H04L63/0227

MANAGING EDGE GATEWAY SELECTION USING EXCHANGED HASH INFORMATION
20230036071 · 2023-02-02 ·

Described herein are systems, methods, and software to select edge gateways for communications based on exchanged hash information. In one implementation, a first gateway may receive hash information associated with second gateways, wherein the hash information is used to select a gateway of the second gateways to communicate a packet. The first gateway further receives a packet. hashes addressing in the packet to select a destination gateway of the second gateways for the packet. The first gateway further encapsulates the packet and communicates the encapsulated packet to the selected destination gateway.

USING REAL-TIME MONITORING TO INFORM STATIC ANALYSIS
20230032686 · 2023-02-02 ·

Using real-time monitoring to inform static analysis, including: inspecting, using one or more static code analysis techniques, one or more components of a cloud deployment; detecting, using data gathered during the execution of the component in the cloud deployment, a condition; and modifying, based on the detected condition, the one or more static code analysis techniques.

LABEL GUIDED UNSUPERVISED LEARNING BASED NETWORK-LEVEL APPLICATION SIGNATURE GENERATION
20230092159 · 2023-03-23 ·

Application-initiated network traffic is intercepted and analyzed by an application firewall in order to identify streams of traffic for a target application. An application signature generator preprocesses the raw data packets from the intercepted network traffic by tokenizing the data packets and then weighting each token according to its importance for application identification. The weighted features for each data packet are clustered using an unsupervised learning model, and the resulting clusters are iteratively refined and re-clustered using a proximity score between the clusters and feature vectors for key tokens for the target application. The application signature generator generates a signature for the clusters corresponding to the target application which the application firewall implements for filtering network traffic.

Systems and methods for private authentication with helper networks
11489866 · 2022-11-01 · ·

Helper neural network can play a role in augmenting authentication services that are based on neural network architectures. For example, helper networks are configured to operate as a gateway on identification information used to identify users, enroll users, and/or construct authentication models (e.g., embedding and/or prediction networks). Assuming, that both good and bad identification information samples are taken as part of identification information capture, the helper networks operate to filter out bad identification information prior to training, which prevents, for example, identification information that is valid but poorly captured from impacting identification, training, and/or prediction using various neural networks. Additionally, helper networks can also identify and prevent presentation attacks or submission of spoofed identification information as part of processing and/or validation.

Customized domain name resolution for virtual private clouds

Methods, systems, and computer-readable media for customized domain name resolution for virtual private clouds are disclosed. A domain name system (DNS) resolution service receives a DNS request from a computing resource associated with a virtual private cloud (VPC) in a cloud provider network. The service determines that the VPC is associated with one or more firewall rules. Responsive to determining that the VPC is associated with the firewall rule(s), the service determines whether the DNS request is allowed or blocked according to the one or more firewall rules. If the DNS request is allowed, the service resolves the DNS request using a DNS server and returns a response to the computing resource. If the DNS request is blocked, the service does not resolve the DNS request.

EMAIL MESSAGE RECEIVING SYSTEM IN A CLOUD INFRASTRUCTURE

A new and improved onboarding process for configuring and activating an email message receiving system (EMRS) to accept and process email messages on behalf of a customer is disclosed. The process comprises generating a customer-account-specific Domain Name Server (DNS) name that identifies a customer of the EMRS and a mail server for accepting and processing email messages for a domain associated with the customer. The process includes providing the customer-account-specific DNS name to the customer, receiving a request to process email messages for the domain associated with the customer and identifying using the customer-account-specific DNS name, the mail server for receiving the email messages for the domain. The process further includes verifying, using the customer-account-specific DNS name, that the customer has permission for receiving the email messages for the domain. The process includes processing the email messages and delivering the messages to a destination system.

SYSTEM AND METHOD FOR SECURITY MANAGEMENT OF APPLICATION INFORMATION
20230093379 · 2023-03-23 ·

An apparatus for security management of application information comprises a processor operable to receive the application information associated with a first entity and to receive entity device information for a first entity device associated with the first entity. The processor is operable to determine that a portion of data fields of the application information associated with the first entity corresponds to a portion of data fields of entity account data associated with a second entity and to determine that a portion of the entity device information associated with the first entity device corresponds to a portion of the entity device information associated with a second entity device that is associated with the second entity. The processor is further operable to determine that the first entity is associated with suspicious indicators, wherein suspicious indicators signal that there is suspicious activity associated with the first entity.

Threat mitigation system and method

A computer-implemented method, computer program product and computing system for: obtaining consolidated platform information for a computing platform to identify one or more deployed security-relevant subsystems; processing the consolidated platform information to identify one or more non-deployed security-relevant subsystems; generating a list of ranked & recommended security-relevant subsystems that ranks the one or more non-deployed security-relevant subsystems; and providing the list of ranked & recommended security-relevant subsystems to a third-party.

Smart bits
11611584 · 2023-03-21 · ·

Systems and methods for intelligent data routing based on data type are provided. A proxy installed on a client device receives a data stream and scans the data stream for classification parameters associated with sensitive data. A data stream may be broken down, for example, to data packets, classified using known libraries containing characteristics of a classification, and routed based on applicable policies governing each classification. The routed data packets are constantly monitored and may be re-routed to a network designed to handle highly sensitive data, a network designed to handle data with high security risk, or to another applicable service infrastructure as needed, before reaching the intended recipient. The classification libraries may be updated based on the monitored data and change in classification of the data packet.

PRIORITIZATION OF REPORTED MESSAGES
20220345485 · 2022-10-27 · ·

Systems and methods for prioritization of reported messages and rewarding reporting users are disclosed. The systems and methods leverage knowledge and security awareness of the most informed users in an organization to protect an organization from serious harm from new malicious messages, give credit to the most informed users, and optimize threat triage and analysis. The system converts a reported malicious message to a defanged message. The system communicates the defanged message to a plurality of users. The system determines an impact score for the user based on interactions with the defanged message by the plurality of users, and with the impact score gives credit to the reporter and optimizes threat triage and analysis.