Vectra Ai, Inc.

United States of America

Back to Profile

1-39 of 39 for Vectra Ai, Inc. Sort by
Query
Aggregations
IP Type
        Patent 32
        Trademark 7
Jurisdiction
        United States 33
        World 5
        Europe 1
Date
2024 4
2023 8
2022 1
2021 2
2020 2
See more
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 19
H04L 9/40 - Network security protocols 12
G06F 21/55 - Detecting local intrusion or implementing counter-measures 5
G06F 12/14 - Protection against unauthorised use of memory 3
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements 3
See more
NICE Class
42 - Scientific, technological and industrial services, research and design 7
09 - Scientific and electric apparatus and instruments 5
Status
Pending 6
Registered / In Force 33

1.

METHOD, PRODUCT, AND SYSTEM FOR AUTOMATICALLY ISOLATING MALICIOUS SECURITY ALERTS FROM BENIGN ALERTS USING AN ENSEMBLE MODEL OF PATTERN RECOGNITION TECHNIQUES

      
Application Number 18525672
Status Pending
Filing Date 2023-11-30
First Publication Date 2024-06-13
Owner Vectra AI, Inc. (USA)
Inventor
  • Chen, Hsin
  • Mhatre, Himanshu
  • Javed, Irina
  • Hannah, Daniel Carlton

Abstract

Disclosed is an improved approach for managing security alerts to automatically isolate malicious security alerts from benign alerts using an ensemble model of pattern recognition techniques. In some embodiments, the approach provides for automatically isolating security alerts of malicious attack from security alerts that correspond to undesirable, yet benign, activity in computer networks, cloud infrastructures and SAAS applications. Specifically, the approach provides for qualitative contextual assessments of these alerts using an ensemble of models. These ensemble models leverage a history of security events on a computer network, cloud infrastructure and SAAS applications to determine a level of relevance for received alerts and determine, based on that level of relevance, how or if they should be presented to an administrator.

IPC Classes  ?

2.

METHOD, PRODUCT, AND SYSTEM FOR TRANSLATING ENTITY PRIORITIZATION RULES TO A CONTINUOUS NUMERICAL SPACE

      
Application Number US2023083447
Publication Number 2024/124250
Status In Force
Filing Date 2023-12-11
Publication Date 2024-06-13
Owner VECTRA AI, INC. (USA)
Inventor
  • Hannah, Daniel Carlton
  • Mhatre, Himanshu
  • Kazerounian, Sohrob
  • Wade, Timothy John
  • Lynn, Karl
  • Malone, Stephen

Abstract

Disclosed is an improved approach for translating entity prioritization rules to a continuous numerical space. In some embodiments, the approach provided is a system for using qualitative prioritization criteria to train a system that generates quantitative urgency scores for entities. In some embodiments, this comprises an embedding scheme that enables the translation of entity infonnation and their related alerts to a set of qualitative labels based on at least quantitative information. Generally, the system includes a set of analyst actions that establish desired mappings which are used to train a more general model that maps entity embeddings to responses. In some embodiments, the approach comprises one or more models that receive an entity embedding as an input and outputs a score that characterizes the urgency of the response warranted for that entity. In some embodiments, this is performed using various features (e.g., importance, actor type, velocity', and breadth).

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
  • G06N 5/00 - Computing arrangements using knowledge-based models

3.

METHOD, PRODUCT, AND SYSTEM FOR TRANSLATING ENTITY PRIORITIZATION RULES TO A CONTINUOUS NUMERICAL SPACE

      
Application Number 18525702
Status Pending
Filing Date 2023-11-30
First Publication Date 2024-06-13
Owner Vectra AI, Inc. (USA)
Inventor
  • Hannah, Daniel Carlton
  • Mhatre, Himanshu
  • Kazerounian, Sohrob
  • Wade, Timothy John
  • Lynn, Karl
  • Malone, Stephen

Abstract

Disclosed is an improved approach for translating entity prioritization rules to a continuous numerical space. In some embodiments, the approach provided is a system for using qualitative prioritization criteria to train a system that generates quantitative urgency scores for entities. In some embodiments, this comprises an embedding scheme that enables the translation of entity information and their related alerts to a set of qualitative labels based on at least quantitative information. Generally, the system includes a set of analyst actions that establish desired mappings which are used to train a more general model that maps entity embeddings to responses. In some embodiments, the approach comprises one or more models that receive an entity embedding as an input and outputs a score that characterizes the urgency of the response warranted for that entity. In some embodiments, this is performed using various features (e.g., importance, actor type, velocity, and breadth).

IPC Classes  ?

4.

METHOD, PRODUCT, AND SYSTEM FOR AUTOMATICALLY ISOLATING MALICIOUS SECURITY ALERTS FROM BENIGN ALERTS USING AN ENSEMBLE MODEL OF PATTERN RECOGNITION TECHNIQUES

      
Application Number US2023083443
Publication Number 2024/124248
Status In Force
Filing Date 2023-12-11
Publication Date 2024-06-13
Owner VECTRA AI, INC. (USA)
Inventor
  • Chen, Hsin
  • Mhatre, Himanshu
  • Javed, Irina
  • Hannah, Daniel Carlton

Abstract

Disclosed is an improved approach for managing security alerts to automatically isolate malicious security alerts from benign alerts using an ensemble model of pattern recognition techniques. In some embodiments, the approach provides for automatically isolating security alerts of malicious attack from security alerts that correspond to undesirable, yet benign, activity in computer networks, cloud infrastructures and SAAS applications. Specifically, the approach provides for qualitative contextual assessments of these alerts using an ensemble of models. These ensemble models leverage a history of security events on a computer network, cloud infrastructure and SAAS applications to determine a level of relevance for received alerts and determine, based on that level of relevance, how or if they should be presented to an administrator.

IPC Classes  ?

5.

METHOD, PRODUCT, AND SYSTEM FOR GENERATING A SOFTWARE REPRESENTATION THAT EMBODIES NETWORK CONFIGURATION AND POLICY DATA OF A COMPUTER NETWORK FOR USE IN SECURITY MANAGEMENT

      
Application Number 17711850
Status Pending
Filing Date 2022-04-01
First Publication Date 2023-10-05
Owner Vectra AI, Inc. (USA)
Inventor
  • Beauchesne, Nicolas
  • Kazerounian, Sohrob
  • Finlayson, Iv, William Stow
  • Lynn, Karl Matthew

Abstract

Disclosed is an approach for generating a software representation that embodies network configuration and policy data of a computer network for use in security management. The software representation comprises a state machine where different states can be reached using respective transitions or properties which are possible as determined based on the network configuration and network policy data. The states correspond to respective entities on the network which may comprise resources that are identifiable for protection. The software representation can then be stimulated with various inputs to identify sequences of state-to-state transitions which may in turn be processed to generate corresponding detection signatures for use in monitoring the network.

IPC Classes  ?

6.

Method, product, and system for generating detection signatures based on attack paths in a computer network identified using a software representation that embodies network configuration and policy data for security management using detection signature templates

      
Application Number 17711903
Grant Number 12219070
Status In Force
Filing Date 2022-04-01
First Publication Date 2023-10-05
Grant Date 2025-02-04
Owner Vectra AI, Inc. (USA)
Inventor
  • Beauchesne, Nicolas
  • Kazerounian, Sohrob
  • Finlayson, Iv, William Stow
  • Lynn, Karl Matthew

Abstract

Disclosed is an approach for generating detection signatures based on analysis of a software representation of what is possible in a computer network based on network configuration data and network policy data. In some embodiments, the process includes maintaining a plurality of detection signature templates, generation of detection signatures (detection signature instances) using respective detection signature templates that are selected based on the analysis of the software representation. In some embodiments, detection signatures templates are of different type and may be deployed at different locations based on their respective type(s), such as at source, destination.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 47/70 - Admission controlResource allocation
  • H04L 47/762 - Admission controlResource allocation using dynamic resource allocation, e.g. in-call renegotiation requested by the user or requested by the network in response to changing network conditions triggered by the network

7.

METHOD, PRODUCT, AND SYSTEM FOR SOLVING ARBITRARY CONSTRAINT SATISFACTION PROBLEMS

      
Application Number 18108383
Status Pending
Filing Date 2023-02-10
First Publication Date 2023-10-05
Owner Vectra AI, Inc. (USA)
Inventor
  • Beauchesne, Nicolas
  • Kazerounian, Sohrob
  • Finlayson, Iv, William Stow
  • Lynn, Karl Matthew

Abstract

Disclosed is an approach for solving arbitrary constraint satisfaction problems. In some embodiments, the approach includes a process to generate a software representation of what is possible based on a system corresponding to the constraint satisfaction problem. The software representation comprises a state machine where different states can be reached using respective transitions or properties which are possible as determined based on a current state of the system and parameters thereof whether global or otherwise.

IPC Classes  ?

8.

METHOD, PRODUCT, AND SYSTEM FOR NETWORK SECURITY MANAGEMENT USING A REASONING AND INFERENCE ENGINE

      
Application Number 18128549
Status Pending
Filing Date 2023-03-30
First Publication Date 2023-10-05
Owner Vectra AI, Inc. (USA)
Inventor
  • Beauchesne, Nicolas
  • Kazerounian, Sohrob
  • Finlayson, Iv, William Stow
  • Lynn, Karl Matthew

Abstract

Disclosed herein is an approach that includes providing a system for managing and expanding knowledge in a knowledge base. In some embodiments, the system comprises an expert system which performs a number of functions including data ingestion, application of a data retention policy, monitoring of a network system including deployments of detection signatures on the network system, response and alert management, posturing, and relevant automation. In some embodiments, the expert system interconnects with a war gaming engine to identify attack vectors to protected resources. In some embodiments, a collection of functions or modules is provided in place of the expert system—e.g., traditional programing techniques are used to provide functions or modules to perform similar processes using one or more function calls between the provided functions or modules.

IPC Classes  ?

9.

Method, product, and system for network security management using software representation that embodies network configuration and policy data

      
Application Number 17711811
Grant Number 12328322
Status In Force
Filing Date 2022-04-01
First Publication Date 2023-10-05
Grant Date 2025-06-10
Owner Vectra AI, Inc. (USA)
Inventor
  • Beauchesne, Nicolas
  • Kazerounian, Sohrob
  • Finlayson, Iv, William Stow
  • Lynn, Karl Matthew

Abstract

Disclosed is an approach for network security management using software representation that embodies network configuration and policy data. In some embodiments, the approach includes a process to generate a software representation of what is possible based on a network configuration and policy data. The software representation comprises a state machine where different states can be reached using respective transitions or properties why are possible as determined based on the network configuration and policy data. The states correspond to respective entities on the network which may comprise resources that are identifiable for protection. The software representation can then be stimulated to identify sequences of state-to-state transitions which may in turn be processed to generate corresponding detection signatures for use in monitoring the network.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols

10.

Method, product, and system for analyzing a computer network to identify attack paths using a software representation that embodies network configuration and policy data for security management

      
Application Number 17711868
Grant Number 12212585
Status In Force
Filing Date 2022-04-01
First Publication Date 2023-10-05
Grant Date 2025-01-28
Owner Vectra AI, Inc. (USA)
Inventor
  • Beauchesne, Nicolas
  • Kazerounian, Sohrob
  • Finlayson, Iv, William Stow
  • Lynn, Karl Matthew

Abstract

Disclosed is an approach for analyzing a computer network to identify attack paths using a software representation that embodies network configuration and policy data for security management. The software representation comprises a state machine where different states can be reached using respective transitions or properties which are possible as determined based on the network configuration and network policy data. The states correspond to respective entities on the network which may comprise resources that are identifiable for protection in the software representation using crash statements. The software representation can then be stimulated using software analysis tools such as fuzzers to identify sequences of state-to-state transitions that could be used to compromise a protected resource on the computer network.

IPC Classes  ?

11.

METHOD, PRODUCT, AND SYSTEM FOR ANALYZING ATTACK PATHS IN COMPUTER NETWORK GENERATED USING A SOFTWARE REPRESENTATION THAT EMBODIES NETWORK CONFIGURATION AND POLICY DATA FOR SECURITY MANAGEMENT

      
Application Number 17711884
Status Pending
Filing Date 2022-04-01
First Publication Date 2023-10-05
Owner Vectra AI, Inc. (USA)
Inventor
  • Beauchesne, Nicolas
  • Kazerounian, Sohrob
  • Finlayson, Iv, William Stow
  • Lynn, Karl Matthew

Abstract

Disclosed is an approach for analyzing attack paths in computer network generated using a software representation that embodies network configuration and policy data for security management. In some embodiments, the approach includes a process to analyze attack paths in a computer network to determine which attack paths might be most productively covered using a corresponding detection signature. In some embodiments, the attack paths are identified using a software representation that embodies network configuration and policy data. The software representation comprises a state machine where different states can be reached using respective transitions or properties. The states correspond to respective entities on the network which may comprise resources that are identifiable for protection in the software representation using crash statements. The software representation can then be stimulated using software analysis tools such to identify sequences of state-to-state transitions that could be used to compromise a protected resource on the computer network.

IPC Classes  ?

12.

ATTACK SIGNAL INTELLIGENCE

      
Application Number 1731430
Status Registered
Filing Date 2023-04-07
Registration Date 2023-04-07
Owner VECTRA AI, INC. (USA)
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer services for automating the real-time detection, mitigation, prioritization and/or prediction of cyber threats and strikes; computer services for the development, implementation and delivery of artificial intelligence, machine learning and deep learning for use in controlling automated hunting, triaging and correlating of cyber-security threats within network packets, system log data, application log data, authentication log data, host data and customer supplied data; providing software as a service for cyber-security, detecting, mitigating, prioritizing and/or predicting advanced on-premise, cloud and/or hybrid network threats and strikes using artificial intelligence, machine learning and/or deep learning; computer services for the development of artificial intelligence and machine learning computer systems, including deep learning for continuous data collection, acquisition, compilation, correlation, retrieval, analysis and classification of data from on-premise, cloud and/or hybrid network traffic, on-premise, cloud and/or hybrid network communication, on-premise, cloud and/or hybrid network flow data, and on-premise, cloud and/or hybrid network intercommunication; providing computer services, namely, developing customized artificial intelligence services for continuous monitoring, identifying, verifying, analyzing, correlating, comparing, classifying, sorting and scoring of data collection, acquisition from on-premise, cloud and/or hybrid network traffic, on-premise, cloud and/or hybrid network communication, on-premise, cloud and/or hybrid network flow data, and on-premise, cloud and/or hybrid network intercommunication, acquisition and compilation of data into specific areas, event triage, threat analysis threat correlation and system and application logs created and identified by artificial intelligence, machine learning and/or deep learning; computer services for others, namely, development of Natural Language Processing (NLP), Computational Linguistics (CL), Information Retrieval (IR) and Machine Learning (ML) computer systems which are capable of understanding general human queries and formulating responses; computer systems analysis; integration of computer systems and on-premise, cloud and/or hybrid networks; computer services, namely, computer system administration for systems used in commercial interactions over global computer on-premise, cloud and/or hybrid networks; scientific and industrial research, namely, research and development of new cybersecurity products or threat intelligence systems; Technical research in the field of computers that integrate Natural Language Processing (NLP), Computational Linguistics (CL), Information Retrieval (IR) and Machine Learning (ML) which is capable of understanding general human queries and formulating responses, and scientific research for cyber-security purposes; computer consultation services for threat detection and response; computer consulting services in the field of security operations; all of the above relating specifically to analytical computing technologies that provide multi-modal natural language processing, generation, reasoning and machine learning for contextual cyber-security threat analysis and response, and natural interaction.

13.

ATTACK SIGNAL INTELLIGENCE

      
Serial Number 97641318
Status Registered
Filing Date 2022-10-20
Registration Date 2024-09-17
Owner VECTRA AI, INC. ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer services for automating the real-time detection, mitigation, prioritization and prediction of cyber threats and strikes, namely, software as a service (SAAS) services featuring software for automating the real-time detection, mitigation, prioritization and prediction of cyber threats and strikes; development and implementation of software in the field of artificial intelligence, machine learning and deep learning for use in controlling automated hunting, triaging and correlating of cyber-security threats within network packets, system log data, application log data, authentication log data, host data and customer supplied data; providing software as a service (SAAS) services featuring software for cyber-security in the nature of detecting, mitigating, prioritizing and predicting advanced on-premise, cloud and hybrid network threats and strikes using artificial intelligence, machine learning and deep learning; computer services for the development of artificial intelligence and machine learning computer software systems using deep learning for the purpose of continuous data collection, acquisition, compilation, correlation, retrieval, analysis and classification of data from on-premise, cloud and hybrid network traffic, on-premise, cloud and hybrid network communication, on-premise, cloud and hybrid network flow data, and on-premise, cloud and hybrid network intercommunication, namely, development of computer software systems; computer services for others in the nature of development of Natural Language Processing (NLP), Computational Linguistics (CL), Information Retrieval (IR) and Machine Learning (ML) computer systems which are capable of understanding general human queries and formulating responses, namely, development of computer software systems to provide real-time detection, mitigation, prioritization and prediction of cyber threats and strikes to benefit others; computer systems analysis; integration of computer systems and on-premise, cloud and hybrid networks, namely, integration of computer systems and networks to provide real-time detection, mitigation, prioritization and prediction of cyber threats and strikes to benefit others; Computer services, namely, computer system administration for others for systems used in commercial interactions over global computer on-premise, cloud and hybrid networks; scientific and industrial research, namely, research and development of new cybersecurity products and threat intelligence computer software systems; technological research in the field of computers that integrate Natural Language Processing (NLP), Computational Linguistics (CL), Information Retrieval (IR) and Machine Learning (ML) for the purpose of understanding general human queries and formulating responses, and scientific research for cyber-security purposes; computer consultation services for threat detection and response, namely, computer network security consultancy to provide real-time detection, mitigation, prioritization and prediction of cyber threats and strikes to benefit others; Computer consulting services in the field of security operations, namely, computer network security consultancy to provide real-time detection, mitigation, prioritization and prediction of cyber threats and strikes to benefit others; all of the above relating specifically to analytical computing technologies that provide multi-modal natural language processing, generation, reasoning and machine learning for contextual cybersecurity threat analysis and response, and natural interaction

14.

Method and system for detecting malicious payloads

      
Application Number 17103882
Grant Number 11973768
Status In Force
Filing Date 2020-11-24
First Publication Date 2021-04-08
Grant Date 2024-04-30
Owner Vectra AI, Inc. (USA)
Inventor
  • Beauchesne, Nicolas
  • Mancini, John Steven

Abstract

Disclosed is an improved method, system, and computer program product for identifying malicious payloads. The disclosed approach identifies potentially malicious payload exchanges which may be associated with payload injection or root-kit magic key usage.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06N 5/022 - Knowledge engineeringKnowledge acquisition
  • H04L 9/40 - Network security protocols
  • H04W 12/12 - Detection or prevention of fraud
  • G06N 20/00 - Machine learning

15.

Method, product, and system for detecting malicious network activity using a graph mixture density neural network

      
Application Number 16948574
Grant Number 11880764
Status In Force
Filing Date 2020-09-23
First Publication Date 2021-03-25
Grant Date 2024-01-23
Owner Vectra AI, Inc. (USA)
Inventor
  • Kazerounian, Sohrob
  • Hannah, Daniel Carlton
  • Oikarinen, Tuomas P.

Abstract

Disclosed is an approach for detecting malicious network activity (e.g. based on a data hoarding activity identifies using a graph mixture density neural network (GraphMDN)). Generally, the approach includes generating embeddings using a graph convolution process and then processing the embeddings using a mixture density neural network. The approach may include collecting network activity data, generating a graph representing the network activity, or an aggregation thereof that maintains the inherent graphical nature and characteristics of the data, and training a GraphMDN in order to generate pluralities of distributions characterizing one or more aspects of the graph representing the network activity. The approach may also include capturing new network activity data, and evaluating that data using the distributions generated by the trained GraphMDN, and generation corresponding detection results.

IPC Classes  ?

  • G06N 3/08 - Learning methods
  • H04L 9/40 - Network security protocols
  • G06F 18/2134 - Feature extraction, e.g. by transforming the feature spaceSummarisationMappings, e.g. subspace methods based on separation criteria, e.g. independent component analysis
  • G06N 3/045 - Combinations of networks

16.

Method, product, and system for maintaining an ensemble of hierarchical machine learning models for detection of security risks and breaches in a network

      
Application Number 16861121
Grant Number 11595416
Status In Force
Filing Date 2020-04-28
First Publication Date 2020-11-26
Grant Date 2023-02-28
Owner Vectra AI, Inc. (USA)
Inventor
  • Chen, Hsin
  • Beauchesne, Nicolas
  • Mhatre, Himanshu
  • Mancini, John Steven

Abstract

Disclosed is an improved approach for identifying security risks and breaches in a network by applying machine learning methods that learn resource access patterns in the network. Specifically, by observing the access pattern of the network entities (e.g. accounts, services, and hosts) from authorization requests/responses, the model through unsupervised learning, organizes the entity relationships into an ensemble of hierarchical models. The ensemble of hierarchical models can then be leveraged to create a series of metrics that can be used to identify various types of abnormalities in the access of a resource on the network. For instance, by further classifying the access request for a resource using abnormality scores into detection scenarios, the model is able to detect both an abnormality and the type of abnormality and include such information in a corresponding alarm when a security breach happens.

IPC Classes  ?

17.

Privileged account breach detections based on behavioral access patterns

      
Application Number 16384807
Grant Number 11330005
Status In Force
Filing Date 2019-04-15
First Publication Date 2020-10-15
Grant Date 2022-05-10
Owner Vectra AI, Inc. (USA)
Inventor
  • Beauchesne, Nicolas
  • Mhatre, Himanshu
  • Hannah, Daniel Carlton

Abstract

Disclosed is an improved approach for detecting potentially malicious activity on a network. The present improved approach generates a multi-dimensional activity model based on captured network activity. Additional network activity is captured, and relative activity values are determined therefor. Determination of whether the additional network activity corresponds to potentially malicious activity is obtained by fitting the relative activity values of the additional network activity to the multi-dimensional relative activity model.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

18.

SECURITY THAT THINKS

      
Application Number 1502269
Status Registered
Filing Date 2019-10-17
Registration Date 2019-10-17
Owner VECTRA AI, INC. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer security systems, namely, a hardware/software platform that combines learning, automated analysis and prioritized reporting to detect unauthorized access or attacks on computer systems and networks; computer systems, namely, a hardware/software platform for network security, network analytics and business intelligence analytics; and software for use in monitoring and maintaining the safety and data integrity of a computer network or a computer system. Development and implementation of computer security systems, namely, a hardware/software platform that combines learning, automated analysis and prioritized reporting to detect unauthorized access or attacks on computer systems and networks; development and implementation of computer systems, namely, a hardware/software platform for network security, network analytics and business intelligence analytics; and development and implementation of software for use in monitoring and maintaining the safety and data integrity of a computer network or a computer system.

19.

VECTRA

      
Application Number 1502267
Status Registered
Filing Date 2019-10-17
Registration Date 2019-10-17
Owner VECTRA AI, INC. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer hardware and computer software platforms for network security, network analytics and business intelligence analytics. Development of computer hardware and software platforms for network security, network analytics and business intelligence analytics; Providing on-line non-downloadable software platforms for network security, network analytics and business intelligence analytics.

20.

High-volume network threat trace engine

      
Application Number 15438489
Grant Number 10404730
Status In Force
Filing Date 2017-02-21
First Publication Date 2019-09-03
Grant Date 2019-09-03
Owner VECTRA AI, INC. (USA)
Inventor Venable, Sr., Jeffrey Charles

Abstract

An approach for high-volume network threat tracing and detection may be implemented by storing network communications received from a plurality of hosts in an initial recording data structure, such as a rolling buffer. Identifiers may be generated for the plurality of hosts associated with the network communications by according to host identity or the behavior of a given host. Extended trace time values may be assigned to a portion of the plurality of hosts based at least in part on the identifiers, and storing the portion of the network communications that have extended trace time values may be recorded as packet capture files in long term memory.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

21.

Malicious relay and jump-system detection using behavioral indicators of actors

      
Application Number 16164727
Grant Number 11184369
Status In Force
Filing Date 2018-10-18
First Publication Date 2019-05-16
Grant Date 2021-11-23
Owner VECTRA AI, INC. (USA)
Inventor
  • Mhatre, Himanshu
  • Beauchesne, Nicolas

Abstract

Disclosed is an improved method, system, and computer program product for detecting hosts and connections between hosts that are being used as relays by an actor to gain control of hosts in a network. It can further identify periods of time within the connection when the relay activities occurred. In some embodiments, the invention can also chain successive relays to identify the true source and true target of the relay.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

22.

Method and system for learning representations of network flow traffic

      
Application Number 15881760
Grant Number 10880321
Status In Force
Filing Date 2018-01-27
First Publication Date 2018-08-02
Grant Date 2020-12-29
Owner Vectra AI, Inc. (USA)
Inventor
  • Silver, Matthew R.
  • Kazerounian, Sohrob

Abstract

Disclosed is an improved method, system, and computer program product for learning representations or embeddings of network flow traffic. The disclosed invention operates on network flow data which are then used as inputs to a deep-learning architecture that learns to embed the data into a vector space.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 5/02 - Knowledge representationSymbolic representation
  • G06N 3/08 - Learning methods
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • G06N 3/04 - Architecture, e.g. interconnection topology
  • H04L 12/24 - Arrangements for maintenance or administration

23.

Method and system for detecting suspicious administrative activity

      
Application Number 15702454
Grant Number 10623428
Status In Force
Filing Date 2017-09-12
First Publication Date 2018-03-15
Grant Date 2020-04-14
Owner VECTRA AI, INC. (USA)
Inventor
  • Beauchesne, Nicolas
  • Ni, Kevin Song-Kai

Abstract

Disclosed is an improved approach for identifying suspicious administrative host activity within a network. Network traffic is examined to learn the behavior of hosts within a network. This provides an effective way of determining whether or not a host is performing suspicious activity over an administrative protocol.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06N 20/00 - Machine learning

24.

System for implementing threat detection using threat and risk assessment of asset-actor interactions

      
Application Number 14930368
Grant Number 10050985
Status In Force
Filing Date 2015-11-02
First Publication Date 2016-06-30
Grant Date 2018-08-14
Owner VECTRA AI, INC. (USA)
Inventor
  • Mhatre, Himanshu
  • Pegna, David Lopes
  • Brdiczka, Oliver

Abstract

Disclosed is an approach to detect insider threats, by tracking unusual access activity for a specific user or computer with regard to accessing key assets over time. In this way, malicious activity and the different preparation phases of attacks can be identified.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

25.

System for implementing threat detection using daily network traffic community outliers

      
Application Number 14930583
Grant Number 10033752
Status In Force
Filing Date 2015-11-02
First Publication Date 2016-06-30
Grant Date 2018-07-24
Owner VECTRA AI, INC. (USA)
Inventor
  • Pegna, David Lopes
  • Mhatre, Himanshu
  • Brdiczka, Oliver

Abstract

A method and system for identifying insider threats within an organization is provided. The approach constructs an internal connectivity graph to identify communities of hosts/users, and checks for abnormal behavior relative to past behaviors.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

26.

System for detecting threats using scenario-based tracking of internal and external network traffic

      
Application Number 14930618
Grant Number 09900336
Status In Force
Filing Date 2015-11-02
First Publication Date 2016-06-30
Grant Date 2018-02-20
Owner VECTRA AI, INC. (USA)
Inventor
  • Beauchesne, Nicolas
  • Pegna, David Lopes

Abstract

Disclosed is an improved approach to implement a system and method for detecting insider threats, where models are constructed that is capable of defining what constitutes the normal behavior for any given hosts and quickly find anomalous behaviors that could constitute a potential threat to an organization. The disclosed approach provides a way to identify abnormal data transfers within and external to an organization without the need for individual monitoring software on each host, by leveraging metadata that describe the data exchange patterns observed in the network.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

27.

Method and system for detecting threats using metadata vectors

      
Application Number 14944138
Grant Number 09853988
Status In Force
Filing Date 2015-11-17
First Publication Date 2016-06-30
Grant Date 2017-12-26
Owner VECTRA AI, INC. (USA)
Inventor
  • Beauchesne, Nicolas
  • Pegna, David Lopes
  • Lynn, Karl

Abstract

An approach for detecting network attacks using metadata vectors may initially involve receiving network communications or packets, extracting metadata items from the packets. The metadata items describe the communications without requiring deep content inspection of the data payload or contents. The communications may be clustered into groups using the metadata items. If a cluster exceeds a threshold, an alarm may be generated.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

28.

Method and system for detecting threats using passive cluster mapping

      
Application Number 14944128
Grant Number 09985979
Status In Force
Filing Date 2015-11-17
First Publication Date 2016-05-26
Grant Date 2018-05-29
Owner VECTRA AI, INC. (USA)
Inventor
  • Pegna, David Lopes
  • Beauchesne, Nicolas

Abstract

An approach for detecting network threats is disclosed, that may involve receiving network traffic, plotting the network traffic in a n-dimensional feature space to form a network map, generating a client signature at least by placing new client points in the map, setting a threshold, and generating an alarm if one or more client activity points exceed the threshold. In some embodiments, the network map and the client signature are updated using sliding windows and distance calculations.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 12/16 - Protection against loss of memory contents
  • G08B 23/00 - Alarms responsive to unspecified undesired or abnormal conditions
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

29.

Method and system for generating durable host identifiers using network artifacts

      
Application Number 14644187
Grant Number 09847968
Status In Force
Filing Date 2015-03-10
First Publication Date 2015-10-29
Grant Date 2017-12-19
Owner VECTRA AI, INC. (USA)
Inventor
  • Beauchesne, Nicolas
  • Gill, Monty Sher
  • Tavakoli, Oliver Kourosh

Abstract

A host identification engine receives network traffic from a network and uses one or more artifact extractors to extract artifact data items that can identify a host. The artifact data items can be stored in a host signature database. Network addresses to which the hosts correspond can be stored in a network address database. A mapping table can be implemented to match the data in the signature database and network database to generate durable host identification data that can accurately track hosts as they use different identification data and/or move between hosts.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • H04L 12/891 - Flow control of aggregated links or flows
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

30.

System and method for detecting network intrusions using layered host scoring

      
Application Number 14644166
Grant Number 09565208
Status In Force
Filing Date 2015-03-10
First Publication Date 2015-09-17
Grant Date 2017-02-07
Owner VECTRA AI, INC. (USA)
Inventor
  • Ibatullin, Oskar
  • Prenger, Ryan James
  • Beauchesne, Nicolas
  • Lynn, Karl Matthew
  • Tavakoli, Oliver Kourosh

Abstract

Approaches for detecting network intrusions, such as malware infection, Trojans, worms, or bot net mining activities includes: identifying one or more threat detections in session datasets, the session datasets corresponding to network traffic from a plurality of hosts; determining a layered detection score, the layered detection score corresponding to a certainty score and threat score; determining a layered host score, the layered host score corresponding to a certainty score and threat score; and generating alarm data comprising the layered detection score and the layered host score. In some embodiments, the network traffic may be received passively through a network switch; for example, by “tapping” the switch. Other additional objects, features, and advantages of the invention are described in the detailed description, figures and claims.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

31.

Detecting network reconnaissance by tracking intranet dark-net communications

      
Application Number 14644182
Grant Number 09602533
Status In Force
Filing Date 2015-03-10
First Publication Date 2015-09-17
Grant Date 2017-03-21
Owner VECTRA AI, INC. (USA)
Inventor
  • Beauchesne, Nicolas
  • Yoon, Sungwook

Abstract

A method and system for detecting network reconnaissance is disclosed wherein network traffic can be parsed into unidirectional flows that correspond to sessions. A learning module may categorize computing entities inside the network into assets and generate asset data to monitor the computing entities. If one or more computing entities address a flow to an address of a host that no longer exists, ghost asset data may be recorded and updated in the asset data. When a computing entity inside the network contacts an object in the dark-net, the computing entity may be recorded a potential mapper. When the computing entity tries to contact a number of objects in the dark-net, such that a computed threshold is exceeded, the computing entity is identified a malicious entity performing network reconnaissance.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

32.

Method and system for detecting algorithm-generated domains

      
Application Number 14644194
Grant Number 09807110
Status In Force
Filing Date 2015-03-10
First Publication Date 2015-09-17
Grant Date 2017-10-31
Owner VECTRA AI, INC. (USA)
Inventor
  • Harlacher, James Patrick
  • Sood, Aditya
  • Ibatullin, Oskar

Abstract

A method and system for detecting algorithm-generated domains (AGDs) is disclosed wherein domain names requested by an internal host are categorized or classified using curated data sets, active services (e.g. Internet services), and certainty scores to match domain names to domain names or IP addresses used by command and control servers.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

33.

Method and system for detecting bot behavior

      
Application Number 14644125
Grant Number 09930053
Status In Force
Filing Date 2015-03-10
First Publication Date 2015-09-17
Grant Date 2018-03-27
Owner VECTRA AI, INC. (USA)
Inventor Beauchesne, Nicolas

Abstract

A bot detection engine to determine whether hosts in an organization's network are performing bot-related activities is disclosed. A bot detection engine can receive network traffic between hosts in a network, and/or between hosts across several networks. The bot engine may parse the network traffic into session datasets and discard the session datasets that were not initiated by hosts in a given network. The session datasets may be analyzed and state data may be accumulated. The state data may correspond to actions performed by the hosts, such as requesting a website or clicking ads, or requesting content within the website (e.g. clicking on a image which forms a HTTP request/response transaction for the image file).

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

34.

Method and system for detecting external control of compromised hosts

      
Application Number 14644177
Grant Number 09407647
Status In Force
Filing Date 2015-03-10
First Publication Date 2015-09-17
Grant Date 2016-08-02
Owner VECTRA AI, INC. (USA)
Inventor
  • Beauchesne, Nicolas
  • Prenger, Ryan James

Abstract

A detection engine may be implemented by receiving network traffic and processing the traffic into one or more session datasets. Sessions not initiated by an internal host may be discarded. The frequency between the communication packets from the internal host to external host may be grouped or processed into rapid-exchange instances. The number of rapid-exchange instances, the time intervals between them, and/or the rhythm and directions of the initiation of the instances may be analyzed to determine that a human actor is manually controlling the external host. In some embodiments, when it is determined that only one human actor is involved, alarm data may be generated that indicates that a network intrusion involving manual remote control has occurred or is underway.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/24 - Arrangements for maintenance or administration

35.

Malicious relay detection on networks

      
Application Number 14644186
Grant Number 09628512
Status In Force
Filing Date 2015-03-10
First Publication Date 2015-09-17
Grant Date 2017-04-18
Owner VECTRA AI, INC. (USA)
Inventor
  • Prenger, Ryan James
  • Beauchesne, Nicolas
  • Lynn, Karl Matthew

Abstract

A system and method for detecting malicious relay communications is disclosed. Network communications can be received and analyzed using such network components as a network switch. The received traffic can be parsed into sessions. Relay metadata can be extracted from the sessions and further be used to categorize the sessions into one or more types of relay metadata behaviors. Once a significant amount of sessions are detected an alarm may be triggered and/or alarm data may be generated for analysis by network security administrators.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 17/30 - Information retrieval; Database structures therefor

36.

Systems and methods for capturing, replaying, or analyzing time-series data

      
Application Number 14309873
Grant Number 09237164
Status In Force
Filing Date 2014-06-19
First Publication Date 2015-03-19
Grant Date 2016-01-12
Owner VECTRA AI, INC. (USA)
Inventor
  • Harlacher, James
  • Abene, Mark

Abstract

Provided is an intrusion detection system configured to detect anomalies indicative of a zero-day attack by statistically analyzing substantially all traffic on a network in real-time. The intrusion detection system, in some aspects, includes a network interface; one or more processors communicatively coupled to the network interface; system memory communicatively coupled to the processors. The system memory, in some aspects, stores instructions that when executed by the processors cause the processors to perform steps including: buffering network data from the network interface in the system memory; retrieving the network data buffered in the system memory; applying each of a plurality of statistical or machine-learning intrusion-detection models to the retrieved network data; aggregating intrusion-likelihood scores from each of the intrusion-detection models in an aggregate score, and upon the aggregate score exceeding a threshold, outputting an alert.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 3/06 - Digital input from, or digital output to, record carriers

37.

SECURITY THAT THINKS

      
Serial Number 86312908
Status Registered
Filing Date 2014-06-18
Registration Date 2016-05-31
Owner VECTRA AI, INC. ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer security systems, namely, a hardware/software platform that combines learning, automated analysis and prioritized reporting to detect unauthorized access or attacks on computer systems and networks; computer systems, namely, a hardware/software platform for network security, network analytics and business intelligence analytics; and software for use in monitoring and maintaining the safety and data integrity of a computer network or a computer system Development and implementation of computer security systems, namely, a hardware/software platform that combines learning, automated analysis and prioritized reporting to detect unauthorized access or attacks on computer systems and networks; development and implementation of computer systems, namely, a hardware/software platform for network security, network analytics and business intelligence analytics; and development and implementation of software for use in monitoring and maintaining the safety and data integrity of a computer network or a computer system

38.

VECTRA

      
Application Number 012517017
Status Registered
Filing Date 2014-01-20
Registration Date 2014-06-13
Owner Vectra AI, Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer software platform; hardware/software platform for network security, network analytics and business intelligence analytics. Development of computer software platform; development of hardware/software platform for network security, network analytics and business intelligence analytics.

39.

VECTRA

      
Serial Number 86163703
Status Registered
Filing Date 2014-01-13
Registration Date 2015-07-21
Owner VECTRA AI, INC. ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer hardware and computer software platforms for network security, network analytics and business intelligence analytics Development of computer hardware and software platforms for network security, network analytics and business intelligence analytics; Providing on-line non-downloadable software platforms for network security, network analytics and business intelligence analytics