System and method for de-anonymizing actions and messages on networks

    公开(公告)号:US10999295B2

    公开(公告)日:2021-05-04

    申请号:US16823421

    申请日:2020-03-19

    Abstract: A traffic-monitoring system that monitors encrypted traffic exchanged between IP addresses used by devices and a network, and further receives the user-action details that are passed over the network. By correlating between the times at which the encrypted traffic is exchanged and the times at which the user-action details are received, the system associates the user-action details with the IP addresses. In particular, for each action specified in the user-action details, the system identifies one or more IP addresses that may be the source of the action. Based on the IP addresses, the system may identify one or more users who may have performed the action. The system may correlate between the respective action-times of the encrypted actions and the respective approximate action-times of the indicated actions. The system may hypothesize that the indicated action may correspond to one of the encrypted actions having these action-times.

    System and method for identifying pairs of related application users

    公开(公告)号:US10958613B2

    公开(公告)日:2021-03-23

    申请号:US16228929

    申请日:2018-12-21

    Abstract: Systems and methods for passive monitoring of computer communication that does not require performing any decryption. A monitoring system receives the traffic exchanged with each relevant application server, and identifies, in the traffic, sequences of messages—or “n-grams”—that appear to belong to a communication session between a pair of users. Subsequently, based on the numbers and types of identified n-grams, the system identifies each pair of users that are likely to be related to one another via the application, in that these users used the application to communicate (actively and/or passively) with one another. The system may identify those sequences of messages that, by virtue of the sizes of the messages in the sequence, and/or other properties of the messages that are readily discernable, indicate a possible user-pair relationship.

    Call summary
    23.
    发明授权

    公开(公告)号:US10936641B2

    公开(公告)日:2021-03-02

    申请号:US15985157

    申请日:2018-05-21

    Abstract: A faster and more streamlined system for providing summary and analysis of large amounts of communication data is described. System and methods are disclosed that employ an ontology to automatically summarize communication data and present the summary to the user in a form that does not require the user to listen to the communication data. In one embodiment, the summary is presented as written snippets, or short fragments, of relevant communication data that capture the meaning of the data relating to a search performed by the user. Such snippets may be based on theme and meaning unit identification.

    Themes surfacing for communication data analysis

    公开(公告)号:US10860566B1

    公开(公告)日:2020-12-08

    申请号:US15623827

    申请日:2017-06-15

    Abstract: An embodiment of the method of processing communication data to identify one or more themes within the communication data includes identifying terms in a set of communication data, wherein a term is a word or short phrase, and defining relations in the set of communication data based on the terms, wherein the relation is a pair of terms that appear in proximity to one another. The method further includes identifying themes in the set of communication data based on the relations, wherein a theme is a group of one or more relations that have similar meanings, and storing the terms, the relations, and the themes in the database.

    SYSTEM AND METHOD FOR DECRYPTING COMMUNICATION EXCHANGED ON A WIRELESS LOCAL AREA NETWORK

    公开(公告)号:US20200382322A1

    公开(公告)日:2020-12-03

    申请号:US16994928

    申请日:2020-08-17

    Inventor: Eithan Goldfarb

    Abstract: Systems and methods for obtaining authentication vectors issued, for use by a mobile communication terminal, by a Home Location Register (HLR) that serves a cellular communication network independently of any cooperation with the cellular network. Further to obtaining the authentication vectors, a terminal is caused to communicate over a WiFi WLAN using an encryption key derived from the obtained authentication vectors, e.g., per the EAP-SIM or EAP-AKA protocol. Since the encryption key is known, communication from the terminal is decrypted. The authentication vectors may be obtained by (i) an “impersonating” Visitor Location Register (VLR) server that does not serve the cellular network; (ii) an interrogation device which, by imitating a legitimate base station serving the cellular network, solicits the mobile communication terminal to associate with the interrogation device; or (iii) an SS7 probe, which obtains authentication vectors communicated from the HLR server to other entities on the SS7 network.

    SYSTEM AND METHOD FOR IMPROVED ANOMALY DETECTION USING RELATIONSHIP GRAPHS

    公开(公告)号:US20200320106A1

    公开(公告)日:2020-10-08

    申请号:US16833762

    申请日:2020-03-30

    Inventor: Eithan Goldfarb

    Abstract: An anomaly-detection system that gathers information relating to the relationships between entities and represents these relationships in a graph that interconnects each pair of related entities. The graph may represent a computer network, in which each node corresponds to a respective device in the network and each edge between two nodes indicates that the devices represented by the nodes exchanged communication with one another in the past. the system monitors each of the entities in the graph, by continually computing a single-entity anomaly score (SEAS) for the entity. If the SEAS exceeds a first threshold the system generates an alert. Otherwise, the system checks whether the SEAS exceeds a second, lower threshold. If so, the system computes a subgraph anomaly score (SAS) for the entity's subgraph. If the SAS exceeds a SAS threshold, an alert is generated. By computing the SAS in this manner resources are conserved.

    SYSTEMS AND METHODS FOR KEYWORD SPOTTING USING ADAPTIVE MANAGEMENT OF MULTIPLE PATTERN MATCHING ALGORITHMS

    公开(公告)号:US20200304414A9

    公开(公告)日:2020-09-24

    申请号:US15411369

    申请日:2017-01-20

    Inventor: Yitshak Yishay

    Abstract: Methods and systems for keyword spotting, i.e., for identifying textual phrases of interest in input data. The input data may be communication packets exchanged in a communication network. A keyword spotting system holds a dictionary (or dictionaries) of textual phrases for searching input data. The input data and the patterns are assigned to multiple different pattern matching algorithms. For example, a share of the traffic is handled by one algorithm and smaller traffic shares may be handled by the others. The system monitors the algorithms performance as they process the data to search for a match. The ratio of traffic splitting among the algorithms is dynamically reassigned or adjusted to maximize the overall performance.

    SYSTEM AND METHOD FOR SOFT FAILOVERS FOR PROXY SERVERS

    公开(公告)号:US20200267067A1

    公开(公告)日:2020-08-20

    申请号:US16802986

    申请日:2020-02-27

    Inventor: Naomi Frid

    Abstract: A packet broker that performs a health-status check of a proxy server while the proxy server processes one or more proxy connections. The packet broker may attempt to exchange a heartbeat signal with the proxy server, and if unsuccessful, the proxy server is assumed to be failing. In such cases, a failover is desirable. Rather than implementing a “hard” failover, in which no further communication packets are directed to the proxy server, a “soft” failover is performed where the packet broker prevents new proxy connections from being processed by the proxy server, but maintains at least one (e.g., all) of the current proxy connections that are being processed by the proxy server.

    Systems and methods for keyword spotting using alternating search algorithms

    公开(公告)号:US10719540B2

    公开(公告)日:2020-07-21

    申请号:US15715038

    申请日:2017-09-25

    Inventor: Yitshak Yishay

    Abstract: Systems and methods for spotting keywords in data packets are provided. In particular, input data is received to be searched for occurrences of a set of patterns, the input data being divided into multiple segments. Then the input data and the patterns are assigned to first and second pattern matching algorithms, the first pattern matching algorithm is configured to search only within each of the segments, and the second pattern matching algorithm is configured to search across boundaries between adjacent segments. Then the input data is searched using the first and second pattern matching algorithms.

Patent Agency Ranking