Detecting triggering events for distributed denial of service attacks

K Ackerman, MD Harris, SN Reed, AJ Thomas… - US Patent …, 2021 - Google Patents
An endpoint in an enterprise network is monitored, and when a potential trigger for a
distributed denial of service (DDoS) attack is followed by an increase in network traffic from …

Opening local applications from browsers

JL Newman, F Pape III, AA Bitaghsir… - US Patent …, 2018 - Google Patents
Abstract Systems and methods are disclosed herein for opening local applications from
browsers. A request to open a document associated with a cloud computing system is …

Static and dynamic device profile reputation using cloud-based machine learning

VJ Zimmer, JR Spurlock, R Venugopalan… - US Patent …, 2021 - Google Patents
Disclosed herein are cloud-based machine learning systems and methods for monitoring
networked devices to identify and classify characteristics, to infer typical or atypical behavior …

Polymorphic obfuscation of executable code

S Yang, J Overson, B Vinegar, B Zhang - US Patent 9,807,113, 2017 - Google Patents
Primary Examiner-Kaveh Abrishamkar (57) ABSTRACT This document generally relates to
systems, method, and other techniques for identifying and interfering with the operation of …

Detecting endpoint compromise based on network usage history

K Ackerman, MD Harris, KD Ray, AJ Thomas… - US Patent …, 2021 - Google Patents
In the context of network activity by an endpoint in an enterprise network, malware detection
is improved by using a combination of reputation information for a network address that is …

Protecting a server computer by detecting the identity of a browser on a client computer

JD Call, S Varadarajan, X Huang, X Zhou… - US Patent …, 2018 - Google Patents
A computer-implemented method for identifying abnormal computer behavior includes
receiving, at a computer server subsystem, data that characterizes subsets of particular …

Split serving of computer code

N Idika, JD Call - US Patent 10,230,718, 2019 - Google Patents
(57) ABSTRACT A computer-implemented method for securing a content server system is
disclosed. The method includes identifying that a request has been made by a client …

Detecting the introduction of alien content

JD Call, S Varadarajan, X Huang, X Zhou… - US Patent …, 2017 - Google Patents
A computer-implemented method for identifying abnormal computer behavior includes
receiving, at a computer server subsystem, data that characterizes subsets of particular …

Identity assurance method

D Edelman, A O'brion, K O'brien - US Patent 10,664,576, 2020 - Google Patents
Provided are computer-implemented methods and systems used in assuring a person's
identity that include the steps of receiving from the person one or more identifying …

Labeling network flows according to source applications

KD Ray, AJ Thomas, MD Harris - US Patent 11,277,416, 2022 - Google Patents
An enterprise security system is improved by instrumenting endpoints to explicitly label
network flows according to sources of network traffic. When a network message from an …