Generating attack graphs in agile security platforms

A Hassanzadeh, A Nayak, MDS Ullah - US Patent 11,277,432, 2022 - Google Patents
Primary Examiner Don G Zhao (74) Attorney, Agent, or Firm-Fish & Richardson PC (57)
ABSTRACT Implementations of the present disclosure include providing a state graph …

Generating attack graphs in agile security platforms

E Hadar, A Hassanzadeh, D Grabois… - US Patent 11,184,385, 2021 - Google Patents
Implementations of the present disclosure include providing a graph that is representative of
an enterprise network and includes nodes and edges, a set of nodes representing assets …

Graph-based user tracking and threat detection

HKB Singh, V Kapoor, M Bog, Y Chen - US Patent 10,419,469, 2019 - Google Patents
Log data associated with at least one user session associated with an original user is
received. A logical graph is generated using at least a portion of the received log data. One …

Leveraging attack graphs of agile security platform

D Grabois, E Hadar, A Genachowski - US Patent 11,283,825, 2022 - Google Patents
Implementations of the present disclosure include receiving, from an agile security platform,
attack graph (AG) data representative of one or more AGs, each AG representing one or …

Generating attack graphs in agile security platforms

E Hadar, A Hassanzadeh, L O'connor - US Patent 11,159,555, 2021 - Google Patents
Implementations of the present disclosure include providing graph data defining a graph that
is representative of an enterprise network, the graph including nodes and edges between …

Extended user session tracking

M Bog, V Kapoor, SJ Pullara III, Y Chen… - US Patent …, 2019 - Google Patents
Network activity data is received, for example, from a set of agents reporting collectively
information about a set of hosts. The received network activity data is used to identify a user …

Generating attack graphs in agile security platforms

E Hadar, A Hassanzadeh, D Grabois, G Fidel… - US Patent …, 2022 - Google Patents
Implementations of the present disclosure include providing, by a security platform, graph
data defining a graph that is representative of an enterprise network, the graph including …

Using graph-based models to identify datacenter anomalies

V Kapoor, SJ Pullara III, M Bog, Y Chen… - US Patent …, 2020 - Google Patents
Activities within a network environment are monitored (eg, using agents). At least a portion of
the monitored activities are used to generate a logical graph model. The generated logical …

Generating attack graphs in agile security platforms

E Hadar, A Hassanzadeh, A Nayak - US Patent 11,232,235, 2022 - Google Patents
Implementations of the present disclosure include providing a graph representative of a
network, a set of nodes repre senting respective assets, each edge representing one or …

Malicious domain scoping recommendation system

LW DiValentin, DJ Cullinan - US Patent 11,122,063, 2021 - Google Patents
Identification of malicious network domains through use of links analysis of graph
representation of network activity, such as a bipartite graphs. An example method includes …