-
公开(公告)号:US12174946B2
公开(公告)日:2024-12-24
申请号:US18497474
申请日:2023-10-30
Applicant: Rubrik, Inc.
Inventor: Shanthi Kiran Pendyala , Di Wu , Matthew Edward Noe
Abstract: Some examples relate generally to managing and storing data, and more specifically to the real-time detection of ransomware, system (or insider) threats, or the misappropriation of credentials by using file system audit events.
-
公开(公告)号:US11846980B2
公开(公告)日:2023-12-19
申请号:US17985510
申请日:2022-11-11
Applicant: Rubrik, Inc.
Inventor: Shanthi Kiran Pendyala , Di Wu , Matthew Edward Noe
IPC: G06F21/55 , G06F9/448 , G06F16/17 , G06F16/174 , G06F21/56
CPC classification number: G06F21/552 , G06F9/4498 , G06F16/1734 , G06F16/1748 , G06F21/56
Abstract: Some examples relate generally to managing and storing data, and more specifically to the real-time detection of ransomware, system (or insider) threats, or the misappropriation of credentials by using file system audit events.
-
公开(公告)号:US11522889B2
公开(公告)日:2022-12-06
申请号:US16534447
申请日:2019-08-07
Applicant: Rubrik, Inc.
Inventor: Oscar Annen , Di Wu , Ajay Saini
Abstract: Some examples relate generally to computer architecture software for information security and, in some more particular aspects, to machine learning based on changes in snapshot metadata for anomaly and ransomware detection in a file system.
-
公开(公告)号:US11442817B2
公开(公告)日:2022-09-13
申请号:US16287130
申请日:2019-02-27
Applicant: Rubrik, Inc.
Inventor: Di Wu
Abstract: Normal virtual machine operation is observed to automatically determine patterns of resource utilization. Backup activities are then scheduled, taking into account these utilization patterns. For example, if a normally scheduled backup would occur during a busy period, it may be rescheduled to a less busy period. As another example, backups made by made opportunistically during less busy periods even if not required by the normal backup schedule, in order to alleviate backup demands during more busy periods.
-
公开(公告)号:US11256576B2
公开(公告)日:2022-02-22
申请号:US16287199
申请日:2019-02-27
Applicant: Rubrik, Inc.
Inventor: Di Wu
Abstract: A system for reducing VM stunting during backup of a set of virtual machines is provided. In some examples, a system comprises processors and a memory storing instructions that, when executed by at least one processor among the processors, cause the system to perform certain operations. Example operations may include running an analytic process to learn resource utilization patterns of a hypervisor system monitoring the set of virtual machines, determining an opportunistic window of reduced resource utilization based on the resource utilization patterns, and scheduling backup for the set of virtual machines during the opportunistic window.
-
公开(公告)号:US11238152B2
公开(公告)日:2022-02-01
申请号:US16527405
申请日:2019-07-31
Applicant: Rubrik, Inc.
Inventor: Di Wu , Chenyang Zhou , Shanthi Kiran Pendyala
IPC: G06F21/55 , G06F16/172 , G06F16/13 , G06F16/17
Abstract: Some examples relate generally to computer architecture software for data classification and information security and, in some more particular aspects, to verifying audit events in a file system.
-
公开(公告)号:US11120131B2
公开(公告)日:2021-09-14
申请号:US16049574
申请日:2018-07-30
Applicant: Rubrik, Inc.
Inventor: Oscar Chen , Di Wu , Benjamin Reisner , Matthew E. Noe
IPC: G06F21/56 , G06F11/14 , G06F16/11 , G06F16/951
Abstract: Described herein is a system that detects ransomware infection in filesystems. The system detects ransomware infection by using backup data of machines. The system detects ransomware infection in two stages. In the first stage, the system analyzes a filesystem's behavior. The filesystem's behavior can be obtained by loading the backup data and crawling the filesystem to create a filesystem metadata including information about file operations during a time interval. The filesystem determines a pattern of the file operations and compares the pattern to a normal patter to analyze the filesystem's behavior. If the filesystem's behavior is abnormal, the system proceeds to the second stage to analyze the content of the files to look for signs of encryption in the filesystem. The system combines the analysis of both stages to determine whether the filesystem is infected by ransomware.
-
公开(公告)号:US20210044603A1
公开(公告)日:2021-02-11
申请号:US16534447
申请日:2019-08-07
Applicant: Rubrik, Inc.
Inventor: Oscar Annen , Di Wu , Ajay Saini
Abstract: Some examples relate generally to computer architecture software for information security and, in some more particular aspects, to machine learning based on changes in snapshot metadata for anomaly and ransomware detection in a file system.
-
公开(公告)号:US20210034394A1
公开(公告)日:2021-02-04
申请号:US16527396
申请日:2019-07-31
Applicant: Rubrik, Inc.
Inventor: Di Wu , Chenyang Zhou , Shanthi Kiran Pendyala
Abstract: Some examples relate generally to computer architecture software for data classification and information security and, in some more particular aspects, to verifying audit events in a tile system.
-
公开(公告)号:US20200250307A1
公开(公告)日:2020-08-06
申请号:US16263338
申请日:2019-01-31
Applicant: Rubrik, Inc.
Inventor: Shanthi Kiran Pendyala , Di Wu , Matthew Edward Noe
IPC: G06F21/55 , G06F16/174 , G06F16/17 , G06F9/448
Abstract: Some examples relate generally to managing and storing data, and more specifically to the real-time detection of ransomware, system (or insider) threats, or the misappropriation of credentials by using file system audit events.
-
-
-
-
-
-
-
-
-