Cluster discovery via multi-domain fusion for application dependency mapping

A Parandehgheibi, O Madani, V Jeyakumar… - US Patent …, 2020 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can
determine whether certain nodes form a cluster of a tier of an application. The network can …

Synthetic data for determining health of a network security system

RC Prasad, BS Viswanathan, HV Nguyen… - US Patent …, 2020 - Google Patents
An example method can include choosing a pattern or patterns of network traffic. This
pattern can be representative of a certain type of traffic such as an attack. The pattern can be …

Late data detection in data center

K Deen, N Yadav, A Gupta, S Gandham… - US Patent …, 2020 - Google Patents
Systems, methods, and non-transitory computer-readable storage media for synchronizing
timestamps of a sensor report to the clock of a device. In one embodiment, the device …

Flowlet resolution for application performance monitoring and management

A Kulshreshtha, O Madani, V Jeyakumar… - US Patent …, 2020 - Google Patents
An application and network analytics platform can capture telemetry from servers and
network devices operating within a network. The application and network analytics platform …

Intra-datacenter attack detection

A Kulshreshtha, SHN Rao, N Yadav, A Gupta… - US Patent …, 2020 - Google Patents
An example method can include receiving a traffic report from a sensor and using the traffic
report to detect intra datacenter flows. These intra-datacenter flows can then be compared …

Application monitoring prioritization

JNK Pang, N Yadav, A Gupta, S Gandham… - US Patent …, 2020 - Google Patents
An approach for establishing a priority ranking for endpoints in a network. This can be useful
when triaging endpoints after an endpoint becomes compromised. Ensuring that the most …

Anomaly detection through header field entropy

N Yadav, MA Attar, S Gandham, JNK Pang… - US Patent …, 2020 - Google Patents
An approach for detecting anomalous flows in a network using header field entropy. This
can be useful in detecting anomalous or malicious traffic that may attempt to “hide” or inject …

System and method of detecting hidden processes by analyzing packet flows

K Deen, N Yadav, A Gupta, S Gandham… - US Patent …, 2020 - Google Patents
A method includes capturing first data associated with a first packet flow originating from a
first host using a first capture agent deployed at the first host to yield first flow data, capturing …

System and method of spoof detection

K Deen, N Yadav, A Gupta, S Gandham… - US Patent …, 2020 - Google Patents
Managing a network environment to identify spoofed packets is disclosed. A method
includes analyzing, via a first capture agent, packets processed by a first environment in a …

Predicting application and network performance

A Kulshreshtha, N Yadav, K Deen, J Pang… - US Patent …, 2020 - Google Patents
An application and network analytics platform can capture comprehensive telemetry from
servers and network devices operating within a network. The platform can discover flows …