Log in
Enquire now
‌

US Patent 11038906 Network threat validation and monitoring

Patent 11038906 was granted and assigned to Level 3 Communications on June, 2021 by the United States Patent and Trademark Office.

OverviewStructured DataIssuesContributors

Contents

Is a
Patent
Patent

Patent attributes

Patent Applicant
Level 3 Communications
Level 3 Communications
Current Assignee
Level 3 Communications
Level 3 Communications
Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
Patent Number
11038906
Date of Patent
June 15, 2021
Patent Application Number
15887805
Date Filed
February 2, 2018
Patent Citations
‌
US Patent 10432658 Systems and methods for identifying and performing an action in response to identified malicious network traffic
‌
US Patent 10165000 Systems and methods for malware attack prevention by intercepting flows of information
Patent Citations Received
‌
US Patent 11501190 Machine learning pipeline for predictions regarding a network
‌
US Patent 11528292 Systems and methods for deep packet inspection of vulnerable network devices
‌
US Patent 11528295 Methods and systems for defending an infrastructure against a distributed denial of service attack
‌
US Patent 11568053 Automated malware monitoring and data extraction
‌
US Patent 12015558 Enhancing classification of data packets in an electronic device
0
0
‌
US Patent 12079345 Methods, systems, and media for testing insider threat detection systems
0
‌
US Patent 11601444 Automated system for triage of customer issues
...
Patent Primary Examiner
‌
Maung T Lwin
Patent abstract

Methods and systems for identifying threats within a network include collecting network traffic data and providing the network traffic data to a classifier configured to identify patterns within the network traffic data consistent with malicious computing devices. The computing devices identified by the classifier are then validated to confirm whether they are, in fact, malicious. In one implementation, such validation is accomplished by interrogating suspected malicious computing devices with messages according to a particular communication protocol and determining whether corresponding responses received form the malicious computing devices are similarly in accordance with the communication protocol. In certain implementations, after identification and validation of a malicious computing device, an emulated computing device is used to continue communication with the malicious computing device and to log characteristics of such communications to further train the classifier.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 11038906 Network threat validation and monitoring

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.