H04L41/0622

Temporary suppression of security event notifications

Temporarily suppressing and/or disabling notifications to a client device of events detected by a security device monitoring an environment. The notifications may be disabled and/or suppressed based upon a request from a user of the client device, or when the client device is nearby the security device. The user may request that notifications are suppressed for a definable suppression duration, wherein a timer is started to run for the suppression duration, and notifications are suppressed while the timer is running. When the client device is nearby the security device, suppression of the notifications for other users may be defined by a user-configurable table. A notification from a security device may include a suppress button to suppress notifications from that security device for a suppression period.

MESSAGE BROKER RESOURCE DELETION
20230239370 · 2023-07-27 ·

The described technology is generally directed towards a message broker resource monitoring service that obtains message broker resource parameter data of a resource, based on communications of a message broker. Based on the resource parameter data and historical data, message broker resource monitoring service obtains a predicted message delivery time value, which can be in association with confidence. If the predicted message delivery time value satisfies a resource deletion criterion, e.g., the predicted message delivery time value, with sufficient confidence, exceeds a threshold value, the message broker resource monitoring service triggers an action to delete the resource. To obtain the predicted value, a regression such as symmetric conformal quantile regression can be applied to the parameter data, e.g., to obtain a predicted message delivery time/latency value.

Intention-based device component tracking system

A component tracking system includes a plurality of devices that each include a device component monitoring subsystem that monitors for and records the addition and/or removal of device components to/from that device. A device component manager system that is coupled to each of the plurality of devices identifies, via a recording by a first device monitoring subsystem in a first device included in the plurality of devices, the removal of a first device component from the first device. The device component manager system then determines, via a recording by a second device component monitoring subsystem in a second device included in the plurality of devices, that the first device component has been added to the second device within a time period and, in response, the device component manager device prevents a removed first device component alarm.

System, method, and computer program for determining a network situation in a communication network

A system, method, and computer program product are provided for a determining a network situation in a communication network. In use, at least one threshold value of at least one operational parameter of a communication network is obtained, the at least one operational parameter representing at least one operational status of at least one of a computational device or a communication device. Additionally, log data of the communication network is obtained, the log data containing at least one value of the at least one operational parameter reported by at least one network entity of the communication network. The at least one value of the at least one operational parameter of the log data is compared with a corresponding threshold value of the at least one threshold value to form a detection of a network situation. Further, the detection of the network situation is reported if the at least one value of the at least one operational parameter of the log data traverses the corresponding threshold value of the at least one threshold value.

CONTROL SYSTEM ANOMALY DETECTION USING NEURAL NETWORK CONSENSUS

Described herein are methods, systems, and platforms comprising neural networks for control system anomaly detection.

Detection, characterization, and prediction of recurring events with missing occurrences using pattern recognition
20220398179 · 2022-12-15 ·

Systems and methods for detection, characterization, prediction, and next occurrence prediction of approximately periodic chain of events with missing occurrences using pattern recognition obtaining data from monitoring a system, wherein the data includes a plurality of records each includes at least a start time and a unique identifier; analyzing the plurality of records to detect a periodic chain of events, wherein the periodic chain of events includes clear or approximate periodicity that is detected based on a plurality of parameters including some missing occurrences therein; converting the periodic chain of events into a binary sequence with each bit representing a time bin and having a value based on a presence or absence of an event in the time bin; and analyzing the binary sequence to recognize a pattern therein to determine a next occurrence of an event in the periodic chain of events.

NETWORK QUALITY DETECTION METHOD AND DEVICE, NETWORK ELEMENT DEVICE, COMPUTER DEVICE, AND COMPUTER READABLE MEDIUM
20220385540 · 2022-12-01 ·

A network quality detection method and device, a network element device, a computer device, and a computer readable medium. The method comprises: separately sending a subscription command to an ingress network element device and an egress network element device of a service flow, the subscription command comprising at least a detection type and a reporting period, so that network element devices bearing the service flow send data according to the detection type and the reporting period; receiving the data sent by the network element devices; determining the path of the service flow according to the data; and detecting the network quality of the path according to the data and a predetermined indicator threshold.

Aggregate notable events in an information technology and security operations application
11516069 · 2022-11-29 · ·

Techniques are described for an IT and security operations application to automatically generate aggregate (or “bulk,” “group,” or “composite”) notable events by identifying notable events sharing common characteristics and aggregating the related notable events into a single aggregate notable event entity that can be displayed and operated upon. The IT and security operations application identifies related notable events based on notable events generated by a common correlation search, notable events having common event attributes, based on user-specified relatedness criteria, or other such criteria. Once identified, in some embodiments, the IT and security operations application displays, in notable event lists and other interfaces, a singular aggregate notable event to users representing each of the identified related notable events.

Systems and methods for managing a security system

A computing device for managing a security system is disclosed. The computing device includes one or more processors. In some embodiments, the one or more processors can receive a number of events occurring in one or more of a number of polling loop networks. The events are monitored by a control device. The one or more processors can determine whether an occurrence frequency of the events exceeds a first threshold, where the occurrence frequency is defined as a number of the events divided by a period of time during which the events occurred. The one or more processors can in response to determining that the occurrence frequency exceeds the first threshold, automatically notify a user of the security system via a web application.

Method and system for detecting errors in local area network

Novel tools and techniques are provided for implementing error detection in a network, and, more particularly, to methods, systems, and apparatuses for implementing error and/or fault detection in a network and/or media stream and providing options to address the error and/or fault in the network and/or media stream. In various embodiments, a computer might detect an error in a first network and send a notification indicating that the error has occurred. The notification might contain one or more options to address the error in the first network. The computer, a user device, a service provider device, or a content provider device might receive and display the notification containing the one or more options. The computer, the user device, the service provider device, or the content provider device might then select at least one of the one or more options to address the error in the first network.