Monitoring for Security Threats in a Container System

LP Pabón, K Iyer, CY Su, VS Srinivasa - US Patent App. 17/876,309, 2024 - Google Patents
2022-07-28 Assigned to PURE STORAGE, INC., A DELAWARE CORPORATION
reassignment PURE STORAGE, INC., A DELAWARE CORPORATION ASSIGNMENT OF …

Systems and methods of attack type and likelihood prediction

F Labreche - US Patent 12,135,789, 2024 - Google Patents
The present disclosure provides systems and methods for predicting attack types and
likelihood the attack types will occur for new vulnerabilities. According to the present …

Systems and methods for detecting malicious hands-on-keyboard activity via machine learning

N Borges - US Patent 12,034,751, 2024 - Google Patents
A method for detecting unauthorized and/or malicious hands-on-keyboard activity in an
information handling system derived from the telemetry from one or more client systems …

Smart proxy for a large scale high-interaction honeypot farm

Z **ao, C Zheng, J Liu - US Patent 11,757,844, 2023 - Google Patents
Techniques for providing a smart proxy for a large scale high-interaction honeypot farm are
disclosed. In some embodiments, a system/method/computer program product for providing …

Proxied nodes in a container orchestration environment for scalable resource allocation

H Hannon - US Patent 11,245,748, 2022 - Google Patents
Creating a multi-tenant model in a container orchestration environment where available host
node resources are shar able among tenants is provided. A request to generate a plurality of …

Systems and methods for deep packet inspection of vulnerable network devices

W Thanos - US Patent 11,528,292, 2022 - Google Patents
The disclosed computer-implemented method for deep packet inspection of vulnerable
network devices may include (i) detecting at least one vulnerability associated with a …

Large scale high-interactive honeypot farm

Z **ao, C Zheng, J Liu - US Patent 11,757,936, 2023 - Google Patents
Techniques for providing a large scale high-interaction honeypot farm are disclosed. In
some embodiments, a system/method/computer program product for providing a large scale …

Protecting computer assets from malicious attacks

A Paquin, P Duncan, K Shen, J Bees… - US Patent …, 2022 - Google Patents
A method selectively installs a particular signature on a particular gateway based on the
type of signature and the type of computer asset that is protected by that particular gateway …

System and method for generating cyber threat intelligence

S Sengupta, M Banerjee - US Patent App. 17/944,778, 2023 - Google Patents
attack surfaces and breakpoints are secured by continuous monitoring and taking proactive
actions, or by introducing a deception mechanism. While the attackers are distracted with the …

Proactively taking action responsive to events within a cluster based on a range of normal behavior learned for various user roles

TW Cady - US Patent App. 17/727,538, 2023 - Google Patents
some embodiments relate to a machine-learning (ML) based approach that increases
confidence in taking proactive action responsive to events within a Kubernetes cluster by …