Log in
Enquire now
‌

US Patent 11843624 Trained model to detect malicious command and control traffic

Patent 11843624 was granted and assigned to Netskope on December, 2023 by the United States Patent and Trademark Office.

OverviewStructured DataIssuesContributors

Contents

Is a
Patent
Patent
0

Patent attributes

Patent Applicant
Netskope
Netskope
0
Current Assignee
Netskope
Netskope
0
Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
0
Patent Number
118436240
Patent Inventor Names
Gustavo Palazolo Eiras0
Raymond Joseph Canzanese, Jr.0
Colin Estep0
Dagmawi Mulugeta0
Siying Yang0
Yongxing Wang0
Jenko Hwong0
Date of Patent
December 12, 2023
0
Patent Application Number
178633370
Date Filed
July 12, 2022
0
Patent Citations
‌
US Patent 10666676 Detection of targeted email attacks
0
‌
US Patent 10681080 System and method for assessing android applications malware risk
0
‌
US Patent 10764313 Method and system for protection against network-based cyber threats
0
‌
US Patent 10778702 Predictive modeling of domain names using web-linking characteristics
0
‌
US Patent 11303657 Applying condensed machine learned models within a local network
0
‌
US Patent 11038906 Network threat validation and monitoring
0
‌
US Patent 8321943 Programmatic communication in the event of host malware infection
0
‌
US Patent 8788407 Malware data clustering
0
...
Patent Citations Received
‌
US Patent 12118779 System and method for assessing structural damage in occluded aerial images
0
Patent Primary Examiner
‌
Ka Shan Choy
0
CPC Code
‌
G06Q 20/4016
0
‌
H04L 63/1425
0
Patent abstract

The technology disclosed relates to a method, system, and non-transitory computer-readable media that classifies cloud traffic between a client and cloud application as malicious command and control (C2) cloud traffic or benign cloud traffic. A cloud traffic classifier, in communication with a network security system, is provided intercepted cloud traffic as an input, and generate an output that classifies the cloud traffic as malicious command and control (C2) cloud traffic or benign cloud traffic. The classifier may use signals such as beaconing behavior, anomalous entity, anomalous agent, anomalous username, anomalous username, anomalous agent, cat's paw behavior of the client, anomalous hostname access patterns, and/or malicious task sequence execution.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 11843624 Trained model to detect malicious command and control traffic

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.