DNS TUNNELING DETECTION AND PREVENTION
    51.
    发明公开

    公开(公告)号:US20240220613A1

    公开(公告)日:2024-07-04

    申请号:US18148183

    申请日:2022-12-29

    IPC分类号: G06F21/55

    CPC分类号: G06F21/554 G06F2221/033

    摘要: Methods and devices are provided for differentiating between benign DNS data and malicious DNS data included in DNS traffic using an autoencoder. The autoencoder receives input DNS data and is trained to successfully encode the input DNS data when the input DNS data is benign DNS data and to fail to encode the input DNS data when the input DNS data is malicious DNS data. The autoencoder is trained using a modified loss function having a large weight when successfully encoding malicious DNS data.

    NETWORK TRAFFIC ROUTING IN AN SD-WAN
    52.
    发明公开

    公开(公告)号:US20240015099A1

    公开(公告)日:2024-01-11

    申请号:US17811609

    申请日:2022-07-11

    摘要: A method and network gateway are provided for routing network traffic between internet service providers (ISPs) based on dynamic communication quality of the ISPs. Dynamic communication quality of the ISPs are monitored and compared by processor circuitry of the network gateway. When a session-based connection is being transmitted on an ISP having dynamic communication quality that does not meet a required communication quality of the connection, the processor circuitry transitions the session-based connection to an ISP meeting the required communication quality of the connection.

    SYSTEM AND METHOD FOR PROTECTING AGAINST DATA STORAGE ATTACKS

    公开(公告)号:US20230325503A1

    公开(公告)日:2023-10-12

    申请号:US17703210

    申请日:2022-03-24

    IPC分类号: G06F21/56

    CPC分类号: G06F21/568 G06F2221/033

    摘要: A system, method, and device are provided for detecting and mitigating a storage attack at the block level by generating canary blocks by marking blocks of data (referred to as memory blocks) such that other programs do not modify these canary blocks that are monitored to detect data storage attacks that attempt to modify the canary blocks and/or by monitoring statistical and behavioral features of activities over blocks, whether they can be modified by other programs or not. The system and method also backup the memory blocks by backing up memory blocks as they are modified. When a data storage attack is detected, the attack is stopped, and the files are remediated using the backup of the affected memory blocks.

    METHODS AND SYSTEM FOR PACKET CONTROL AND INSPECTION IN CONTAINERS AND MESHED ENVIRONMENTS

    公开(公告)号:US20220124103A1

    公开(公告)日:2022-04-21

    申请号:US17565491

    申请日:2021-12-30

    发明人: Ilan URIEL

    IPC分类号: H04L43/028

    摘要: An instantiated application includes both a runtime instantiation of an application image, and an administrative service operable to install in the instantiated application at least one security module during runtime of the instantiated application in a container. Prior to runtime, a design time agent can access the application image in a repository, examine the application image, and based on the examining, adding at least one security module to the application image prior to instantiation. During runtime, a runtime agent can query parameters of the container, such as static and dynamic variables available on the machine on which the container is running. The runtime agent processes these parameters in conjunction with predefined rules to determine an action such as starting, stopping, adding, and/or changing the security module, such as the method of packet inspection.

    Web injection protection method and system

    公开(公告)号:US11165820B2

    公开(公告)日:2021-11-02

    申请号:US14881180

    申请日:2015-10-13

    摘要: Computerized methods and systems detect unauthorized and potentially malicious, as well as malicious records, typically in the form of electronic forms, such as those where users input information (into input blocks or fields), such as bank and financial institution electronic forms and the like. Should such an unauthorized form, be detected, the detection causes the taking of protective action by the computer whose on whose browser the unauthorized form has been rendered.

    METHODS AND SYSTEMS FOR IDENTIFYING MALWARE ENABLED BY AUTOMATICALLY GENERATED DOMAIN NAMES

    公开(公告)号:US20200304531A1

    公开(公告)日:2020-09-24

    申请号:US16896315

    申请日:2020-06-09

    IPC分类号: H04L29/06 H04L29/12

    摘要: Computerized methods and systems identify malware enabled by automatically generated domain names. An agent executes a malware, in a controlled environment, at a first temporal input value and a second temporal input value. A first set of domain names is generated in response to the execution at the first temporal input value. A second set of domain names is generated in response to the execution at the second temporal input value. The agent compares the first set of domain names with the second set of domain names to produce a comparison output metric.

    Methods and systems for identifying malware enabled by automatically generated domain names

    公开(公告)号:US10728266B2

    公开(公告)日:2020-07-28

    申请号:US15677084

    申请日:2017-08-15

    IPC分类号: H04L29/06 H04L29/12

    摘要: Computerized methods and systems identify malware enabled by automatically generated domain names. An agent executes a malware, in a controlled environment, at a first temporal input value and a second temporal input value. A first set of domain names is generated in response to the execution at the first temporal input value. A second set of domain names is generated in response to the execution at the second temporal input value. The agent compares the first set of domain names with the second set of domain names to produce a comparison output metric.

    METHOD TO IDENTIFY USERS BEHIND A SHARED VPN TUNNEL

    公开(公告)号:US20190124059A1

    公开(公告)日:2019-04-25

    申请号:US15787781

    申请日:2017-10-19

    IPC分类号: H04L29/06

    摘要: Transparently identifying users using a shared VPN tunnel uses an innovative method to detect a user of a shared VPN tunnel, after authenticating the user, using an assigned userid (that may be a virtual IP). The virtual IP is used as a cookie in each request made by the user. This cookie is an authentication token used by the gateway to detect the user behind a specific request for an Internet resource (such as an http/s request). The cookie is stripped by the gateway so the cookie is not sent to the resource.

    METHOD TO AVOID INSPECTION BYPASS DUE TO DNS POISONING OR HTTP HOST HEADER SPOOFING

    公开(公告)号:US20190068556A1

    公开(公告)日:2019-02-28

    申请号:US15691820

    申请日:2017-08-31

    IPC分类号: H04L29/06

    摘要: Cyber security protection from, and avoiding inspection bypass, in network communication connections, in particular due to DNS poisoning or HTTP HOST header spoofing includes receiving a request for a resource. Typically, the request is received by a proxy from a web browser on a client for a web page on a server. The request is communicated via transport layer security (TLS) protocol. The TLS protocol includes a server name indication (SNI) extension and the SNI extension includes a first location of the resource. A connection is initiated, by the proxy, to the first location (included in said SNI extension), ignoring a second location in the original request.