Monitoring for Security Threats in a Container System
LP Pabón, K Iyer, CY Su, VS Srinivasa - US Patent App. 17/876,309, 2024 - Google Patents
2022-07-28 Assigned to PURE STORAGE, INC., A DELAWARE CORPORATION
reassignment PURE STORAGE, INC., A DELAWARE CORPORATION ASSIGNMENT OF …
reassignment PURE STORAGE, INC., A DELAWARE CORPORATION ASSIGNMENT OF …
Systems and methods of attack type and likelihood prediction
F Labreche - US Patent 12,135,789, 2024 - Google Patents
The present disclosure provides systems and methods for predicting attack types and
likelihood the attack types will occur for new vulnerabilities. According to the present …
likelihood the attack types will occur for new vulnerabilities. According to the present …
Systems and methods for detecting malicious hands-on-keyboard activity via machine learning
N Borges - US Patent 12,034,751, 2024 - Google Patents
A method for detecting unauthorized and/or malicious hands-on-keyboard activity in an
information handling system derived from the telemetry from one or more client systems …
information handling system derived from the telemetry from one or more client systems …
Smart proxy for a large scale high-interaction honeypot farm
Z **ao, C Zheng, J Liu - US Patent 11,757,844, 2023 - Google Patents
Techniques for providing a smart proxy for a large scale high-interaction honeypot farm are
disclosed. In some embodiments, a system/method/computer program product for providing …
disclosed. In some embodiments, a system/method/computer program product for providing …
Proxied nodes in a container orchestration environment for scalable resource allocation
H Hannon - US Patent 11,245,748, 2022 - Google Patents
Creating a multi-tenant model in a container orchestration environment where available host
node resources are shar able among tenants is provided. A request to generate a plurality of …
node resources are shar able among tenants is provided. A request to generate a plurality of …
Systems and methods for deep packet inspection of vulnerable network devices
W Thanos - US Patent 11,528,292, 2022 - Google Patents
The disclosed computer-implemented method for deep packet inspection of vulnerable
network devices may include (i) detecting at least one vulnerability associated with a …
network devices may include (i) detecting at least one vulnerability associated with a …
Large scale high-interactive honeypot farm
Z **ao, C Zheng, J Liu - US Patent 11,757,936, 2023 - Google Patents
Techniques for providing a large scale high-interaction honeypot farm are disclosed. In
some embodiments, a system/method/computer program product for providing a large scale …
some embodiments, a system/method/computer program product for providing a large scale …
Protecting computer assets from malicious attacks
A Paquin, P Duncan, K Shen, J Bees… - US Patent …, 2022 - Google Patents
A method selectively installs a particular signature on a particular gateway based on the
type of signature and the type of computer asset that is protected by that particular gateway …
type of signature and the type of computer asset that is protected by that particular gateway …
System and method for generating cyber threat intelligence
S Sengupta, M Banerjee - US Patent App. 17/944,778, 2023 - Google Patents
attack surfaces and breakpoints are secured by continuous monitoring and taking proactive
actions, or by introducing a deception mechanism. While the attackers are distracted with the …
actions, or by introducing a deception mechanism. While the attackers are distracted with the …
Proactively taking action responsive to events within a cluster based on a range of normal behavior learned for various user roles
TW Cady - US Patent App. 17/727,538, 2023 - Google Patents
some embodiments relate to a machine-learning (ML) based approach that increases
confidence in taking proactive action responsive to events within a Kubernetes cluster by …
confidence in taking proactive action responsive to events within a Kubernetes cluster by …