Connected security system

S Mulchandani, A Hassanzadeh, E Hovor… - US Patent …, 2018 - Google Patents
Systems, methods, and apparatus, including computer pro grams encoded on computer
storage media, for obtaining, processing, and presenting data related to security events, and …

Method and system for employing graph analysis for detecting malicious activity in time evolving networks

M Lem, I Arnaldo, A Arun, K Li, C Bassias - US Patent 11,146,578, 2021 - Google Patents
US11146578B2 - Method and system for employing graph analysis for detecting malicious
activity in time evolving networks - Google Patents US11146578B2 - Method and system for …

System and method for detecting lateral movement and data exfiltration

F Gong, A Burt, F Jas - US Patent 10,326,778, 2019 - Google Patents
(57) ABSTRACT A system configured to detect a threat activity on a network. The system
including a digital device configured to detect a first order indicator of compromise on a …

Threat detection and mitigation through run-time introspection and instrumentation

H Sultan, J Schweitzer, DL BAILEY, GB Roth… - US Patent …, 2018 - Google Patents
(57) ABSTRACT A graph of a plurality of resources in a computing environ ment is
generated, with the graph associating a first resource of the plurality with a second resource …

Event correlation across heterogeneous operations

A Hassanzadeh, S Modi, S Mulchandani… - US Patent …, 2017 - Google Patents
In general, one innovative aspect of the Subject matter described in this specification can be
embodied in methods for transforming representations of network activity data, including …

Computer threat analysis service

NS Mehr - US Patent 10,521,584, 2019 - Google Patents
(57) ABSTRACT A system acquires diagnostic information from event logs, trace files, and
other diagnostic sources to reduce a set of event records. The event records are arranged in …

Event correlation across heterogeneous operations

A Hassanzadeh, S Modi, S Mulchandani… - US Patent …, 2017 - Google Patents
OTHER PUBLICATIONS Australian Office Action in Application No. 2016202191, dated Jul.
8, 2016, 5 pages. Mehta, V. et al.“Ranking attack graphs,” International Workshop on Recent …

Detection of adversary lateral movement in multi-domain IIOT environments

A Hassanzadeh, A Benameur, RL Burkett… - US Patent …, 2020 - Google Patents
Implementations are directed to methods for detecting and identifying advanced persistent
threats (APTs) in networks, including receiving first domain activity data from a first network …

Graph-based detection of lateral movement

SKJ DURAIRAJ, S Miskovic… - US Patent …, 2021 - Google Patents
(57) ABSTRACT A lateral movement application identifies lateral movement (LM) candidates
that potentially represent a security threat. Security platforms generate event data when …

Verification and enhancement using detection systems located at the network periphery and endpoint devices

A Aziz, OA Ismael - US Patent 10,893,059, 2021 - Google Patents
(74) Attorney, Agent, or Firm-Rutan & Tucker, LLP (57) ABSTRACT Computerized
techniques to determine and verify malicious ness of an object are described. A malware …