Detecting malicious lateral movement across a computer network

JW Stokes III, RJ Mead, TW Burrell, I Hellen… - US Patent …, 2019 - Google Patents
Graph-based detection systems and techniques are provided to identify potential malicious
lateral movement paths. System and security events may be used to generate a network …

Resource-centric network cyber attack warning system

C Zorlular, B Brown, XR Tang, A Serenhov… - US Patent …, 2020 - Google Patents
A computer system may generate alerts related to a potential cyber attack an resource of an
organization. The computer system may receive activity information associated with activity …

Lateral movement detection through graph-based candidate selection

SKJ DURAIRAJ, S Miskovic… - US Patent …, 2019 - Google Patents
A lateral movement application identifies lateral movement (LM) candidates that potentially
represent a security threat. Security platforms generate event data when performing security …

Secure endpoint in a heterogenous enterprise network

MD Grimm, D Stutz, AJ Thomas, KD Ray - US Patent 11,140,195, 2021 - Google Patents
An endpoint in an enterprise network is configured to respond to internal and external
detections of compromise in a manner that permits the endpoint to cooperate with other …

Continuous learning for intrusion detection

P Luo, RH Briggs, N Ahmad - US Patent 10,397,258, 2019 - Google Patents
Balancing the observed signals used to train network intrusion detection models allows for a
more accurate allocation of computing resources to defend the network from malicious …

Detecting lateral movement by malicious applications

AJ Thomas, D Stutz - US Patent 11,184,392, 2021 - Google Patents
Attempts at lateral movement are detected by monitoring failed login attempts across a
number of endpoints in a network. By configuring endpoints across the network to report …

Securing endpoints in a heterogenous enterprise network

MD Grimm, D Stutz, AJ Thomas, KD Ray - US Patent 11,271,950, 2022 - Google Patents
Endpoints within a subnet of a heterogeneous network are configured to cooperatively
respond to internal or external notifications of compromise in order to protect the endpoints …

Graph-based detection of lateral movement

SKJ DURAIRAJ, S Miskovic… - US Patent …, 2021 - Google Patents
A lateral movement application identifies lateral movement (LM) candidates that potentially
represent a security threat. Security platforms generate event data when performing security …

Device management based on groups of network adapters

MD Grimm, D Stutz, AJ Thomas, KD Ray - US Patent 10,972,431, 2021 - Google Patents
Secure management of an enterprise network is improved by creating a network adapter
fingerprint for an endpoint that identifies all of the network adapters for that endpoint. With …

Authentication incident detection and management

V Vissamsetty, S Vissamsetti, N Jyoti… - US Patent …, 2020 - Google Patents
In information technology, attackers use stolen credentials to reuse and move laterally in the
network from computer to computer. The term Pass-the-Hash (PtH) attack involves using a …