H04L12/26

METHOD FOR CLASSIFYING THE PAYLOAD OF ENCRYPTED TRAFFIC FLOWS

A method is implemented by a network device to classify encrypted data traffic. The method identifies characteristics of the encrypted data traffic that have been modeled where network anomalies have been injected into the encrypted data traffic to provide additional traffic characteristics that enable categorization. The method receives the encrypted data traffic, applies an encrypted traffic categorization model to the received encrypted data traffic to determine a first categorization identification, injects an anomaly into the encrypted data traffic where the first categorization identification is not within a precision threshold, applies the encrypted traffic categorization model to monitored encrypted traffic after injection of the anomaly to determine a second categorization identification, and applies the second categorization identification where the second categorization identification is within the precision threshold.

EXTENDED PING PROTOCOL FOR DETERMINING STATUS FOR REMOTE INTERFACES WITHOUT REQUIRING NETWORK REACHABILITY
20170366437 · 2017-12-21 ·

An extend ping protocol is described that allow connectivity tests to be performed for individual network interfaces of a target device without requiring network reachability between the testing device and the remote interface whose status is being queried. Moreover, the extend ping protocol supports a plurality of different probe types that allow an administrator to control how identification information within an extended ping echo request is resolved to the unreachable interfaces.

OPERATION METHOD OF COMMUNICATION NODE FOR DETECTING LINK ERRORS IN NETWORK

An operation method of a first communication node in an Ethernet-based vehicle network includes identifying a link status between the first communication node and each of a plurality of communication nodes included in the vehicle network; receiving a first frame from a second communication node whose link status is normal among the plurality of communication nodes; identifying a first time difference between a local time of the first communication node and a time stamp of the first frame; and determining a synchronization error between the first communication node and the second communication node based on the first time difference.

RELIABLILITY AND PERFORMANCE ANALYSIS SYSTEM
20170366419 · 2017-12-21 · ·

A reliability and performance analysis system is disclosed. The reliability and performance analysis system includes a logic analyzer and a server. The logic analyzer includes a set of probes capable of retrieving signals of a digital device. The retrieved signals are integrated and stored into a storage module of the logic analyzer. The retrieved signals are then transmitted to a remote server which are utilized to select specific signals to analyze the reliability and performance of the digital device. The storage module can increase the stability of the logic analyzer such that the logic analyzer can proceed a long-term signal retrieving process and a user can obtain an analysis result by connecting to the server directly.

ACCESSING PERIPHERAL DEVICES FROM A CONTAINER WITHIN VIRTUAL MACHINES RUNNING ON DIFFERENT HOST COMPUTING SYSTEMS

A method to enable container access to a peripheral device, where the container is hosted by a virtual machine running in a first host and the peripheral device is directly connected to a second host, is provided. The method includes determining a bandwidth requirement of the peripheral device, and comparing the bandwidth requirement of the peripheral device to bandwidth allocated to the virtual machine that is hosting the container. If the bandwidth requirement of the peripheral device is higher than a threshold percentage of the bandwidth allocated to the virtual machine, the virtual machine is migrated from the first host computer to the second host computer. On the other hand, if the bandwidth requirement of the peripheral device is lower than the threshold percentage of the bandwidth allocated to the virtual machine, processes are launched to establish a network channel by which the container communicates with the peripheral device.

SYSTEM FOR IDENTIFYING RESOURCE ISSUES AND MANAGING A NETWORK OF RESOURCES
20170364871 · 2017-12-21 ·

Systems, computer program products, and methods are described herein for resource manager entity device security and maintenance. The present invention is configured to identify an issue with a resource and notify all other resources across the entity and customers of the entity that the resource is experiencing an issue; determine that an account is involved in a counterfeit activity and notify all other resources across the entity to deny further activity associated with the account; determine that the first resource is experiencing an issue and send fixes to the first resource and all other resources located within a predetermined distance from the first resource.

MONITORING ENTERPRISE NETWORKS WITH ENDPOINT AGENTS

Techniques for monitoring enterprise networks with endpoint agents are disclosed. In some embodiments, a system, process, and/or computer program product for monitoring enterprise networks with endpoint agents includes deploying a plurality of endpoint agents to a plurality of endpoint devices; collecting test results from each of the plurality of endpoint agents, wherein the test results are based on tests executed on each of the plurality of endpoint devices for monitoring network activity; and generating a graphical visualization of an application delivery state for one or more application delivery layers based on the test results, generating an alert based on the test results, or generating a report based on the test results.

SYSTEM FOR AGGREGATED MACHINE-INITIATED RESOURCE DISTRIBUTION

Embodiments of the invention are directed to a system, method, or computer program product for aggregation of machine-initiated resource distribution. The invention generates a smart device portal for linkage of user associated smart devices. The portal generates code to extract data from the smart devices and control the communications disseminated from and received by the smart device from third parties. Thus, the generated portal and coded stored signal fixes the technical challenges within the current network including the need to consolidate and aggregate data across smart devices associated with the user, the need to control and manage the flow of data packets from smart devices to third parties (privacy, filtering, protection), and the need to easily track and refresh an inventory of smart devices in a manner that allows key data to remain associated with the user while the user's inventory, device associations, and personal/business associations change over time.

Generating high-speed test traffic in a network switch

Communication apparatus includes multiple interfaces connected to a packet data network, and a memory coupled to the interfaces and configured as a buffer to contain packets received through ingress interfaces while awaiting transmission to the network via respective egress interfaces. Packet processing logic is configured, upon receipt of a test packet through an ingress interface of the apparatus, to allocate a space in the buffer for storage of a single copy of the test packet, to replicate and transmit sequentially multiple copies of the stored copy of the test packet through a designated egress interface, to receive an indication of a number of copies of the test packet that are to be transmitted, and responsively to the indication, to terminate replication of the test packet and release the allocated space in the buffer.

META-AGENT BASED ADAPTATION IN MULTI-AGENT SYSTEMS FOR SOA SYSTEM EVALUATION
20170366443 · 2017-12-21 ·

Systems and methods are provided for addressing the complexity inherent in evaluating Service Oriented Architecture (SOA) systems by using meta-agent based adaptation in multi-agent systems. Embodiments of the present disclosure provide a multi-agent based automated evaluation capability for distributed, SOA systems that can dynamically adapt to the non-deterministic nature of such systems to enable a continuous monitoring capability for detecting and circumventing operational errors as they arise.