EC Scheib, A Parandehgheibi, O Madani… - US Patent …, 2019 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can determine an optimum number of clusters for the network using the minimum description …
A Parandehgheibi, MA Attar, O Madani… - US Patent …, 2019 - Google Patents
Flow data can be augmented with features or attributes from other domains, such as attributes from a source host and/or destination host of a flow, a process initiating the flow …
A Parandehgheibi, O Madani, V Jeyakumar… - US Patent …, 2020 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can determine whether certain nodes form a cluster of a tier of an application. The network can …
SK Gupta, N Yadav, MS Watts… - US Patent …, 2018 - Google Patents
A network can achieve compliance by defining and enforcing a set of network policies to secure protected electronic information. The network can monitor network data …
A Kulshreshtha, N Yadav, HT Vu, MS Watts… - US Patent …, 2021 - Google Patents
(57) ABSTRACT A monitoring device/module monitors a plurality of nodes in a data center network, and determines one or more latency distributions of response times for messages …
A Parandehgheibi, MA Attar, O Madani… - US Patent …, 2019 - Google Patents
Application dependency mapping can be automated in a network. The network can capture traffic data for flows passing through the network using a sensor network that provides …
An example method can include monitoring a network to identify flows between nodes in the network. Once flows have been identified, the flows can be tagged and labelled according to …
A Parandehgheibi, MA Attar, V Jeyakumar… - US Patent …, 2022 - Google Patents
This disclosure generally relates to a method and system for generating a communication graph of a network using an application dependency mapping (ADM) pipeline. In one aspect …
RC Prasad, BS Viswanathan, HV Nguyen… - US Patent …, 2020 - Google Patents
An example method can include choosing a pattern or patterns of network traffic. This pattern can be representative of a certain type of traffic such as an attack. The pattern can be …