H04L43/18

Method, device, and system for network traffic analysis
11558269 · 2023-01-17 · ·

A method, device, and system for network traffic analysis are provided. The method comprises obtaining traffic data of current time interval, recording the traffic data in a Chinese Remainder Theorem based Reversible Sketch (CRT-RS) based on a hash operation comprising Modulo operations, detecting abnormal buckets in the CRT-RS based on a change between the traffic data of current time interval and traffic data of previous time interval, and recovering abnormal source address associated information based on the abnormal buckets, wherein the modulus of the Modulo operations are selected from the modulus in Chinese Remainder Theorem (CRT) as pairwise coprime integers and the CRT-RS includes a plurality of buckets. The step of detecting uses a Modified Multi-chart Cumulative Sum.

Method, device, and system for network traffic analysis
11558269 · 2023-01-17 · ·

A method, device, and system for network traffic analysis are provided. The method comprises obtaining traffic data of current time interval, recording the traffic data in a Chinese Remainder Theorem based Reversible Sketch (CRT-RS) based on a hash operation comprising Modulo operations, detecting abnormal buckets in the CRT-RS based on a change between the traffic data of current time interval and traffic data of previous time interval, and recovering abnormal source address associated information based on the abnormal buckets, wherein the modulus of the Modulo operations are selected from the modulus in Chinese Remainder Theorem (CRT) as pairwise coprime integers and the CRT-RS includes a plurality of buckets. The step of detecting uses a Modified Multi-chart Cumulative Sum.

Debugging arrangement for active ethernet cable

A cable, a manufacturing method, and a usage method, each facilitate product development, testing, and debugging. An illustrative embodiment of a cable manufacturing method includes: connecting a first connector plug to a first data recovery and re-modulation (DRR) device and to a first controller device; and coupling electrical signal conductors to the first DRR device to convey electrical transit signals to and from a second DRR device, the second DRR device being connected to a second connector plug. The first controller device is operable in response to a host command to initiate a debug dump by the first DRR device and to store the debug dump in a nonvolatile memory.

Debugging arrangement for active ethernet cable

A cable, a manufacturing method, and a usage method, each facilitate product development, testing, and debugging. An illustrative embodiment of a cable manufacturing method includes: connecting a first connector plug to a first data recovery and re-modulation (DRR) device and to a first controller device; and coupling electrical signal conductors to the first DRR device to convey electrical transit signals to and from a second DRR device, the second DRR device being connected to a second connector plug. The first controller device is operable in response to a host command to initiate a debug dump by the first DRR device and to store the debug dump in a nonvolatile memory.

Calibrating network analyzer devices

A device receives network information from an analyzer device associated with a host device, a target device, and a link of a network, and compares the network information and historical equalizer calibration information to identify a set of equalizer calibration information. The historical equalizer calibration information is associated with multiple host devices, multiple target devices, and multiple links. The device ranks the set of equalizer calibration information, based on quality information associated with the historical equalizer calibration information, to generate a ranked set of equalizer calibration information. The device provides the ranked set of equalizer calibration information to the analyzer device to permit the analyzer device to identify selected equalizer calibration information of the ranked set of equalizer calibration information, and utilize the selected equalizer calibration information.

Calibrating network analyzer devices

A device receives network information from an analyzer device associated with a host device, a target device, and a link of a network, and compares the network information and historical equalizer calibration information to identify a set of equalizer calibration information. The historical equalizer calibration information is associated with multiple host devices, multiple target devices, and multiple links. The device ranks the set of equalizer calibration information, based on quality information associated with the historical equalizer calibration information, to generate a ranked set of equalizer calibration information. The device provides the ranked set of equalizer calibration information to the analyzer device to permit the analyzer device to identify selected equalizer calibration information of the ranked set of equalizer calibration information, and utilize the selected equalizer calibration information.

Automation and latency remediation for secure messaging systems

Systems and methods for secure messaging and automation are disclosed herein. An example method includes providing a user-facing application secured through use of a security token cached on a web browser, establishing a security protocol or security token utilized between the application server layer and the web services layer that is different from the security token cached on the web browser; and performing asynchronous processing based on user interaction with a goal-based planning application that provides queries that are directed to assessing both risk willingness and goal ability, generates a risk willingness score and a goal ability score, selects a goal-based plan, and generating one or more instructions sets that are used to automatically reconfigure the plurality of user accounts to ensure that a goal is met within a specified time frame.

Automation and latency remediation for secure messaging systems

Systems and methods for secure messaging and automation are disclosed herein. An example method includes providing a user-facing application secured through use of a security token cached on a web browser, establishing a security protocol or security token utilized between the application server layer and the web services layer that is different from the security token cached on the web browser; and performing asynchronous processing based on user interaction with a goal-based planning application that provides queries that are directed to assessing both risk willingness and goal ability, generates a risk willingness score and a goal ability score, selects a goal-based plan, and generating one or more instructions sets that are used to automatically reconfigure the plurality of user accounts to ensure that a goal is met within a specified time frame.

Secure message processing protocol

A system and method for processing electronic data messages mitigate the transmission of one or more electronic messages including a sequence of data as a plurality of packets characterized by a sequence therebetween corresponding to the sequence of the data of the electronic message, each packet including data indicative of the sequence of that packet relative to the others of the plurality of packets, to a receiving system, prior to the sender determining that the message(s) is/are desired, alone or in conjunction with subsequently canceling or otherwise invalidating the message(s). The system and method mitigate such behavior by adding a timestamp when the packets are received, detecting if at least one of the received augmented packets of the electronic data message was received by the network interface in an order different from the sequence between the plurality of packets, and taking an action with respect to the electronic data message.

Secure message processing protocol

A system and method for processing electronic data messages mitigate the transmission of one or more electronic messages including a sequence of data as a plurality of packets characterized by a sequence therebetween corresponding to the sequence of the data of the electronic message, each packet including data indicative of the sequence of that packet relative to the others of the plurality of packets, to a receiving system, prior to the sender determining that the message(s) is/are desired, alone or in conjunction with subsequently canceling or otherwise invalidating the message(s). The system and method mitigate such behavior by adding a timestamp when the packets are received, detecting if at least one of the received augmented packets of the electronic data message was received by the network interface in an order different from the sequence between the plurality of packets, and taking an action with respect to the electronic data message.