Graph-based user tracking and threat detection

HKB Singh, V Kapoor, M Bog, Y Chen - US Patent 10,419,469, 2019 - Google Patents
Log data associated with at least one user session associated with an original user is
received. A logical graph is generated using at least a portion of the received log data. One …

Extended user session tracking

M Bog, V Kapoor, SJ Pullara III, Y Chen… - US Patent …, 2019 - Google Patents
Network activity data is received, for example, from a set of agents reporting collectively
information about a set of hosts. The received network activity data is used to identify a user …

Using graph-based models to identify datacenter anomalies

V Kapoor, SJ Pullara III, M Bog, Y Chen… - US Patent …, 2020 - Google Patents
Activities within a network environment are monitored (eg, using agents). At least a portion of
the monitored activities are used to generate a logical graph model. The generated logical …

Using static analysis for vulnerability detection

PW O'hearn, TM Reed, Y Chen… - US Patent 12,034,754, 2024 - Google Patents
Using static analysis for vulnerability detection, including: inspecting, using an
underapproximate static code analysis, a non-executable representation of an application to …

Learning from similar cloud deployments

Ú Erlingsson, Y Chen - US Patent 11,785,104, 2023 - Google Patents
Learning from similar cloud deployments, including: identifying, for at least a portion of a first
cloud deployment, one or more additional cloud deployments to utilize for cross-customer …

Graph-based user tracking and threat detection

HKB Singh, V Kapoor, M Bog, Y Chen - US Patent 10,986,114, 2021 - Google Patents
Log data associated with at least one user session in a network environment associated with
an original user is received. A logical graph is generated using at least a portion of the …

Dynamically generating monitoring tools for software applications

CR Rioux, Y Chen - US Patent 11,741,238, 2023 - Google Patents
Dynamically generating monitoring tools for software applications, including: inspecting,
using static code analysis, a non-executable representation of the application to identify one …

Security indicator linkage determination

A Singla, E Ross, BFHC Hein - US Patent 10,356,109, 2019 - Google Patents
According to an example, security indicator linkage determination may include parsing input
data that is used to determine a plurality of sequences of steps that are involved in attacks. A …

Using graph-based models to identify datacenter anomalies

V Kapoor, SJ Pullara III, M Bog, Y Chen… - US Patent …, 2021 - Google Patents
Activities within a network environment are monitored (eg, using agents). At least a portion of
the monitored activities are used to generate a logical graph model. The generated logical …

Log-based status modeling and problem diagnosis for distributed applications

YL Chan, L Yang, T Wu, JQ Li, L Yu, H Min… - US Patent …, 2022 - Google Patents
Techniques include collecting current logs from distributed sources, selecting a group of the
current logs that are from a related source of the distributed sources, and generating a …