Search

Derek M Abdine

from Rancho Palos Verdes, CA
Age ~41

Derek Abdine Phones & Addresses

  • 27605 Avenida Del Mesa, Rch Palos Vrd, CA 90275 (760) 213-9021
  • Rancho Palos Verdes, CA
  • 25968 Eshelman Ave, Lomita, CA 90717
  • La Puente, CA
  • Long Beach, CA
  • Artesia, CA
  • Oceanside, CA
  • Los Angeles, CA
  • La Puente, CA

Resumes

Resumes

Derek Abdine Photo 1

Inventor, Software Architect And Start-Up Technologist

View page
Position:
Senior Architect, Office of the CTO at Rapid7
Location:
Greater Los Angeles Area
Industry:
Computer & Network Security
Work:
Rapid7 since Oct 2011
Senior Architect, Office of the CTO

Rapid7 - El Segundo, CA Oct 2009 - Oct 2011
Sr. Manager, Security Engineering

Rapid7 - El Segundo, CA Mar 2010 - Jul 2011
Manager, Release Engineering

Rapid7 - El Segundo, CA Mar 2010 - Oct 2010
Manager, Engineering IT

Rapid7 - El Segundo Jan 2009 - Oct 2009
Manager, Core Product Engineering
Education:
California State University-Long Beach 2003 - 2006
Computer Engineering, Engineering
Skills:
Computer Security
Java
JESS
Reverse Engineering
Situational Leadership
IDA
C
C++
x86 Assembly
MBTI
Coaching
Problem Solving
Debugging
Android
Spring
Architecture
Web Application Security
Vulnerability Assessment
PCI DSS

Maven2
jQuery
JavaScript
VMware
QEMU
Linux
Windows
Ruby
Ruby on Rails
Security
Application Security
Network Security
Vulnerability Management
Agile Methodologies
Cloud Computing
Heroku
Interests:
embedded design, management, snowboarding, reverse engineering, RTOS development, hacking, protocols, disassembler, assembly, kernel, team building, agile development, scrum, behavioral science, building better business
Honor & Awards:
Dean's list two years in a row.
Derek Abdine Photo 2

Chief Technology Officer

View page
Location:
27605 Avenida Del Mesa, Rancho Palos Verdes, CA 90275
Industry:
Computer & Network Security
Work:
Rapid7 since Oct 2011
Senior Architect, Office of the CTO

Rapid7 - El Segundo, CA Oct 2009 - Oct 2011
Sr. Manager, Security Engineering

Rapid7 - El Segundo, CA Mar 2010 - Jul 2011
Manager, Release Engineering

Rapid7 - El Segundo, CA Mar 2010 - Oct 2010
Manager, Engineering IT

Rapid7 - El Segundo Jan 2009 - Oct 2009
Manager, Core Product Engineering
Education:
California State University-Long Beach 2003 - 2006
Computer Engineering, Engineering
Skills:
Security
Computer Security
Java
Linux
Cloud Computing
Web Application Security
Vulnerability Assessment
Agile Methodologies
Android
Problem Solving
Data Security
Vulnerability Management
Reverse Engineering
Javascript
Situational Leadership
Enterprise Software
Distributed Systems
Jess
Software Development
Postgresql
Saas
Software As A Service
Amazon Web Services
Message Oriented Middleware
Heroku
Data Analysis
Soa
Private Cloud
Ruby
Osgi
Interests:
Building Awesome Things
Languages:
English

Publications

Us Patents

Methods And Systems For Providing Recommendations To Address Security Vulnerabilities In A Network Of Computing Systems

View page
US Patent:
20120185944, Jul 19, 2012
Filed:
Jan 19, 2011
Appl. No.:
13/009259
Inventors:
Derek M. Abdine - Los Angeles CA, US
Anastasios Giakouminakis - Allendale NJ, US
Chad Loder - Los Angeles CA, US
Richard D. Li - Somerville MA, US
International Classification:
G06F 11/00
US Classification:
726 25
Abstract:
A solution recommendation (SR) tool can receive vulnerabilities identified by a vulnerability scanner and/or penetration testing tool. The SR tool can determine various approaches for remediating or mitigating the identified vulnerabilities, and can prioritize the various approaches based on the efficiency of the various approaches in remediating or mitigating the identified vulnerabilities. The SR tool can recommend one or more of the prioritized approaches based on constraints such as cost, effectiveness, complexity, and the like. Once the one or more of the prioritized approaches are selected, the SR tool can recommend the one or more prioritized approaches to third-party experts for evaluation.

Machined Learned Inference Of Protocols From Banner Data

View page
US Patent:
20230034866, Feb 2, 2023
Filed:
Oct 12, 2022
Appl. No.:
17/964456
Inventors:
- Boston MA, US
Derek Abdine - Rancho Palos Verdes CA, US
Thomas Sellers - Georgetown TX, US
Prashant Subbarao - Cambridge MA, US
Assignee:
Rapid7, Inc. - Boston MA
International Classification:
G06N 5/04
H04L 9/40
H04L 69/164
G06N 20/00
H04L 67/60
H04L 69/00
Abstract:
Systems and methods are disclosed to infer, using a machine learned model, a service protocol of a server based on the banner data produced by the server. In embodiments, the machine learned model is implemented by a network scanner configured to receive banner data from open ports on servers. A received banner is parsed into a set of features, such as the counts or presence of particular characters or strings in the banner. In embodiments, certain types of banner content such as network addresses, hostnames, dates, and times, are replaced with special characters. The machine learned model is applied to the features to infer a most likely protocol of the server port that produced the banner. Advantageously, the model can be trained to perform the inference task with high accuracy and without using human-specified rules, which can be brittle for unconventional banner data and carry undesired biases.

Honeypot Opaque Credential Recovery

View page
US Patent:
20210226992, Jul 22, 2021
Filed:
Mar 18, 2021
Appl. No.:
17/205134
Inventors:
- Boston MA, US
Derek Abdine - Rancho Palos Verdes CA, US
Assignee:
Rapid7, Inc. - Boston MA
International Classification:
H04L 29/06
G06F 21/45
Abstract:
Disclosed herein are methods, systems, and processes for recovering opaque credentials in deception systems. A plaintext credential is received at a honeypot and a plaintext lookup table is accessed. It is determined that the plaintext credential does not exist in the plaintext lookup table and the plaintext credential is added to the plaintext lookup table and a protocol specific plaintext lookup table. An opaque credential is generated for the plaintext credential and the opaque credential is added to a protocol specific opaque lookup table.

Blended Honeypot

View page
US Patent:
20190230124, Jul 25, 2019
Filed:
Jan 19, 2018
Appl. No.:
15/874989
Inventors:
- Boston MA, US
Derek Abdine - Rancho Palos Verdes CA, US
International Classification:
H04L 29/06
H04L 29/08
Abstract:
Methods and systems for monitoring activity on a network. The systems may include a host computer executing a non-honeypot service. The host computer may also include a control module configured to enable or disable a honeypot service on the host computer in response to at least one of computational resource availability and configured tolerance for degraded service.

Reactive Virtual Security Appliances

View page
US Patent:
20180219880, Aug 2, 2018
Filed:
Jan 27, 2017
Appl. No.:
15/418663
Inventors:
- Boston MA, US
Derek Abdine - Lomita CA, US
Andreas Galauner - Aachen, DE
Mark Momburg - Ubach-Palenberg, DE
International Classification:
H04L 29/06
Abstract:
Methods and systems for monitoring network activity. Various embodiments may deploy virtual security appliances to a certain location or with a specific configuration based on data regarding previous attacks and attacker activity. Accordingly, the deployed virtual security appliance(s) are better suited to gather more useful behavior regarding threat actor behavior and attacks.
Derek M Abdine from Rancho Palos Verdes, CA, age ~41 Get Report