Patent classifications
H04L43/02
SYSTEM AND METHOD FOR DATA FILTERING AND TRANSMISSION MANAGEMENT
A system and method for data filtering and transmission management are provided. In particular, disclosed is a method of transmission management for data acquired by a remote monitor having a sensor. The method comprises the steps of: defining an initial trend envelope having a window around a forecast trend gradient, the window defined by an initial upper bound and an initial lower bound; and processing a set of data points acquired by the sensor, to identify any data points outside the initial trend envelope. When a point is identified outside the initial trend envelope, the method: (i) transmits an event data packet to a central server; and (ii) identifies a subsequent trend envelope based on a trend gradient derived from a preceding set of data points, said preceding set of points including an identified point from the event data packet.
CLOCK SKEW DETERMINATION IN A NETWORK
Network devices that (a) test that GPS-clock enabled network devices have synchronized clocks, (b) identify non-GPS-clock enabled network devices with symmetric latencies as likely to be synchronized to GPS-clock enabled neighbor devices, (c) determine clock skews of remaining network devices not identified in (a) or (b) against the network devices identified in (a) and (b), and re-evaluate latencies of the GPS-clock enabled network devices, the non-GPS-clock enabled network devices, and the remaining devices based on the results of (a)-(c).
System and method of detecting hidden processes by analyzing packet flows
A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed outside of the first host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that a hidden process exists and corrective action can be taken.
System and method of detecting hidden processes by analyzing packet flows
A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed outside of the first host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that a hidden process exists and corrective action can be taken.
Auto-labeling of driving logs using analysis-by-synthesis and unsupervised domain adaptation
Acquiring labeled data can be a significant bottleneck in the development of machine learning models that are accurate and efficient enough to enable safety-critical applications, such as automated driving. The process of labeling of driving logs can be automated. Unlabeled real-world driving logs, which include data captured by one or more vehicle sensors, can be automatically labeled to generate one or more labeled real-world driving logs. The automatic labeling can include analysis-by-synthesis on the unlabeled real-world driving logs to generate simulated driving logs, which can include reconstructed driving scenes or portions thereof. The automatic labeling can further include simulation-to-real automatic labeling on the simulated driving logs and the unlabeled real-world driving logs to generate one or more labeled real-world driving logs. The automatically labeled real-world driving logs can be stored in one or more data stores for subsequent training, validation, evaluation, and/or model management.
Systems and methods for a configurable device environment
A system for a configurable device environment, the system comprising a computing device configured to receive remote data corresponding to a subject and a plurality of signals from at least a sensor proximate to the subject, retrieve a biometric profile of the subject, identify a pattern of accessory device states for a plurality of accessory devices, wherein identifying includes determining a coordinated state change for a group of accessory devices of the plurality of accessory devices as a function of the remote data and the biometric profile and identifying the pattern of accessory device states as a function of the coordinated state change, determine an automation rule for the group of accessory devices as a function of the pattern of accessory device states, and transmit, to the group of accessory devices, the automation rule.
Systems and methods for a configurable device environment
A system for a configurable device environment, the system comprising a computing device configured to receive remote data corresponding to a subject and a plurality of signals from at least a sensor proximate to the subject, retrieve a biometric profile of the subject, identify a pattern of accessory device states for a plurality of accessory devices, wherein identifying includes determining a coordinated state change for a group of accessory devices of the plurality of accessory devices as a function of the remote data and the biometric profile and identifying the pattern of accessory device states as a function of the coordinated state change, determine an automation rule for the group of accessory devices as a function of the pattern of accessory device states, and transmit, to the group of accessory devices, the automation rule.
TECHNOLOGIES FOR MANAGING COMPROMISED SENSORS IN VIRTUALIZED ENVIRONMENTS
Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can receive, from a first capturing agent deployed in a virtualization layer of a first device, data reports generated based on traffic captured by the first capturing agent. The system can also receive, from a second capturing agent deployed in a hardware layer of a second device, data reports generated based on traffic captured by the second capturing agent. Based on the data reports, the system can determine characteristics of the traffic captured by the first capturing agent and the second capturing agent. The system can then compare the characteristics to determine a multi-layer difference in traffic characteristics. Based on the multi-layer difference in traffic characteristics, the system can determine that the first capturing agent or the second capturing agent is in a faulty state.
TECHNOLOGIES FOR MANAGING COMPROMISED SENSORS IN VIRTUALIZED ENVIRONMENTS
Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can receive, from a first capturing agent deployed in a virtualization layer of a first device, data reports generated based on traffic captured by the first capturing agent. The system can also receive, from a second capturing agent deployed in a hardware layer of a second device, data reports generated based on traffic captured by the second capturing agent. Based on the data reports, the system can determine characteristics of the traffic captured by the first capturing agent and the second capturing agent. The system can then compare the characteristics to determine a multi-layer difference in traffic characteristics. Based on the multi-layer difference in traffic characteristics, the system can determine that the first capturing agent or the second capturing agent is in a faulty state.
TRAFFIC MONITORING METHOD, RELATED DEVICE, AND SYSTEM
The application provides a method: for any network node in a network, the network node may collect a traffic count result of traffic from the network node to a destination network node that belongs to a same area as the network node. Because destination network nodes of the network node are used to indicate an egress node on a path for forwarding a packet by the network node in the area, a control node may learn of, based on count results corresponding to the destination network nodes, traffic transmitted from the network node to egress nodes. This facilitates the control node to determine a traffic distribution feature in the network. The application provides a method that network nodes collect local aggregated traffic statuses, and then the control node determines the traffic distribution feature in the network based on the local aggregated traffic statuses collected by the network nodes.