H04L43/067

Accurately identifying execution time of performance test

A computer-implemented method, system and computer program product for accurately identifying an execution time of a performance test. Network latency data is grouped into clustered groups of network latency data. Furthermore, the performance test execution times for the same group of performance tests run in the local and remote cluster environments are obtained. The test execution times impacted by network latency (compensation times) are then determined based on such obtained performance test execution times in the local and remote cluster environments. Such compensation times are then grouped into clustered groups of compensation times. A regression model is built to predict a performance test execution time impacted by network latency (compensation time) using the clustered groups of network latency data and compensation times. The execution time of a performance test run in the remote cluster environment is then generated that takes into consideration the compensation time predicted by the regression model.

Accurately identifying execution time of performance test

A computer-implemented method, system and computer program product for accurately identifying an execution time of a performance test. Network latency data is grouped into clustered groups of network latency data. Furthermore, the performance test execution times for the same group of performance tests run in the local and remote cluster environments are obtained. The test execution times impacted by network latency (compensation times) are then determined based on such obtained performance test execution times in the local and remote cluster environments. Such compensation times are then grouped into clustered groups of compensation times. A regression model is built to predict a performance test execution time impacted by network latency (compensation time) using the clustered groups of network latency data and compensation times. The execution time of a performance test run in the remote cluster environment is then generated that takes into consideration the compensation time predicted by the regression model.

SERVICE DETECTION METHOD AND APPARATUS, DEVICE, AND STORAGE MEDIUM
20230023154 · 2023-01-26 ·

Disclosed are a service detection method and apparatus, a device, and a non-transitory computer-readable storage medium. The service detection method may includes: determining a service time interval between service data; determining a matching result of the service time interval according to a set period value and a set jitter value in a preset periodicity judgment parameter; and determining that the service data is periodic service data in response to determining that the matching result of the current service time interval meets a periodicity condition according to a minimum number of matching time intervals and a maximum number of matching time intervals in the periodicity judgment parameter.

SERVICE DETECTION METHOD AND APPARATUS, DEVICE, AND STORAGE MEDIUM
20230023154 · 2023-01-26 ·

Disclosed are a service detection method and apparatus, a device, and a non-transitory computer-readable storage medium. The service detection method may includes: determining a service time interval between service data; determining a matching result of the service time interval according to a set period value and a set jitter value in a preset periodicity judgment parameter; and determining that the service data is periodic service data in response to determining that the matching result of the current service time interval meets a periodicity condition according to a minimum number of matching time intervals and a maximum number of matching time intervals in the periodicity judgment parameter.

Wireless access network element status reporting

A wireless communication network manages a wireless access node. The wireless access node wirelessly exchanges user data with wireless User Equipment (UEs) and exchanges the user data with one or more network elements. The wireless access node generates status indicators that characterize wireless access node operation during the user data exchanges. An Element Management System (EMS) determines EMS load based on EMS operation and transfers load data that indicates the EMS load for delivery to the wireless access node. The wireless access node receives the load data transferred by the EMS. The wireless access node identifies individual priorities for individual ones of the status indicators. The wireless access node determines individual reporting times for the individual ones of the status indicators based on the load data and the individual priorities. The wireless access node transfers the individual ones of the status indicators to the EMS per the individual reporting times.

APPLICATION SERVICE LEVEL EXPECTATION HEALTH AND PERFORMANCE

Techniques are described for monitoring application performance in a computer network. For example, a network management system (NMS) includes a memory storing path data received from a plurality of network devices, the path data reported by each network device of the plurality of network devices for one or more logical paths of a physical interface from the given network device over a wide area network (WAN). Additionally, the NMS may include processing circuitry in communication with the memory and configured to: determine, based on the path data, one or more application health assessments for one or more applications, wherein the one or more application health assessments are associated with one or more application time periods for a site, and in response to determining at least one failure state, output a notification including identification of a root cause of the at least one failure state.

APPLICATION SERVICE LEVEL EXPECTATION HEALTH AND PERFORMANCE

Techniques are described for monitoring application performance in a computer network. For example, a network management system (NMS) includes a memory storing path data received from a plurality of network devices, the path data reported by each network device of the plurality of network devices for one or more logical paths of a physical interface from the given network device over a wide area network (WAN). Additionally, the NMS may include processing circuitry in communication with the memory and configured to: determine, based on the path data, one or more application health assessments for one or more applications, wherein the one or more application health assessments are associated with one or more application time periods for a site, and in response to determining at least one failure state, output a notification including identification of a root cause of the at least one failure state.

Detection and mitigation DDoS attacks performed over QUIC communication protocol

A method and system for protecting against quick UDP Internet connection (QUIC) based denial-of-service (DDoS) attacks. The system comprises extracting traffic features from at least traffic directed to a protected entity, wherein the traffic features demonstrate behavior of QUIC user datagram protocol (UDP) traffic directed to the protected entity, wherein the extract traffic features include at least one rate-base feature and at least one rate-invariant feature, and wherein the at least traffic includes QUIC packets; computing at least one baseline for each of the at least one rate-base feature and the at least one rate-invariant feature; and analyzing real-time samples of traffic directed to the protected entity to detect a deviation from each of the at least one computed baseline, wherein the deviation is indicative of a detected QUIC DDoS attack; and causing execution of at least one mitigation action when an indication of the detected QUIC DDoS attack is determined.

Detection and mitigation DDoS attacks performed over QUIC communication protocol

A method and system for protecting against quick UDP Internet connection (QUIC) based denial-of-service (DDoS) attacks. The system comprises extracting traffic features from at least traffic directed to a protected entity, wherein the traffic features demonstrate behavior of QUIC user datagram protocol (UDP) traffic directed to the protected entity, wherein the extract traffic features include at least one rate-base feature and at least one rate-invariant feature, and wherein the at least traffic includes QUIC packets; computing at least one baseline for each of the at least one rate-base feature and the at least one rate-invariant feature; and analyzing real-time samples of traffic directed to the protected entity to detect a deviation from each of the at least one computed baseline, wherein the deviation is indicative of a detected QUIC DDoS attack; and causing execution of at least one mitigation action when an indication of the detected QUIC DDoS attack is determined.

Differential latency measurement

The present invention provides a method of selecting an optimal communication routing between a UE and a core network wherein a plurality of differing communication paths are establishable between the UE and the network. Duplicate packets are transmitted over two communication paths and a latency difference determined between the two paths. This latency difference is used to select a communication path for subsequent communication.