[HTML][HTML] TLS key material identification and extraction in memory: current state and future challenges
Memory forensics is a crucial part of digital forensics as it can be used to extract valuable
information such as running processes, network connections, and encryption keys from …
information such as running processes, network connections, and encryption keys from …
System and method for protection against ransomware attacks
V Strogov, V Levchenko, A Dod, S Beloussov… - US Patent …, 2021 - Google Patents
A method is provided for protecting a file server from a ransomware attack. An exemplary
method comprises assigning a session identifier to a remote session initiated with the file …
method comprises assigning a session identifier to a remote session initiated with the file …
Correlating network traffic that crosses opaque endpoints
XJ Wu, A Mukerji, JJ Costlow, MKK Montague… - US Patent …, 2022 - Google Patents
Embodiments are directed to monitoring network traffic using network monitoring computers
(NMCs). Two or more network segments coupled by a traffic forwarding device (TFD) may be …
(NMCs). Two or more network segments coupled by a traffic forwarding device (TFD) may be …
Monitoring encrypted network traffic
BT Higgins, JJ Costlow, J Gemignani Jr… - US Patent …, 2022 - Google Patents
Embodiments are directed to monitoring network traffic using network monitoring computers
(NMCs). Networks may be configured to protect servers using centralized security protocols …
(NMCs). Networks may be configured to protect servers using centralized security protocols …
Monitoring encrypted network traffic
BT Higgins, JJ Costlow, J Gemignani Jr… - US Patent …, 2022 - Google Patents
Embodiments are directed to monitoring network traffic using network monitoring computers
(NMCs). Networks may be configured to protect servers using centralized security protocols …
(NMCs). Networks may be configured to protect servers using centralized security protocols …
Identifying network entities based on beaconing activity
JJ Costlow, MR Corder, EH Driggs, BT Higgins… - US Patent …, 2022 - Google Patents
Embodiments are directed to monitoring network traffic using network monitoring computers
(NMCs). Metrics may be determined based on monitoring network traffic associated with a …
(NMCs). Metrics may be determined based on monitoring network traffic associated with a …
Randomness detection in network data
BE Harris, M Khan, JB Peterson - US Patent 11,151,275, 2021 - Google Patents
An example operation may include one or more of dividing a data file into a plurality of data
chunks, generating a randomness value for each data chunk based on one or more …
chunks, generating a randomness value for each data chunk based on one or more …
Monitoring encrypted network traffic
BT Higgins, JJ Costlow, J Gemignani Jr… - US Patent …, 2023 - Google Patents
2022-04-15 Assigned to EXTRAHOP NETWORKS, INC. reassignment EXTRAHOP
NETWORKS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR …
NETWORKS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR …
Ranking alerts based on network monitoring
XJ Wu, NJ Braun, JB Deaguero… - US Patent …, 2022 - Google Patents
Embodiments are directed to monitoring network traffic. A monitoring engine may monitor
network traffic associated with a plurality of entities in networks to provide metrics. And …
network traffic associated with a plurality of entities in networks to provide metrics. And …
Automated preemptive polymorphic deception
XJ Wu, BP Khanal, S Dasgupta, C Oh… - US Patent …, 2024 - Google Patents
Embodiments are directed to monitoring network traffic using network monitoring computers
(NMCs). Anomalous events may be classified based on the monitored network traffic and …
(NMCs). Anomalous events may be classified based on the monitored network traffic and …