SYSTEMS AND METHODS FOR ADVERSARY DETECTION AND THREAT HUNTING

    公开(公告)号:US20230004422A1

    公开(公告)日:2023-01-05

    申请号:US17943896

    申请日:2022-09-13

    Abstract: Disclosed herein are embodiments of systems, methods, and products that provide adversary detection and threat hunting. A server may comprise a user side virtual machine facing the cyber protection users, a collection virtual machine facing the at-risk network, and a data repository. The server may receive user requests requesting status data from the at-risk network via the user side virtual machine. The server may collect status data from the at-risk network via the collection virtual machine and store the collected data into the data repository. Different users may request duplicate information from the at-risk network. The server may retrieve the requested information from the data repository for duplicate requests and return the responses immediately for such requests. Because the server does not query the at-risk network for duplicate requests, the server may reduce the amount of bandwidth needed to acquire and distribute the requested information.

    Parallel distributed ledger construction

    公开(公告)号:US11481359B2

    公开(公告)日:2022-10-25

    申请号:US17039323

    申请日:2020-09-30

    Abstract: Software generates a ledger fragment by generating a first block having first data in a first record data field, a nonce value in a first previous block pointer field, and a first hash in a first hash field. Generating the ledger fragment also includes generating a second block having second data in a second record data field, the first hash in a second previous block pointer field, and a second hash in a second hash field. The ledger fragment is appended to a main ledger with a linking block. The linking block is positioned between the first block of the ledger fragment and an end block of the main ledger. The linking block includes a third hash from the end block in a fourth previous block pointer field and the nonce value in a fourth hash field. The linking block is signed by a plurality of voting peers.

    Systems and methods for malware detection and mitigation

    公开(公告)号:US11451581B2

    公开(公告)日:2022-09-20

    申请号:US16417531

    申请日:2019-05-20

    Abstract: Disclosed herein are embodiments of systems, methods, and products comprise an analytic server, which detects and defends against malware in-flight regardless of the specific nature and methodology of the underlying attack. The analytic server learns the system's normal behavior during testing and evaluation phase and trains a machine-learning model based on the normal behavior. The analytic server monitors the system behavior during runtime comprising the runtime behavior of each sub-system of the system. The analytic server executes the machine-learning model and compares the system runtime behavior with the normal behavior to identify anomalous behavior. The analytic server executes one or more mitigation instructions to mitigate malware. Based on multiple available options for mitigating malware, the analytic server makes an intelligent decision and takes the least impactful action that have the least impact on the system to maintain mission assurance.

    Flight path generation based on model of connectivity

    公开(公告)号:US11450214B1

    公开(公告)日:2022-09-20

    申请号:US16681242

    申请日:2019-11-12

    Abstract: A method of generating a flight path for an aircraft is provided. The method includes modeling geographic space and time that includes a plurality of mobile communication nodes. The model includes locations of each of the plurality of mobile communication nodes as those nodes move over time. The model also provides an indication of wireless connectivity between a radio on each of the plurality of communication nodes and a radio of the aircraft at their respective location. The method further includes running a plurality of flight paths through the model in order to identify a selected flight path that provides a desired level of connectivity between the aircraft and the plurality of communication nodes.

    Systems and methods for generating real-time recommendations

    公开(公告)号:US11449553B2

    公开(公告)日:2022-09-20

    申请号:US17113165

    申请日:2020-12-07

    Abstract: A real-time recommendation system includes a non-transitory, computer-readable storage medium having encoded thereon instructions that a processor executes to receive data from data sources that includes one or more data records. The processor then identifies features in data of a data record, extracts and buffers the features, and applies the features to a feature detect mechanism. The feature detect mechanism includes feature detect algorithm and more recommender algorithms that are encapsulated in a feature detection object. The feature detection object may be a Strategy/Composite feature detection object that includes Strategy design patterns. The processor further executes to reject a feature in response to failures of the feature to match at least one of the Strategy design patterns, and in real time, select and install features that match one or more of the Strategy design patterns into one or more recommender algorithms.

    TRANSPARENT BRIDGE FOR MONITORING CRYPTO-PARTITIONED WIDE-AREA NETWORK

    公开(公告)号:US20220294808A1

    公开(公告)日:2022-09-15

    申请号:US17663597

    申请日:2022-05-16

    Abstract: This disclosure is directed to monitoring a crypto-partitioned, or cipher-text, wide-area network (WAN). A first computing device may be situated in a plain-text portion of a first enclave behind a first inline network encryptor (INE). A second device may be positioned in a plain-text portion of a second enclave behind a second INE. The two enclaves may be separated by a cipher-text WAN, over which the two enclaved may communicate. The first computing device may receive a data packet from the second computing device. The first computing device may then determine contents of a header of the data packet. The first computing device may, based at least in part on the contents of the header of the data packet, determine a status of the cipher-text WAN.

    Systems and methods for open threat hunt

    公开(公告)号:US11442766B1

    公开(公告)日:2022-09-13

    申请号:US16780547

    申请日:2020-02-03

    Abstract: Disclosed herein are embodiments of systems, methods, and products that provide adversary detection and threat hunting. A server may comprise a user side virtual machine facing the cyber protection users, a collection virtual machine facing the at-risk network, and a data repository. The server may receive user requests requesting status data from the at-risk network via the user side virtual machine. The server may collect status data from the at-risk network via the collection virtual machine and store the collected data into the data repository. Different users may request duplicate information from the at-risk network. The server may retrieve the requested information from the data repository for duplicate requests and return the responses immediately for such requests. Because the server does not query the at-risk network for duplicate requests, the server may reduce the amount of bandwidth needed to acquire and distribute the requested information.

Patent Agency Ranking