-
公开(公告)号:US10681069B2
公开(公告)日:2020-06-09
申请号:US15409760
申请日:2017-01-19
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Barak Raz , Sasi Siddharth Muthurajan
Abstract: A technique includes processing domain name system queries generated by a host to identify a subset of the queries for which domain names were not resolved. The technique includes using a time-based analysis to detect domain generation algorithm-based malware communications by the host, including detecting malicious communications by the host based at least in part on a number of the queries of the identified subset and a time span within which the queries of the subset were generated.
-
公开(公告)号:US10516692B2
公开(公告)日:2019-12-24
申请号:US15500527
申请日:2014-09-29
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Sasi Siddharth Muthurajan , Ronald Joseph Sechman
Abstract: Examples relate to detection of email-related vulnerabilities. The examples disclosed herein enable monitoring, at a runtime, application programming interface (API) calls made by a server-based application for the API calls related to at least one of a plurality of email protocols. A request to obtain a first set of data indicating a result of a vulnerability attack may be received from a vulnerability scanner. The examples disclosed herein enable identifying, at the runtime, an API call that has been made based on the vulnerability attack in response to receiving the request. The first set of data may be obtained, at the runtime, based on the API call. The examples disclosed herein further enable providing the first set of data to the vulnerability scanner to detect a vulnerability in the first set of data.
-
公开(公告)号:US10242199B2
公开(公告)日:2019-03-26
申请号:US15031454
申请日:2014-01-31
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Sasi Siddharth Muthurajan , Matias Madou , Prajakta Jagdale , Jeremy Brooks
Abstract: Example embodiments disclosed herein relate to a security test. A crawl of an application under test (AUT) is performed to determine an attack surface using crawl sessions. One or more parameters of the attack surface are probed during the respective crawl sessions. A trace is requested from an observer for the probe of the one or more parameters. Attack suggestions are received from the observer based on the trace of the one or more parameters.
-
公开(公告)号:US10182068B2
公开(公告)日:2019-01-15
申请号:US15500529
申请日:2014-11-26
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Alvaro Munoz , Sasi Siddharth Muthurajan
Abstract: Example embodiments disclosed herein relate to determination of vulnerability of an application under test using a runtime agent and network sniffer during a security test. A runtime agent monitors execution of an application under test. A network sniffer is used to identify a probe value for determination of the vulnerability.
-
公开(公告)号:US20180205753A1
公开(公告)日:2018-07-19
申请号:US15409760
申请日:2017-01-19
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Barak Raz , Sasi Siddharth Muthurajan
IPC: H04L29/06
Abstract: A technique includes processing domain name system queries generated by a host to identify a subset of the queries for which domain names were not resolved. The technique includes using a time-based analysis to detect domain generation algorithm-based malware communications by the host, including detecting malicious communications by the host based at least in part on a number of the queries of the identified subset and a time span within which the queries of the subset were generated.
-
公开(公告)号:US20160267277A1
公开(公告)日:2016-09-15
申请号:US15031454
申请日:2014-01-31
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Sasi Siddharth Muthurajan , Matias Madou , Prajakta Jagdale , Jeremy Brooks
IPC: G06F21/57
CPC classification number: G06F21/577 , G06F2221/033
Abstract: Example embodiments disclosed herein relate to a security test. A crawl of an application under test (AUT) is performed to determine an attack surface using crawl sessions. One or more parameters of the attack surface are probed during the respective crawl sessions. A trace is requested from an observer for the probe of the one or more parameters. Attack suggestions are received from the observer based on the trace of the one or more parameters.
Abstract translation: 本文公开的示例实施例涉及安全测试。 执行被测试应用程序(AUT)的爬取,以使用爬网会话确定攻击面。 攻击表面的一个或多个参数在相应的爬网会话期间被探测。 从观察者请求跟踪以探测一个或多个参数。 基于一个或多个参数的跟踪,从观察者接收到攻击建议。
-
-
-
-
-