Patent classifications
H04L2101/663
APPARATUS HAVING ENGINE USING ARTIFICIAL INTELLIGENCE FOR DETECTING ANOMALIES IN A COMPUTER NETWORK
A system comprises an enterprise network system and engine. The engine has a discovery module coupled to a switch device, an AI and machine learning based monitoring and detection module coupled to the switch device, and a remediation module coupled to the switch device. The remediation module is configured to initiate a remediation process based upon the detection of at least one of the anomalies from the flow of data.
Data Transmission Method, Apparatus, and System
A data transmission method, implemented by a network device, includes sending a probe packet to a log server, determining whether the log server can receive a packet responsive to whether the network device receives a probe response packet from the log server, and sending a log packet to the log server when the log server can receive a packet. The log packet includes a correspondence between a public Internet Protocol (IP) address and a private IP address.
Information processing apparatus, and non-transitory computer readable recording medium that stores packet pattern creation program
An information processing apparatus includes: a sub controller; a main controller; and a communication interface, the main controller being configured to detect a trigger to start the sleep mode, then create port-dependent TCP packet patterns and port-dependent UDP packet patterns, the port-dependent TCP packet patterns being packet patterns specifying all in-use TCP ports, the port-dependent UDP packet patterns being packet patterns specifying all in-use UDP ports, determine that a total number of the port-dependent UDP packet patterns and the port-dependent TCP packet patterns exceeds a maximum value, then delete all the port-dependent TCP packet patterns, create port-independent TCP packet patterns for different TCP protocols, respectively, the port-independent TCP packet pattern being one packet pattern specifying no TCP port, and supply the port-dependent UDP packet patterns and the port-independent TCP packet patterns to the sub controller, and start the sleep mode.
SYSTEM AND METHOD FOR AUTHORIZING TRAFFIC FLOWS
A method and system for authorizing traffic flows in a computer network. The method including: receiving a packet from a traffic flow sent by a sender; determining whether the traffic flow has been previously authorized; if the traffic flow has not been previously authorized: determining a subscriber associated with the traffic flow, based on the data retrieved from the packet; requesting authorization from an authorization server based on the subscriber and the data retrieved from the packet; upon receiving a response from the authorization server, sending at least three duplicate acknowledgments to the sender, to generate a retransmission in advance of the standard retransmission timing; otherwise, if the traffic flow has been previously authorized, allowing the packet to continue to a destination.
Content delivery to over the top device from customer premises equipment using notifications and dynamic port assignment
A method, a device, and a non-transitory storage medium are described in which an inter-networked content service is provided. The inter-networked content service may allow an end device to receive content from a set top box when the end device is not connected to a local area network of the set top box. The inter-networked content service may provide for push notification messaging between the end device and the set top box to obtain network address, status, and port information in support of a content session.
Systems and Methods for Tracking and Identifying Phishing Website Authors
A method of tracking phishing activity is disclosed. A request to download a webpage hosted as part of a legitimate website on a server is initiated. The request includes identification data pertaining to at least one user computing device. The identification data is extracted from the request. A unique identifier corresponding to the extracted identification data is generated. Fingerprint data is generated using at least a subset of the extracted identification data. The unique identifier, the extracted identification data and the fingerprint data is stored. The fingerprint data is encoded into a program and/or data associated with the webpage to generate a modified webpage. The modified webpage is transmitted from the server to the user computing device in response to the request.
SYSTEMS AND METHODS FOR ACQUIRING AN INTERNET PROTOCOL NETWORK ADDRESS OF A USER EQUIPMENT IN NETWORKS
A device may determine that an application server requires an IPv6 address of a user equipment, and may provide, to another network device, a request for the IPv6 address of the user equipment, wherein the request includes data identifying an IP address of the network device and a port of the network device, and wherein the request is to cause the other network device to provide the request for the IPv6 address to the user equipment via a SMS request message, and receive, from the user equipment, data identifying the IPv6 address and a port of the user equipment via a SMS response message. The network device may receive, from the other network device, a response that includes the data identifying the IPv6 address and the port of the user equipment, and may store the data identifying the IPv6 address and the port of the user equipment.
IMPLICIT DISCOVERY CONTROLLER REGISTRATION OF NON-VOLATILE MEMORY EXPRESS (NVME) ELEMENTS IN AN NVME-OVER-FABRICS (NVME-OF) SYSTEM
Presented herein are embodiments for implicitly or indirectly registering elements of a non-volatile memory express (NVMe) entity in an NVMe-over-Fabric (NVMe-oF) environment. In one or more embodiments, one or more interactions between an NVMe entity and a centralized storage fabric service component, such as part of the Link Layer Discovery Protocol (LLDP) process or the Multicast Domain Name System (mDNS) process, may be used by the centralized storage fabric service to extract information about the NVMe entity and automatically register it with a centralized registration datastore. In one or more embodiments, the centralized registration datastore may be used to facilitate services in the NVMe-oF system, such as discovery of NVMe entities, provisioning, and access control. In one or more embodiments, an implicitly registered NVMe entity may also subsequently explicitly register, which may include supplying additional information about the NVMe entity.
Techniques for improving output-packet-similarity between primary and secondary virtual machines
Examples may include intercepting packets outputted from a primary virtual machine (PVM) hosted by a first server and converting one or more fields of protocol headers for each intercepted packet such that output-packet-similarity may be increased between the PVM outputted packets and packets outputted by a secondary virtual machine (SVM) hosted by a second server.
RELAY DEVICE, DATA RELAY METHOD AND PROGRAM
To suppress reduction in facility utilization efficiency occurring on for a communication carrier and reduction in feeling quality occurring on users caused by a relay device arranged at a boundary between two networks comprising a mobile network. The relay device comprises a proxy part that terminates each of TCP communications with a data providing side apparatus and with a data transmission destination apparatus to be a transmission destination of data received from the data providing side apparatus; a transmission buffer that stores data to be transmitted to the data transmission destination apparatus among data received from the data providing side apparatus; a reception ability prospecting part that prospects reception ability of the data transmission destination apparatus based on vacant volume of the transmission buffer; and a transfer rate control part that instructs the data providing side apparatus of a transfer rate based on the reception ability of the data transmission destination apparatus.