The United States of America as represented by the United States Department of Energy - Washington DC
International Classification:
H04L 9/00
US Classification:
713155, 713153, 713168, 380277
Abstract:
Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.
Non-Harmful Insertion Of Data Mimicking Computer Network Attacks
Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.
Non-Harmful Insertion Of Data Mimicking Computer Network Attacks
- Los Alamos NM, US Alexander Kent - Los Alamos NM, US Curtis Hash, JR. - Santa Fe NM, US Michael Fisk - Los Alamos NM, US Alexander Brugh - Los Alamos NM, US Curtis Storlie - Jemez Springs NM, US Benjamin Uphoff - Los Alamos NM, US
Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.
Path Scanning For The Detection Of Anomalous Subgraphs And Use Of Dns Requests And Host Agents For Anomaly/Change Detection And Network Situational Awareness
- Los Alamos NM, US Michael Edward Fisk - Los Alamos NM, US Alexander William Brugh - Los Alamos NM, US Curtis Byron Storlie - Jemez Springs NM, US Benjamin Uphoff - Los Alamos NM, US Alexander Kent - Los Alamos NM, US
Assignee:
Triad National Security, LLC - Los Alamos NM
International Classification:
H04L 29/06 G06N 5/02 G06N 7/00 H04L 1/00
Abstract:
A system, apparatus, computer-readable medium, and computer-implemented method are provided for detecting anomalous behavior in a network. Historical parameters of the network are determined in order to determine normal activity levels. A plurality of paths in the network are enumerated as part of a graph representing the network, where each computing system in the network may be a node in the graph and the sequence of connections between two computing systems may be a directed edge in the graph. A statistical model is applied to the plurality of paths in the graph on a sliding window basis to detect anomalous behavior. Data collected by a Unified Host Collection Agent (“UHCA”) may also be used to detect anomalous behavior.
Path Scanning For The Detection Of Anomalous Subgraphs And Use Of Dns Requests And Host Agents For Anomaly/Change Detection And Network Situational Awareness
- Los Alamos NM, US Michael Edward Fisk - Los Alamos NM, US Alexander William Brugh - Los Alamos NM, US Curtis Byron Storlie - Jemez Springs NM, US Benjamin Uphoff - Los Alamos NM, US Alexander Kent - Los Alamos NM, US
Assignee:
Los Alamos National Security, LLC - Los Alamos NM
International Classification:
H04L 29/06 G06N 7/00
Abstract:
A system, apparatus, computer-readable medium, and computer-implemented method are provided for detecting anomalous behavior in a network. Historical parameters of the network are determined in order to determine normal activity levels. A plurality of paths in the network are enumerated as part of a graph representing the network, where each computing system in the network may be a node in the graph and the sequence of connections between two computing systems may be a directed edge in the graph. A statistical model is applied to the plurality of paths in the graph on a sliding window basis to detect anomalous behavior. Data collected by a Unified Host Collection Agent (“UHCA”) may also be used to detect anomalous behavior.
Path Scanning For The Detection Of Anomalous Subgraphs And Use Of Dns Requests And Host Agents For Anomaly/Change Detection And Network Situational Awareness
- Los Alamos NM, US Michael Edward Fisk - Los Alamos NM, US Alexander William Brugh - Los Alamos NM, US Curtis Lee Hash - Santa Fe NM, US Curtis Byron Storlie - Jemez Springs NM, US Benjamin Uphoff - Los Alamos NM, US Alexander Kent - Los Alamos NM, US
Assignee:
Los Alamos National Security, LLC - Los Alamos NM
International Classification:
H04L 29/06 G06N 7/00
Abstract:
A system, apparatus, computer-readable medium, and computer-implemented method are provided for detecting anomalous behavior in a network. Historical parameters of the network are determined in order to determine normal activity levels. A plurality of paths in the network are enumerated as part of a graph representing the network, where each computing system in the network may be a node in the graph and the sequence of connections between two computing systems may be a directed edge in the graph. A statistical model is applied to the plurality of paths in the graph on a sliding window basis to detect anomalous behavior. Data collected by a Unified Host Collection Agent (“UHCA”) may also be used to detect anomalous behavior.
Non-Harmful Insertion Of Data Mimicking Computer Network Attacks
- Los Alamos NM, US Alexander Kent - Los Alamos NM, US Curtis Hash, JR. - Santa Fe NM, US
Assignee:
Los Alamos National Security, LLC - Los Alamos NM
International Classification:
H04L 29/06 G06N 5/02
Abstract:
Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.
Dr. Kent graduated from the Stanford University School of Medicine in 1989. He works in Charleston, SC and 1 other location and specializes in Ophthalmology. Dr. Kent is affiliated with Colleton Medical Center, Roper Hospital and Trident Medical Center.
Resumes
Dual Master's Candidate (Mem/Mba) At Duke University
Africa BEECause Jan 2012 - Mar 2013
Technical Trainer/Business and Marketing Coordinator
Peace Corps Jan 2011 - Mar 2013
Volunteer
International Relief and Development Jan 2011 - Jan 2012
Agribusiness Consultant
Natural Capitalism Solutions - Boulder, Colorado Aug 2009 - Jul 2010
Consultant
University of Colorado at Boulder Aug 2005 - May 2010
Student
Education:
Duke Fuqua School of Business 2013 - 2016
Master of Business Administration (MBA), Energy, Environment, and Natural Resources Law
University of Colorado Boulder 2005 - 2010
BA, Economics
University of Otago 2007 - 2007
University Radiology
Regional Sales Marketing Manager
University Radiology Jun 2014 - Dec 2014
Sales Representative
Leolex Medical Management Nov 2013 - May 2014
Medical Practice Manager
Thomson Reuters Jun 2011 - Mar 2013
Client Service Manager
Thomson Reuters Nov 2007 - May 2011
Customer Service Representative
Education:
Rutgers University 2019 - 2019
Master of Business Administration, Masters, Marketing
Hamilton College 1990 - 1994
Bachelors, Molecular Biology, Biochemistry
Hackley School 1988 - 1990
Iona Preparatory High School 1986 - 1988
Skills:
Sales Operations Salesforce.com Management Sales Strategy Customer Service Business Analysis Business Development Project Management Solution Selling Crm Saas Auditing Product Management Data Analysis Negotiation Customer Retention Tax Customer Satisfaction Accounting
Interests:
Golf Basketball and Running
Certifications:
Cnpr - Certified National Pharmaceutical Representative National Association of Pharmaceutical Sales Representatives (Napsrx)