysis for detecting malicious activity in time evolving networks

M Lem, I Arnaldo, A Arun, K Li, C Bassias - US Patent 11,146,578, 2021 - Google Patents
US11146578B2 - Method and system for employing graph analysis for detecting malicious
activity in time evolving networks - Google Patents US11146578B2 - Method and system for …

Forensic analysis of computing activity

B Ladnai, MD Harris, AJ Thomas, AGP Smith… - US Patent …, 2018 - Google Patents
US9967267B2 - Forensic analysis of computing activity - Google Patents US9967267B2 -
Forensic analysis of computing activity - Google Patents Forensic analysis of computing activity …

Pre-cognitive security information and event management

SKJ DURAIRAJ, A Singla - US Patent 10,789,367, 2020 - Google Patents
According to an example, pre-cognitive SIEM may include using trained classifiers to detect
an anomaly in input events, and generating a predictive attack graph based on the detected …

Endpoint malware detection using an event graph

B Ladnai, MD Harris, AJ Thomas, AGP Smith… - US Patent …, 2018 - Google Patents
(57) ABSTRACT A data recorder stores endpoint activity on an ongoing basis as sequences
of events that causally relate computer objects such as processes and files, and patterns …

Verification and enhancement using detection systems located at the network periphery and endpoint devices

A Aziz, OA Ismael - US Patent 10,893,059, 2021 - Google Patents
(74) Attorney, Agent, or Firm-Rutan & Tucker, LLP (57) ABSTRACT Computerized
techniques to determine and verify malicious ness of an object are described. A malware …

Learning maliciousness in cybersecurity graphs

C Walsh, E Maida - US Patent 10,785,239, 2020 - Google Patents
US10785239B2 - Learning maliciousness in cybersecurity graphs - Google Patents
US10785239B2 - Learning maliciousness in cybersecurity graphs - Google Patents Learning …

Graph based framework for detecting malicious or compromised accounts

Y **e, F Yu - US Patent 10,009,358, 2018 - Google Patents
Methods, systems, and apparatus, including computer pro grams encoded on computer
storage media, for detecting malicious attacks. One of the methods includes generating a …

Behavior-based ransomware detection

MW Patton, AL Ituiño - US Patent 9,734,337, 2017 - Google Patents
An anti-malware application detects, stops, and quarantines ransomware. The anti-malware
application monitors threads executing on a computing device and detects behaviors that …

Security evaluation system, security evaluation method, and program

Y Yamada, Y Ohta, M Inokuchi - US Patent 11,729,199, 2023 - Google Patents
US11729199B2 - Security evaluation system, security evaluation method, and program -
Google Patents US11729199B2 - Security evaluation system, security evaluation method …

Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints

OA Ismael, A Aziz - US Patent 10,826,933, 2020 - Google Patents
Action dated Nov. 29, 2018. Primary Examiner David Garcia Cervetti (74) Attorney, Agent, or
Firm-Rutan & Tucker, LLP (57) ABSTRACT A technique verifies a determination of an exploit …