Trigger alarm actions and alarm-triggered network flows in software-defined networks

D Gammel, R Smith - US Patent 10,756,956, 2020 - Google Patents
A software-defined network controller (SDN controller) defines a first network flow to be
selectively implemented by a networking device according to a first network operation …

[PDF][PDF] Machine Learning Techniques to Detect Known and Novel Cyber-attacks

M Monshizadeh - 2023 - aaltodoc.aalto.fi
Intrusion detection systems are considered well-known tools for monitoring and detecting
malicious traffic in communication networks. However, traditional intrusion detection systems …

Systems and methods for non-intrusive network performance monitoring

DA Shokarev, NS Patel, A Baban - US Patent 10,855,546, 2020 - Google Patents
A first network device may receive packets as part of a traffic flow of an internet protocol
session, select a packet based on a rule, and add, to a packet replica of the selected packet …

Method For Determining Class Information And Apparatus

L Hu, J Chen - US Patent App. 17/245,570, 2021 - Google Patents
US20210250771A1 - Method For Determining Class Information And Apparatus - Google
Patents US20210250771A1 - Method For Determining Class Information And Apparatus …

System and method for SDN orchestration validation

D Reid, J Soryal - US Patent 11,469,942, 2022 - Google Patents
A system includes an orchestrator for a software-defined network and configured to receive
a request for operation of the software-defined network, a software-defined network …

System and method for SDN orchestration validation

D Reid, J Soryal - US Patent 12,003,366, 2024 - Google Patents
A system includes an orchestrator for a software-defined network and configured to receive
a request for operation of the software-defined network, a software-defined network …

Mitigation of DDoS attacks on mobile networks using DDoS detection engine deployed in relation to an evolve node B

HK Jain - US Patent 11,503,471, 2022 - Google Patents
Systems and methods for inspection of traffic between UE and the core network to mitigate
DDoS attacks on mobile networks are provided. According to one embodiment, the method …