A Iacovazzi, Y Elovici - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Traffic analysis (TA) is a useful tool aimed at understanding network traffic behavior. Basic network administration often takes advantage of TA for purposes such as security, intrusion …
EC Scheib, A Parandehgheibi, O Madani… - US Patent …, 2019 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can determine an optimum number of clusters for the network using the minimum description …
A Parandehgheibi, MA Attar, O Madani… - US Patent …, 2019 - Google Patents
Flow data can be augmented with features or attributes from other domains, such as attributes from a source host and/or destination host of a flow, a process initiating the flow …
SK Gupta, N Yadav, MS Watts… - US Patent …, 2018 - Google Patents
A network can achieve compliance by defining and enforcing a set of network policies to secure protected electronic information. The network can monitor network data …
A Parandehgheibi, O Madani, V Jeyakumar… - US Patent …, 2020 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can determine whether certain nodes form a cluster of a tier of an application. The network can …
M Husák, T Jirsík, SJ Yang - … of the 15th International Conference on …, 2020 - dl.acm.org
Cyber situational awareness is an essential part of cyber defense that allows the cybersecurity operators to cope with the complexity of today's networks and threat …
A Parandehgheibi, MA Attar, O Madani… - US Patent …, 2019 - Google Patents
Application dependency mapping can be automated in a network. The network can capture traffic data for flows passing through the network using a sensor network that provides …
A Kulshreshtha, N Yadav, HT Vu, MS Watts… - US Patent …, 2021 - Google Patents
A monitoring device/module monitors a plurality of nodes in a data center network, and determines one or more latency distributions of response times for messages exchanged …
X Sun, J Dai, P Liu, A Singhal… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Enforcing a variety of security measures (such as intrusion detection systems, and so on) can provide a certain level of protection to computer networks. However, such security …