Company Filing History:
Years Active: 2011-2012
Title: Cristi Estan: Innovator in Network Security
Introduction
Cristi Estan is a notable inventor based in La Jolla, California. She has made significant contributions to the field of network security, particularly in the detection of public network attacks. With a total of 2 patents to her name, her work addresses critical challenges in safeguarding computer systems.
Latest Patents
Cristi's latest patents focus on innovative methods for detecting network threats. One patent involves a content sifting method that generates precise signatures for worms or viruses. This method aims to reduce the propagation of these threats across networks. It utilizes a value sampling technique to enhance the monitoring of network traffic. By tracking invariant strings in packets, the system can identify potential threats based on their frequency and address dispersion.
Another patent addresses the automatic detection of intrusion signatures based on predetermined characteristics. This invention looks for commonalities among various network messages to establish an intrusion signature. It employs data reduction techniques, such as hash functions, to minimize resource usage while identifying potential attacks. The system flags content that appears to be spreading, allowing for timely intervention against possible threats.
Career Highlights
Cristi Estan is affiliated with the University of California, where she continues her research and development in network security. Her work has been instrumental in advancing the understanding of network vulnerabilities and developing effective countermeasures.
Collaborations
Cristi collaborates with esteemed colleagues, including Sumeet Singh and George Varghese. Their combined expertise contributes to the innovative solutions being developed in the realm of network security.
Conclusion
Cristi Estan's contributions to network security through her patents demonstrate her commitment to enhancing the safety of public and private networks. Her innovative approaches to detecting and mitigating threats are vital in today's digital landscape.