Methods for preventing cyber intrusions and phishing activity

J Wright, J Oberheide - US Patent 10,193,923, 2019 - Google Patents
Systems and methods for mitigating cyber intrusions includes: receiving target domain input,
wherein the target domain input comprises a domain name associated with a target entity or …

Large scale detection of IDN domain name masquerading

Y Elsayed, A Shosha - 2018 APWG Symposium on Electronic …, 2018 - ieeexplore.ieee.org
Introducing Unicode characters to domain names enabled end users to register a domain
name in different languages, ie, Russian, Arabic or Chinese. This process is defined as …

System and method for detecting homoglyph attacks with a siamese convolutional neural network

J Woodbridge, A Ahuja, D Grant - US Patent App. 15/649,348, 2019 - Google Patents
The present invention utilizes computer vision technologies to identify potentially malicious
URLs and executable files in a computing device. In one embodiment, a Siamese …

Methods and systems for implementing a phishing assessment

J Oberheide - US Patent 9,961,101, 2018 - Google Patents
A system, method, and computer program product for implementing a phishing assessment
of a target computer network that includes a phishing assessment platform for generating …

Convolutional neural network based ensemble approach for homoglyph recognition

MTH Majumder, MM Rahman, A Iqbal… - Mathematical and …, 2020 - mdpi.com
Homoglyphs are pairs of visual representations of Unicode characters that look similar to the
human eye. Identifying homoglyphs is extremely useful for building a strong defence …

Computer-implemented methods and systems for identifying visually similar text character strings

RW Wallace III - US Patent 10,320,815, 2019 - Google Patents
Methods and systems are disclosed for selecting text character strings from a corpus of
relevant strings that would commonly be considered to be visually similar to human viewer …

Service defense techniques

EJ Brandwine, SE Schmidt - US Patent 10,346,623, 2019 - Google Patents
A computing resource service provider may operate one or more services configured to
provide customers with access to computing resources. Attackers may attempt to exfiltrate …

Detection of domain name impersonation

E Schulman, G Akuka - US Patent 11,212,313, 2021 - Google Patents
(57) ABSTRACT A method for evaluating domain names includes storing a listing, for a
plurality of non-ASCII Unicode characters, of corresponding ASCII characters that are …

Identifying and trapping wireless based attacks on networks using deceptive network emulation

G Drummond, P Vilevac - US Patent 10,257,226, 2019 - Google Patents
(57) ABSTRACT A system and method are provided that enable identifying and trapping
cyber security attacks via wireless connectivity on enterprise and corporate networks. A …

Methods and systems for implementing a phishing assessment

J Oberheide - US Patent 10,505,968, 2019 - Google Patents
A system, method, and computer program product for implementing a phishing assessment
of a target computer network that includes a phishing assessment platform for generating …