-
公开(公告)号:US20240220613A1
公开(公告)日:2024-07-04
申请号:US18148183
申请日:2022-12-29
发明人: Erez Israel , Dan Karpati , Eitan Shterenbaum , Lior Goldman
IPC分类号: G06F21/55
CPC分类号: G06F21/554 , G06F2221/033
摘要: Methods and devices are provided for differentiating between benign DNS data and malicious DNS data included in DNS traffic using an autoencoder. The autoencoder receives input DNS data and is trained to successfully encode the input DNS data when the input DNS data is benign DNS data and to fail to encode the input DNS data when the input DNS data is malicious DNS data. The autoencoder is trained using a modified loss function having a large weight when successfully encoding malicious DNS data.
-
公开(公告)号:US20240015099A1
公开(公告)日:2024-01-11
申请号:US17811609
申请日:2022-07-11
发明人: Tal Vainshtein , Ofer Raz
IPC分类号: H04L45/302 , H04L45/42 , H04L45/12 , H04L45/00
CPC分类号: H04L45/304 , H04L45/42 , H04L45/123 , H04L45/566
摘要: A method and network gateway are provided for routing network traffic between internet service providers (ISPs) based on dynamic communication quality of the ISPs. Dynamic communication quality of the ISPs are monitored and compared by processor circuitry of the network gateway. When a session-based connection is being transmitted on an ISP having dynamic communication quality that does not meet a required communication quality of the connection, the processor circuitry transitions the session-based connection to an ISP meeting the required communication quality of the connection.
-
公开(公告)号:US20230325503A1
公开(公告)日:2023-10-12
申请号:US17703210
申请日:2022-03-24
发明人: Liran Orevi , Haggai David
IPC分类号: G06F21/56
CPC分类号: G06F21/568 , G06F2221/033
摘要: A system, method, and device are provided for detecting and mitigating a storage attack at the block level by generating canary blocks by marking blocks of data (referred to as memory blocks) such that other programs do not modify these canary blocks that are monitored to detect data storage attacks that attempt to modify the canary blocks and/or by monitoring statistical and behavioral features of activities over blocks, whether they can be modified by other programs or not. The system and method also backup the memory blocks by backing up memory blocks as they are modified. When a data storage attack is detected, the attack is stopped, and the files are remediated using the backup of the affected memory blocks.
-
54.
公开(公告)号:US11550934B2
公开(公告)日:2023-01-10
申请号:US17202471
申请日:2021-03-16
发明人: Tamir Zegman
IPC分类号: G06F21/60 , G06F40/117 , G06T7/194 , G06T7/149 , G06V30/412 , G06V30/414
摘要: A method is provided for identifying improperly redacted information in documents. The documents are analyzed to detect redacted areas and text elements and to identify an intersection between a redacted area and a text element. When an area of the intersection is greater than an intersection threshold, the document is identified as containing improperly redacted information.
-
55.
公开(公告)号:US20220124103A1
公开(公告)日:2022-04-21
申请号:US17565491
申请日:2021-12-30
发明人: Ilan URIEL
IPC分类号: H04L43/028
摘要: An instantiated application includes both a runtime instantiation of an application image, and an administrative service operable to install in the instantiated application at least one security module during runtime of the instantiated application in a container. Prior to runtime, a design time agent can access the application image in a repository, examine the application image, and based on the examining, adding at least one security module to the application image prior to instantiation. During runtime, a runtime agent can query parameters of the container, such as static and dynamic variables available on the machine on which the container is running. The runtime agent processes these parameters in conjunction with predefined rules to determine an action such as starting, stopping, adding, and/or changing the security module, such as the method of packet inspection.
-
公开(公告)号:US11165820B2
公开(公告)日:2021-11-02
申请号:US14881180
申请日:2015-10-13
发明人: Oded Vanunu , Liad Mizrachi
摘要: Computerized methods and systems detect unauthorized and potentially malicious, as well as malicious records, typically in the form of electronic forms, such as those where users input information (into input blocks or fields), such as bank and financial institution electronic forms and the like. Should such an unauthorized form, be detected, the detection causes the taking of protective action by the computer whose on whose browser the unauthorized form has been rendered.
-
57.
公开(公告)号:US20200304531A1
公开(公告)日:2020-09-24
申请号:US16896315
申请日:2020-06-09
发明人: Aliaksandr CHAILYTKO
摘要: Computerized methods and systems identify malware enabled by automatically generated domain names. An agent executes a malware, in a controlled environment, at a first temporal input value and a second temporal input value. A first set of domain names is generated in response to the execution at the first temporal input value. A second set of domain names is generated in response to the execution at the second temporal input value. The agent compares the first set of domain names with the second set of domain names to produce a comparison output metric.
-
58.
公开(公告)号:US10728266B2
公开(公告)日:2020-07-28
申请号:US15677084
申请日:2017-08-15
发明人: Aliaksandr Chailytko
摘要: Computerized methods and systems identify malware enabled by automatically generated domain names. An agent executes a malware, in a controlled environment, at a first temporal input value and a second temporal input value. A first set of domain names is generated in response to the execution at the first temporal input value. A second set of domain names is generated in response to the execution at the second temporal input value. The agent compares the first set of domain names with the second set of domain names to produce a comparison output metric.
-
公开(公告)号:US20190124059A1
公开(公告)日:2019-04-25
申请号:US15787781
申请日:2017-10-19
发明人: Amnon PERLMUTTER , Lior Drihem , Yair Ziv , Jeremy Sinai , Tsemach Mizrachi
IPC分类号: H04L29/06
摘要: Transparently identifying users using a shared VPN tunnel uses an innovative method to detect a user of a shared VPN tunnel, after authenticating the user, using an assigned userid (that may be a virtual IP). The virtual IP is used as a cookie in each request made by the user. This cookie is an authentication token used by the gateway to detect the user behind a specific request for an Internet resource (such as an http/s request). The cookie is stripped by the gateway so the cookie is not sent to the resource.
-
公开(公告)号:US20190068556A1
公开(公告)日:2019-02-28
申请号:US15691820
申请日:2017-08-31
发明人: Amnon PERLMUTTER , Lior DRIHEM
IPC分类号: H04L29/06
摘要: Cyber security protection from, and avoiding inspection bypass, in network communication connections, in particular due to DNS poisoning or HTTP HOST header spoofing includes receiving a request for a resource. Typically, the request is received by a proxy from a web browser on a client for a web page on a server. The request is communicated via transport layer security (TLS) protocol. The TLS protocol includes a server name indication (SNI) extension and the SNI extension includes a first location of the resource. A connection is initiated, by the proxy, to the first location (included in said SNI extension), ignoring a second location in the original request.
-
-
-
-
-
-
-
-
-