[HTML][HTML] TLS key material identification and extraction in memory: current state and future challenges

D Baier, A Basse, JN Hilgert, M Lambertz - Forensic Science International …, 2024 - Elsevier
Memory forensics is a crucial part of digital forensics as it can be used to extract valuable
information such as running processes, network connections, and encryption keys from …

System and method for protection against ransomware attacks

V Strogov, V Levchenko, A Dod, S Beloussov… - US Patent …, 2021 - Google Patents
A method is provided for protecting a file server from a ransomware attack. An exemplary
method comprises assigning a session identifier to a remote session initiated with the file …

Correlating network traffic that crosses opaque endpoints

XJ Wu, A Mukerji, JJ Costlow, MKK Montague… - US Patent …, 2022 - Google Patents
Embodiments are directed to monitoring network traffic using network monitoring computers
(NMCs). Two or more network segments coupled by a traffic forwarding device (TFD) may be …

Monitoring encrypted network traffic

BT Higgins, JJ Costlow, J Gemignani Jr… - US Patent …, 2022 - Google Patents
Embodiments are directed to monitoring network traffic using network monitoring computers
(NMCs). Networks may be configured to protect servers using centralized security protocols …

Monitoring encrypted network traffic

BT Higgins, JJ Costlow, J Gemignani Jr… - US Patent …, 2022 - Google Patents
Embodiments are directed to monitoring network traffic using network monitoring computers
(NMCs). Networks may be configured to protect servers using centralized security protocols …

Identifying network entities based on beaconing activity

JJ Costlow, MR Corder, EH Driggs, BT Higgins… - US Patent …, 2022 - Google Patents
Embodiments are directed to monitoring network traffic using network monitoring computers
(NMCs). Metrics may be determined based on monitoring network traffic associated with a …

Randomness detection in network data

BE Harris, M Khan, JB Peterson - US Patent 11,151,275, 2021 - Google Patents
An example operation may include one or more of dividing a data file into a plurality of data
chunks, generating a randomness value for each data chunk based on one or more …

Monitoring encrypted network traffic

BT Higgins, JJ Costlow, J Gemignani Jr… - US Patent …, 2023 - Google Patents
2022-04-15 Assigned to EXTRAHOP NETWORKS, INC. reassignment EXTRAHOP
NETWORKS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR …

Ranking alerts based on network monitoring

XJ Wu, NJ Braun, JB Deaguero… - US Patent …, 2022 - Google Patents
Embodiments are directed to monitoring network traffic. A monitoring engine may monitor
network traffic associated with a plurality of entities in networks to provide metrics. And …

Automated preemptive polymorphic deception

XJ Wu, BP Khanal, S Dasgupta, C Oh… - US Patent …, 2024 - Google Patents
Embodiments are directed to monitoring network traffic using network monitoring computers
(NMCs). Anomalous events may be classified based on the monitored network traffic and …