MDL-based clustering for application dependency mapping

EC Scheib, A Parandehgheibi, O Madani… - US Patent …, 2019 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can
determine an optimum number of clusters for the network using the minimum description …

Augmenting flow data for improved network monitoring and management

A Parandehgheibi, MA Attar, O Madani… - US Patent …, 2019 - Google Patents
Flow data can be augmented with features or attributes from other domains, such as
attributes from a source host and/or destination host of a flow, a process initiating the flow …

Cluster discovery via multi-domain fusion for application dependency mapping

A Parandehgheibi, O Madani, V Jeyakumar… - US Patent …, 2020 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can
determine whether certain nodes form a cluster of a tier of an application. The network can …

Policy-driven compliance

SK Gupta, N Yadav, MS Watts… - US Patent …, 2018 - Google Patents
A network can achieve compliance by defining and enforcing a set of network policies to
secure protected electronic information. The network can monitor network data …

Techniques for determining network anomalies in data center networks

A Kulshreshtha, N Yadav, HT Vu, MS Watts… - US Patent …, 2021 - Google Patents
(57) ABSTRACT A monitoring device/module monitors a plurality of nodes in a data center
network, and determines one or more latency distributions of response times for messages …

Determining a reputation of a network entity

N Yadav, SHN Rao, A Kulshreshtha, O Madani… - US Patent …, 2019 - Google Patents
An example method can include monitoring a network to identify flows between nodes in the
network. Once flows have been identified, the flows can be tagged and labelled according to …

Generate a communication graph using an application dependency mapping (ADM) pipeline

A Parandehgheibi, MA Attar, V Jeyakumar… - US Patent …, 2022 - Google Patents
This disclosure generally relates to a method and system for generating a communication
graph of a network using an application dependency mapping (ADM) pipeline. In one aspect …

Synthetic data for determining health of a network security system

RC Prasad, BS Viswanathan, HV Nguyen… - US Patent …, 2020 - Google Patents
An example method can include choosing a pattern or patterns of network traffic. This
pattern can be representative of a certain type of traffic such as an attack. The pattern can be …

Conditional policies

SK Gupta, N Yadav, MS Watts… - US Patent …, 2018 - Google Patents
Conditional policies can be defined that change based on security measurements of
network endpoints. In an example embodiment, a network traffic monitoring system can …

Late data detection in data center

K Deen, N Yadav, A Gupta, S Gandham… - US Patent …, 2020 - Google Patents
Systems, methods, and non-transitory computer-readable storage media for synchronizing
timestamps of a sensor report to the clock of a device. In one embodiment, the device …