H04L1/242

Technologies for managing compromised sensors in virtualized environments

Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can receive, from a first capturing agent deployed in a virtualization layer of a first device, data reports generated based on traffic captured by the first capturing agent. The system can also receive, from a second capturing agent deployed in a hardware layer of a second device, data reports generated based on traffic captured by the second capturing agent. Based on the data reports, the system can determine characteristics of the traffic captured by the first capturing agent and the second capturing agent. The system can then compare the characteristics to determine a multi-layer difference in traffic characteristics. Based on the multi-layer difference in traffic characteristics, the system can determine that the first capturing agent or the second capturing agent is in a faulty state.

Hierarchichal sharding of flows from sensors to collectors

Systems, methods, and computer-readable media for hierarchichal sharding of flows from sensors to collectors. A first collector can receive a first portion of a network flow from a first capturing agent and determine that a second portion of the network flow was not received from the first capturing agent. The first collector can then send the first portion of the network flow to a second collector. A third collector can receive the second portion of the network flow from a second capturing agent and determine that the third collector did not receive the first portion of the network flow. The third collector can then send the second portion of the network flow to the second collector. The second collector can then aggregate the first portion and second portion of the network flow to yield the entire portion of the network flow.

System and method of detecting whether a source of a packet flow transmits packets which bypass an operating system stack

A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed on a second host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that the second packet flow was transmitted by a component that bypassed an operating stack of the first host or a packet capture agent at the device to yield a determination, detecting that hidden network traffic exists, and predicting a malware issue with the first host based on the determination.

Generate a communication graph using an application dependency mapping (ADM) pipeline

This disclosure generally relates to a method and system for generating a communication graph of a network using an application dependency mapping (ADM) pipeline. In one aspect of the disclosure, the method comprises receiving network data (e.g., flow data and process information at each node) from a plurality of sensors associated with a plurality of nodes of the network, determining a plurality of vectors and an initial graph of the plurality of nodes based upon the network data, determining similarities between the plurality of vectors, clustering the plurality of vectors into a plurality of clustered vectors based upon the similarities between the plurality of vectors, and generating a communication graph of the network system based upon the plurality of clustered vectors.

Correlating network and physical layer activities
11411590 · 2022-08-09 · ·

A system that incorporates aspects of the subject disclosure may perform operations including, for example, a method of identifying, by a system comprising a processor, network communication degradation in one or more layers of a multi-layered communication protocol above a physical layer, wherein the network communication degradation is associated with communications taking place through a network, in part over a radio frequency link, between a plurality of communication devices, obtaining, by the system, data from a layer below the one or more layers of the multi-layered communication protocol identified as having the network communication degradation, determining, by the system, one or more geographic regions of the network associated with the network communication degradation from the data, and mitigating, by the system, effects of the network communication degradation in the one or more geographic regions of the network. Other embodiments are disclosed.

EYE CLASSES SEPARATOR WITH OVERLAY, AND COMPOSITE, AND DYNAMIC EYE-TRIGGER FOR HUMANS AND MACHINE LEARNING
20220247648 · 2022-08-04 ·

A system for generating images on a test and measurement device includes a first input for accepting a waveform input signal carrying sequential digital information and an image generator structured to generate a visual image using a segment of the waveform input only when two or more sequential codes of digital information match sequential codes carried in the sequential digital information of the segment of the waveform input. A user-defined state-machine comparator may be used to determine which segments of the waveform input signal are used in the image generation.

Adaptive Payload Extraction and Retransmission in Wireless Data Communications with Error Aggregations

Provided are systems and methods for adaptive payload extraction and retransmission in wireless data communications. An example method commences with transmitting a network packet to a receiver via a communication channel. The method further includes receiving a further network packet including a further payload. The method continues with determining, based on the payload and the further payload, an error vector. The method includes generating, based on the error vector, a plurality of indices. An index of the plurality of indices corresponds to a portion of a plurality of non-overlapping portions of the payload. The method further continues with selecting, based on the error vector, at least one index from the plurality of indices. The method includes sending, to the receiver via the communication channel, a further network packet. The further network packet includes the selected index and a portion of the payload corresponding to the selected index.

Indexing-Based Feedback Codes and Methods of Use

Indexing-based feedback codes and methods of use are disclosed herein. An example method includes determining error correction for a received packet having errors, generating an index of the error correction, the index including error positions for the errors in the received packet, and transmitting the index to a decoder receiver. The receiver using the index to correct the errors in the packet.

Convergent Multi-Bit Feedback System

Provided are systems and methods for convergent error vector indexing and retransmission in wireless data verifications. An example method includes transmitting a network packet to a receiver; receiving a further network packet being a copy of the network packet as received by the receiver, determining, based on the network packet and the further network packet, an error vector and locations of errors in the further network packet; sending, to the receiver, a first indexing packet including the locations of the errors; receiving a second indexing packet being a copy of the first indexing packet as received by the receiver; determining, based on the error vector and the second indexing packet, the locations of the errors in the second indexing packet; and sending a third indexing packet including the locations of the errors to the receiver, where the receiver corrects the further network packet using the third indexing packet.

Timing margin detecting circuit, timing margin detecting method and clock and data recovery system

A timing margin detecting circuit is provided. The timing margin detecting circuit comprises a delay element, receiving a first data signal and a first clock signal, configured to generate a second data signal and a second clock signal, wherein the second clock signal has a delay relative to the second data signal; a controller, configured to generate the control signal to control the delay of the second clock signal relative to the second data signal; a sampler, coupled to the delay element, configured to generate a sampled data signal according to the second data signal and the second clock signal; and a bit error rate determination circuit, coupled to the sampler, configured to determine whether the sampled data signal is the same as a predefined test pattern and generate a determination result accordingly; wherein the controller determines a timing margin according to the determination result.