Issued Patents All Time
Showing 25 most recent of 60 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11824646 | Processing anomaly data to identify network security threats by use of rarity analysis | Sudhakar Muddu | 2023-11-21 |
| 11575693 | Composite relationship graph for network security | Sudhakar Muddu, Ravi Prasad Bulusu, Marios Iliofotou | 2023-02-07 |
| 11470096 | Network security anomaly and threat detection using rarity scoring | Sudhakar Muddu, Yijiang Li | 2022-10-11 |
| 11411966 | Processing anomaly data to identify threats to network security | Sudhakar Muddu | 2022-08-09 |
| 11258807 | Anomaly detection based on communication between entities over a network | Sudhakar Muddu, Joseph Auguste Zadeh, Alexander Beebe Bond, Ashwin Athalye | 2022-02-22 |
| 11146574 | Annotation of event data to include access interface identifiers for use by downstream entities in a distributed data processing system | Sudhakar Muddu, Ravi Prasad Bulusu | 2021-10-12 |
| 10986106 | Method and system for generating an entities view with risk-level scoring for performing computer security monitoring | Sudhakar Muddu | 2021-04-20 |
| 10911470 | Detecting anomalies in a computer network based on usage similarity scores | Sudhakar Muddu, Fumei Lam, Georgios Apostolopoulos | 2021-02-02 |
| 10911468 | Sharing of machine learning model state between batch and real-time processing paths for detection of network security issues | Sudhakar Muddu, Ravi Prasad Bulusu | 2021-02-02 |
| 10904270 | Enterprise security graph | Sudhakar Muddu, Ravi Prasad Bulusu, Marios Iliofotou | 2021-01-26 |
| 10798113 | Interactive geographic representation of network security threats | Sudhakar Muddu | 2020-10-06 |
| 10778703 | Method and system for generating an interactive kill chain view for training a machine learning model for identifying threats | Sudhakar Muddu | 2020-09-15 |
| 10666668 | Interface providing an interactive trendline for a detected threat to facilitate evaluation for false positives | Sudhakar Muddu | 2020-05-26 |
| 10587633 | Anomaly detection based on connection requests in network traffic | Sudhakar Muddu, Marios Iliofotou | 2020-03-10 |
| 10581881 | Model workflow control in a distributed computation system | Sudhakar Muddu, Sathyanarayanan Kavacheri | 2020-03-03 |
| 10560468 | Window-based rarity determination using probabilistic suffix trees for network security analysis | Sudhakar Muddu, Marios Iliofotou | 2020-02-11 |
| 10476898 | Lateral movement detection for network security analysis | Sudhakar Muddu, Fumei Lam, Georgios Apostolopoulos | 2019-11-12 |
| 10469508 | Interactive threat geo-map for monitoring computer network security | Sudhakar Muddu | 2019-11-05 |
| 10419462 | Event information access interface in data intake stage of a distributed data processing system | Sudhakar Muddu, Ravi Prasad Bulusu | 2019-09-17 |
| 10419463 | Event specific entity relationship discovery in data intake stage of a distributed data processing system | Sudhakar Muddu, Ravi Prasad Bulusu | 2019-09-17 |
| 10419450 | Detection of anomalies, threat indicators, and threats to network security | Sudhakar Muddu | 2019-09-17 |
| 10419465 | Data retrieval in security anomaly detection platform with shared model state between real-time and batch paths | Sudhakar Muddu, Ravi Prasad Bulusu | 2019-09-17 |
| 10389738 | Malware communications detection | Sudhakar Muddu, Joseph Auguste Zadeh, Alexander Beebe Bond, Ashwin Athalye | 2019-08-20 |
| 10291635 | Identity resolution in data intake of a distributed data processing system | Sudhakar Muddu, Ravi Prasad Bulusu | 2019-05-14 |
| 10243970 | Event views in data intake stage of machine data processing platform | Sudhakar Muddu, Ravi Prasad Bulusu | 2019-03-26 |