System for monitoring and managing datacenters

N Yadav, AR Singh, S Gandham, EC Scheib… - US Patent …, 2018 - Google Patents
An example method includes detecting, using sensors, packets throughout a datacenter.
The sensors can then send packet logs to various collectors which can then identify and …

Network flow watermarking: A survey

A Iacovazzi, Y Elovici - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Traffic analysis (TA) is a useful tool aimed at understanding network traffic behavior. Basic
network administration often takes advantage of TA for purposes such as security, intrusion …

MDL-based clustering for application dependency mapping

EC Scheib, A Parandehgheibi, O Madani… - US Patent …, 2019 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can
determine an optimum number of clusters for the network using the minimum description …

Augmenting flow data for improved network monitoring and management

A Parandehgheibi, MA Attar, O Madani… - US Patent …, 2019 - Google Patents
Flow data can be augmented with features or attributes from other domains, such as
attributes from a source host and/or destination host of a flow, a process initiating the flow …

Policy-driven compliance

SK Gupta, N Yadav, MS Watts… - US Patent …, 2018 - Google Patents
A network can achieve compliance by defining and enforcing a set of network policies to
secure protected electronic information. The network can monitor network data …

Cluster discovery via multi-domain fusion for application dependency mapping

A Parandehgheibi, O Madani, V Jeyakumar… - US Patent …, 2020 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can
determine whether certain nodes form a cluster of a tier of an application. The network can …

SoK: contemporary issues and challenges to enable cyber situational awareness for network security

M Husák, T Jirsík, SJ Yang - … of the 15th International Conference on …, 2020 - dl.acm.org
Cyber situational awareness is an essential part of cyber defense that allows the
cybersecurity operators to cope with the complexity of today's networks and threat …

Optimizations for application dependency mapping

A Parandehgheibi, MA Attar, O Madani… - US Patent …, 2019 - Google Patents
Application dependency mapping can be automated in a network. The network can capture
traffic data for flows passing through the network using a sensor network that provides …

Techniques for determining network anomalies in data center networks

A Kulshreshtha, N Yadav, HT Vu, MS Watts… - US Patent …, 2021 - Google Patents
A monitoring device/module monitors a plurality of nodes in a data center network, and
determines one or more latency distributions of response times for messages exchanged …

Using Bayesian networks for probabilistic identification of zero-day attack paths

X Sun, J Dai, P Liu, A Singhal… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Enforcing a variety of security measures (such as intrusion detection systems, and so on)
can provide a certain level of protection to computer networks. However, such security …