Patent | Date |
---|
Anomaly detection based on communication between entities over a network Grant 11,258,807 - Muddu , et al. February 22, 2 | 2022-02-22 |
Annotation of event data to include access interface identifiers for use by downstream entities in a distributed data processing system Grant 11,146,574 - Muddu , et al. October 12, 2 | 2021-10-12 |
Method and system for generating an entities view with risk-level scoring for performing computer security monitoring Grant 10,986,106 - Muddu , et al. April 20, 2 | 2021-04-20 |
Detecting anomalies in a computer network based on usage similarity scores Grant 10,911,470 - Muddu , et al. February 2, 2 | 2021-02-02 |
Sharing of machine learning model state between batch and real-time processing paths for detection of network security issues Grant 10,911,468 - Muddu , et al. February 2, 2 | 2021-02-02 |
Enterprise security graph Grant 10,904,270 - Muddu , et al. January 26, 2 | 2021-01-26 |
Interactive geographic representation of network security threats Grant 10,798,113 - Muddu , et al. October 6, 2 | 2020-10-06 |
Method and system for generating an interactive kill chain view for training a machine learning model for identifying threats Grant 10,778,703 - Muddu , et al. Sept | 2020-09-15 |
Interface providing an interactive trendline for a detected threat to facilitate evaluation for false positives Grant 10,666,668 - Muddu , et al. | 2020-05-26 |
Anomaly detection based on connection requests in network traffic Grant 10,587,633 - Muddu , et al. | 2020-03-10 |
Model workflow control in a distributed computation system Grant 10,581,881 - Muddu , et al. | 2020-03-03 |
Window-based rarity determination using probabilistic suffix trees for network security analysis Grant 10,560,468 - Muddu , et al. Feb | 2020-02-11 |
Detecting Anomalies in a Computer Network Based on Usage Similarity Scores App 20200021607 - Muddu; Sudhakar ;   et al. | 2020-01-16 |
Interactive Geographic Representation Of Network Security Threats App 20200007561 - Muddu; Sudhakar ;   et al. | 2020-01-02 |
Sharing Of Machine Learning Model State Between Batch And Real-time Processing Paths For Detection Of Network Security Issues App 20190387007 - Muddu; Sudhakar ;   et al. | 2019-12-19 |
Annotation Of Event Data To Include Access Interface Identifiers For Use By Downstream Entities In A Distributed Data Processing App 20190364060 - Muddu; Sudhakar ;   et al. | 2019-11-28 |
Lateral movement detection for network security analysis Grant 10,476,898 - Muddu , et al. Nov | 2019-11-12 |
Processing Anomaly Data To Identify Threats To Network Security App 20190342311 - Muddu; Sudhakar ;   et al. | 2019-11-07 |
Interactive threat geo-map for monitoring computer network security Grant 10,469,508 - Muddu , et al. No | 2019-11-05 |
Anomaly Detection Based On Communication Between Entities Over A Network App 20190327251 - Muddu; Sudhakar ;   et al. | 2019-10-24 |
Detection of anomalies, threat indicators, and threats to network security Grant 10,419,450 - Muddu , et al. Sept | 2019-09-17 |
Event information access interface in data intake stage of a distributed data processing system Grant 10,419,462 - Muddu , et al. Sept | 2019-09-17 |
Event specific entity relationship discovery in data intake stage of a distributed data processing system Grant 10,419,463 - Muddu , et al. Sept | 2019-09-17 |
Data retrieval in security anomaly detection platform with shared model state between real-time and batch paths Grant 10,419,465 - Muddu , et al. Sept | 2019-09-17 |
Malware communications detection Grant 10,389,738 - Muddu , et al. A | 2019-08-20 |
Method And System For Generating An Entities View With Risk-level Scoring For Performing Computer Security Monitoring App 20190173893 - Muddu; Sudhakar ;   et al. | 2019-06-06 |
Interface Providing An Interactive Trendline For A Detected Threat to Facilitate Evaluation For False Positives App 20190158517 - Muddu; Sudhakar ;   et al. | 2019-05-23 |
Identity resolution in data intake of a distributed data processing system Grant 10,291,635 - Muddu , et al. | 2019-05-14 |
Method and System for Generating An Interactive Kill Chain View for Training A Machine Learning Model for Identifying Threats App 20190109868 - Muddu; Sudhakar ;   et al. | 2019-04-11 |
Event views in data intake stage of machine data processing platform Grant 10,243,970 - Muddu , et al. | 2019-03-26 |
Data Retrieval in Security Anomaly Detection Platform with Shared Model State between Real-Time and Batch Paths App 20190075126 - Muddu; Sudhakar ;   et al. | 2019-03-07 |
Method and system for reviewing identified threats for performing computer security monitoring Grant 10,212,174 - Muddu , et al. Feb | 2019-02-19 |
Interface providing an interactive timeline for evaluating instances of potential network compromise Grant 10,193,901 - Muddu , et al. Ja | 2019-01-29 |
Anomaly Detection Based On Connection Requests In Network Traffic App 20180367551 - Muddu; Sudhakar ;   et al. | 2018-12-20 |
Sharing model state between real-time and batch paths in network security anomaly detection Grant 10,158,652 - Muddu , et al. Dec | 2018-12-18 |
Method and system for generating a kill chain for monitoring computer network security Grant 10,154,047 - Muddu , et al. Dec | 2018-12-11 |
Window-based Rarity Determination Using Probabilistic Suffix Trees For Network Security Analysis App 20180351981 - Muddu; Sudhakar ;   et al. | 2018-12-06 |
Model training and deployment in complex event processing of computer network data Grant 10,148,677 - Muddu , et al. De | 2018-12-04 |
Network security threat detection using shared variable behavior baseline Grant 10,135,848 - Muddu , et al. November 20, 2 | 2018-11-20 |
Event specific relationship graph generation and application in a machine data processing platform Grant 10,116,670 - Muddu , et al. October 30, 2 | 2018-10-30 |
Modular model workflow in a distributed computation system Grant 10,110,617 - Muddu , et al. October 23, 2 | 2018-10-23 |
Network Security Anomaly And Threat Detection Using Rarity Scoring App 20180302423 - Muddu; Sudhakar ;   et al. | 2018-10-18 |
Lateral Movement Detection For Network Security Analysis App 20180288079 - Muddu; Sudhakar ;   et al. | 2018-10-04 |
Machine-generated traffic detection (beaconing) Grant 10,069,849 - Muddu , et al. September 4, 2 | 2018-09-04 |
Probabilistic suffix trees for network security analysis Grant 10,063,570 - Muddu , et al. August 28, 2 | 2018-08-28 |
Cloud information services Grant 10,051,073 - Sudhakar , et al. August 14, 2 | 2018-08-14 |
Event Specific Entity Relationship Discovery In Data Intake Stage Of A Distributed Data Processing System App 20180219897 - Muddu; Sudhakar ;   et al. | 2018-08-02 |
Rarity analysis in network security anomaly/threat detection Grant 10,038,707 - Muddu , et al. July 31, 2 | 2018-07-31 |
Lateral movement detection for network security analysis Grant 10,015,177 - Muddu , et al. July 3, 2 | 2018-07-03 |
Detection of clustering in graphs in network security analysis Grant 10,003,605 - Muddu , et al. June 19, 2 | 2018-06-19 |
Event Information Access Interface In Data Intake Stage Of A Distributed Data Processing System App 20180146000 - Muddu; Sudhakar ;   et al. | 2018-05-24 |
Identity Resolution In Data Intake Of A Distributed Data Processing System App 20180069888 - Muddu; Sudhakar ;   et al. | 2018-03-08 |
Model Workflow Control In A Distributed Computation System App 20180054452 - Muddu; Sudhakar ;   et al. | 2018-02-22 |
Network security system with real-time and batch paths Grant 9,900,332 - Muddu , et al. February 20, 2 | 2018-02-20 |
Identity resolution in data intake stage of machine data processing platform Grant 9,838,410 - Muddu , et al. December 5, 2 | 2017-12-05 |
Network security analysis using real-time and batch detection engines Grant 9,813,435 - Muddu , et al. November 7, 2 | 2017-11-07 |
Network Security System with Real-Time and Batch Paths App 20170272458 - Muddu; Sudhakar ;   et al. | 2017-09-21 |
Model Training And Deployment In Complex Event Processing Of Computer Network Data App 20170223036 - Muddu; Sudhakar ;   et al. | 2017-08-03 |
Network security system Grant 9,699,205 - Muddu , et al. July 4, 2 | 2017-07-04 |
Complex event processing of computer network data Grant 9,667,641 - Muddu , et al. May 30, 2 | 2017-05-30 |
Event Specific Relationship Graph Generation And Application In A Machine Data Processing Platform App 20170142140 - Muddu; Sudhakar ;   et al. | 2017-05-18 |
Network Security Threat Detection by User/User-Entity Behavioral Analysis App 20170134415 - Muddu; Sudhakar ;   et al. | 2017-05-11 |
Dual-Path Distributed Architecture for Network Security Analysis App 20170134410 - MUDDU; SUDHAKAR ;   et al. | 2017-05-11 |
Interface having selectable, interactive views for evaluating potential network compromise Grant 9,609,011 - Muddu , et al. March 28, 2 | 2017-03-28 |
Network security threat detection by user/user-entity behavioral analysis Grant 9,609,009 - Muddu , et al. March 28, 2 | 2017-03-28 |
Event mini-graphs in data intake stage of machine data processing platform Grant 9,596,254 - Muddu , et al. March 14, 2 | 2017-03-14 |
Dual-path distributed architecture for network security analysis Grant 9,591,010 - Muddu , et al. March 7, 2 | 2017-03-07 |
Rarity Analysis In Network Security Anomaly/threat Detection App 20170063890 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Enterprise Security Graph App 20170063910 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Method And System For Generating A Kill Chain For Monitoring Computer Network Security App 20170063898 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Event Views In Data Intake Stage Of Machine Data Processing Platform App 20170063903 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Network Security System App 20170063896 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Malware Communications Detection App 20170063888 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Sharing Model State Between Real-Time and Batch Paths in Network Security Anomaly Detection App 20170063908 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Detection Of Anomalies, Threat Indicators, And Threats To Network Security App 20170063905 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Method And System For Monitoring Entity Activity On An Organization's Computer Network App 20170063900 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Interface Having Selectable, Interactive Views For Evaluating Potential Network Compromise App 20170063902 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Interface Providing An Interactive Timeline For Evaluating Instances Of Potential Network Compromise App 20170063897 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Machine-generated Traffic Detection (beaconing) App 20170063889 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Multi-Stage Network Security Threat Detection App 20170063907 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Event Mini-graphs In Data Intake Stage Of Machine Data Processing Platform App 20170063912 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Network Security Threat Detection by User/User-Entity Behavioral Analysis App 20170063894 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Probabilistic Suffix Trees For Network Security Analysis App 20170063887 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Method And System For Reviewing Identified Threats For Performing Computer Security Monitoring App 20170063901 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Complex Event Processing Of Computer Network Data App 20170063906 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Identity Resolution In Data Intake Stage Of Machine Data Processing Platform App 20170063904 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Detection of Clustering in Graphs in Network Security Analysis App 20170063909 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Interactive Threat Geo-Map for Monitoring Computer Network Security App 20170063899 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Dual-Path Distributed Architecture for Network Security Analysis App 20170063891 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Lateral Movement Detection for Network Security Analysis App 20170063911 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Modular Model Workflow In A Distributed Computation System App 20170063886 - Muddu; Sudhakar ;   et al. | 2017-03-02 |
Systems and methods for managing file movement Grant 9,529,804 - Muddu , et al. December 27, 2 | 2016-12-27 |
Network security threat detection by user/user-entity behavioral analysis Grant 9,516,053 - Muddu , et al. December 6, 2 | 2016-12-06 |
Systems and methods for facilitating management of data Grant 9,298,417 - Muddu , et al. March 29, 2 | 2016-03-29 |
Systems and methods for facilitating data discovery Grant 9,135,261 - Maunder , et al. September 15, 2 | 2015-09-15 |
Systems and methods for handling data Grant 9,002,777 - Muddu , et al. April 7, 2 | 2015-04-07 |
Systems and methods for facilitating searches involving multiple indexes Grant 8,805,820 - Maunder , et al. August 12, 2 | 2014-08-12 |
Systems and methods for performing integrated searches with actions Grant 8,521,741 - Maunder , et al. August 27, 2 | 2013-08-27 |
Systems And Methods For Facilitating Data Discovery App 20110145217 - Maunder; Anurag S. ;   et al. | 2011-06-16 |
Method for smoothing the transmission of a multimedia file having clock recovery restraints Grant 7,464,173 - Tryfonas December 9, 2 | 2008-12-09 |
Method for smoothing the transmission of a time-sensitive file Grant 7,301,955 - Tryfonas , et al. November 27, 2 | 2007-11-27 |
Method for determining loss rate or a loss curve of a video source or multimedia traffic Grant 6,944,126 - Varma , et al. September 13, 2 | 2005-09-13 |
Method for determining burstiness or a burstiness curve of a traffic source Grant 6,795,397 - Varma , et al. September 21, 2 | 2004-09-21 |
Method for determining burstiness or a burstiness curve of a traffic source App 20020073224 - Varma, Anujan ;   et al. | 2002-06-13 |
Method and apparatus for controlling data transfer rates of data sources in asynchronous transfer mode-based networks Grant 5,701,292 - Chiussi , et al. December 23, 1 | 1997-12-23 |