Methods, systems, and computer readable media for monitoring encrypted network traffic flows

A Putatunda, P Majumdar - US Patent 10,992,652, 2021 - Google Patents
Methods, systems, and computer readable media for moni toring encrypted packet
communications are disclosed. According to one method executed at an encryption aware …

Deep learning architecture for collaborative anomaly detection and explanation

G Mermoud, D Tedaldi, JP Vasseur - US Patent 10,574,512, 2020 - Google Patents
In one embodiment, a network assurance service that moni-tors a network detects a
behavioral anomaly in the network using an anomaly detector that compares an anomaly …

Data integration system for triggering analysis of connection oscillations

DM Steele, NJ Chevis, JD Vaughn… - US Patent …, 2020 - Google Patents
Embodiments of the present invention are directed to data integration and threat assessment
for triggering analysis of connection oscillations in order to improve data and con nection …

Network anomaly detection

M Shemer, R Engelberg, YTH Worzel… - US Patent …, 2023 - Google Patents
(57) ABSTRACT A cloud network is a complex environment in which hun-dreds and
thousands of users or entities can each host, create, modify, and develop multiple virtual …

Systems and methods for cyber security alert triage

J Trost, B Stoy - US Patent 11,165,815, 2021 - Google Patents
The present disclosure is directed to systems, apparatuses and methods for mitigating cyber-
attacks. For example, the method includes receiving, from one or more network devices …

Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques

MR Bergeron - US Patent 10,903,985, 2021 - Google Patents
(57) ABSTRACT A method executed by a dynamic session key acquisition (DSKA) engine
residing in a virtual environment includes receiving session decryption information …

System and method for encrypted disk inspection utilizing disk cloning techniques

DH Shemesh, Y Miran, R Reznik, A Luttwak… - US Patent …, 2024 - Google Patents
A system and method for inspecting encrypted disks for a cybersecurity object using a
custom key are disclosed. The method includes detecting an encrypted disk in a cloud …

System and method for cybersecurity threat detection utilizing static and runtime data

A Fogel, U Reitblat, A Schindel, A Luttwak… - US Patent …, 2023 - Google Patents
G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, eg
of processors, firmware or operating systems during program execution, eg stack integrity; …

Digital on-demand coupons for security service of communications system

V Shaw - US Patent 11,496,522, 2022 - Google Patents
(57) ABSTRACT A method performed by a security system of a 5G network to protect against
cyberattacks on a personalized basis. The security system can identify a cybersecurity threat …

Network security system including a multi-dimensional domain name system to protect against cybersecurity threats

V Shaw - US Patent 11,546,368, 2023 - Google Patents
(57) ABSTRACT A method performed by a security system that can analyze a vulnerability or
a risk applicable to a network entity to identify a cybersecurity threat and associated risk …