US20170339022A1 - Anomaly detection and prediction in a packet broker - Google Patents
Anomaly detection and prediction in a packet broker Download PDFInfo
- Publication number
- US20170339022A1 US20170339022A1 US15/466,732 US201715466732A US2017339022A1 US 20170339022 A1 US20170339022 A1 US 20170339022A1 US 201715466732 A US201715466732 A US 201715466732A US 2017339022 A1 US2017339022 A1 US 2017339022A1
- Authority
- US
- United States
- Prior art keywords
- core network
- network
- machine learning
- packet broker
- learning models
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000001514 detection method Methods 0.000 title abstract description 33
- 238000010801 machine learning Methods 0.000 claims abstract description 70
- 238000000034 method Methods 0.000 claims abstract description 32
- 230000009471 action Effects 0.000 claims abstract description 24
- 230000004044 response Effects 0.000 claims abstract description 8
- 239000000523 sample Substances 0.000 claims description 29
- 238000012549 training Methods 0.000 claims description 28
- 238000003860 storage Methods 0.000 claims description 18
- 238000012417 linear regression Methods 0.000 claims description 2
- 238000004458 analytical method Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 10
- 230000002547 anomalous effect Effects 0.000 description 8
- 230000006399 behavior Effects 0.000 description 8
- 230000015654 memory Effects 0.000 description 8
- 238000012986 modification Methods 0.000 description 8
- 230000004048 modification Effects 0.000 description 8
- 230000008901 benefit Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 238000013459 approach Methods 0.000 description 5
- 239000004744 fabric Substances 0.000 description 5
- 238000013528 artificial neural network Methods 0.000 description 4
- 238000004519 manufacturing process Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 238000013105 post hoc analysis Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000012800 visualization Methods 0.000 description 2
- 238000010420 art technique Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000011897 real-time detection Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 230000006403 short-term memory Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000011895 specific detection Methods 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/044—Recurrent networks, e.g. Hopfield networks
-
- G06N99/005—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/142—Network analysis or design using statistical or mathematical methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/147—Network analysis or design for predicting network behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/16—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
- H04L43/062—Generation of reports related to network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/12—Network monitoring probes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
Definitions
- a visibility network (also known as a “visibility fabric”) is a type of network that facilitates the monitoring and analysis of traffic flowing through another, “core” network (e.g., a production network).
- core e.g., a production network.
- the reasons for deploying a visibility network are varied and can include network management and optimization, business intelligence/reporting, compliance validation, service assurance, security monitoring, and so on.
- FIG. 1 depicts an example visibility network 100 according to an embodiment.
- visibility network 100 includes a number of taps 102 that are deployed within a core network 104 .
- Taps 102 are configured to replicate data and control traffic that is exchanged between network elements in core network 104 and forward the replicated traffic to a packet broker 106 (note that, in addition to or in lieu of taps 102 , one or more routers or switches in core network 104 can be tasked to replicate and forward data/control traffic to packet broker 106 using their respective SPAN or mirror functions).
- Packet broker 106 can perform various packet processing functions on the replicated traffic, such as removing protocol headers, filtering/classifying packets based on configured rules, and so on.
- Packet broker 106 can then forward the processed traffic to one or more analytic probes/tools 108 , which can carry out various calculations and analyses on the traffic in accordance with the business goals/purposes of visibility network 100 (e.g., calculation of key performance indicators (KPIs), detection of traffic anomalies, generation of reports, etc.).
- KPIs key performance indicators
- analytic probes/tools 108 are configured to perform traffic anomaly detection
- existing implementations of these probes/tools generally follow an approach that involves (1) recording/storing all of the traffic data replicated from core network 104 (i.e., both anomalous and non-anomalous traffic data), and (2) subsequently performing a post-hoc analysis on the stored data in order to identify anomalies. While this approach is functional, it also suffers from a number of inefficiencies and drawbacks. For example, consider a scenario where core network 104 is a very high volume network such as, e.g., a mobile service provider network.
- the amount of compute and storage resources needed on analytic probes/tools 108 in order to store and analyze all of the traffic replicated from core network 104 will also be very high (even though only a small percentage of that traffic may actually be anomalous), resulting in significant infrastructure costs and poor scaling of visibility network 100 as the scope of core network 104 grows.
- the post-hoc analysis described above is typically performed long after the anomalies being detected have occurred in core network 104 . This makes it difficult or impossible for analytic probes/tools 108 to implement measures that address the root causes of the anomalies while they are in progress, or to actively predict the occurrence of future anomalies.
- the packet broker can apply one or more machine learning models to network traffic that is replicated from a core network.
- the packet broker can further detect or predict, based on the application of the one or more machine learning models, the occurrence of a network traffic anomaly in the core network.
- the packet broker can then take one or more predefined actions in response to the detection/prediction of the anomaly.
- FIG. 1 depicts an example visibility network.
- FIG. 2 depicts a visibility network in which the anomaly detection/prediction techniques of the present disclosure may be implemented according to an embodiment.
- FIG. 3 depicts a workflow for training a machine learning model used for anomaly detection/prediction according to an embodiment.
- FIG. 4 depicts an example LSTM neural network according to an embodiment.
- FIG. 5 depicts a workflow for performing anomaly detection according to an embodiment.
- FIG. 6 depicts a workflow for performing anomaly prediction according to an embodiment.
- FIG. 7 depicts an example user interface for a core network visualization tool according to an embodiment.
- FIG. 8 depicts an example network device according to an embodiment.
- FIG. 9 depicts an example computer system according to an embodiment.
- Embodiments of the present disclosure provide techniques that can be implemented by a packet broker in a visibility network for detecting and predicting anomalies in the network traffic of a core network.
- these techniques can include training, by the packet broker based on traffic data replicated from the core network, one or more machine learning models that are designed to model the core network's typical traffic patterns.
- one such machine learning model can be designed to model changes in the value of a particular core network parameter over time (e.g., subscriber attach rate, paging rate, data throughput, etc.).
- the packet broker can apply these models (and/or other pre-trained models) to subsequent traffic that is replicated from the core network in order to detect and/or predict the occurrence of traffic anomalies in the core network in real-time. For example, in the case where the packet broker has trained a machine learning model M that models subscriber attach rate, the packet broker can compare the current subscriber attach rate in the core network with the subscriber attach rate value modeled by M for the current point in time. If the difference between these two values exceeds a threshold, the packet broker can determine that an anomaly with respect to subscriber attach rate has occurred (or is in the process of occurring).
- the packet broker can compare an extrapolated future subscriber attach rate in the core network modeled by M with a predefined threshold. If the extrapolated future value exceeds the threshold, the packet broker can predict that an anomaly with respect to subscriber attach rate will very likely occur in the future.
- the packet broker can take one or more predefined (e.g., user-defined) actions.
- predefined actions can include applying a filter that steers replicated traffic related to the anomalous event (e.g., traffic originating from a particular location or associated with a particular host/subscriber) to one or more special analytic probes/tools for further analysis and storage.
- the predefined actions can also include, e.g., generating an alert for a network administrator, implementing metering or sampling of the replicated traffic (in the case of an anomalous traffic burst), and others.
- the packet broker can advantageously steer only anomalous (or likely to be anomalous) traffic to the probes/tools, which will typically make up a small percentage of the overall traffic replicated from the core network. This means that the computational and storage resources needed on the analytic probes/tools can be significantly reduced, which in turn can allow these components to scale out and handle very large traffic volumes in the core network in an efficient manner.
- the packet broker can actively predict the occurrence of future anomalies and take steps to address them. For example, the packet broker may forward a traffic flow associated with a predicted future anomaly to the analytic probes/tools for preemptive analysis and review, before the anomaly actually occurs.
- the packet broker can flexibly and accurately detect/predict a large number of different anomalies.
- the packet broker may apply one set of machine learning models (referred to herein as “time-series models”) to detect/predict anomalies in time-series traffic data, such as subscriber attach rate, paging rate, data throughput, etc., derived from the core network.
- the packet broker may also apply another set of machine learning models (referred to herein as “protocol language models”) to detect/predict anomalies in protocol message exchanges/flows replicated from the core network.
- the particular machine learning models that are in use at any point in time, as well as the specific detection/prediction rules that are applied for each model, may be configurable by a network administrator.
- FIG. 2 depicts a visibility network 200 that may be used to implement the anomaly detection/prediction techniques of the present disclosure according to an embodiment.
- visibility network 200 includes a number of taps 202 that are deployed in a core network 204 and are configured to replicate traffic exchanged in network 204 to a packet broker 206 .
- core network 204 is a mobile LTE network that comprises network elements specific to this type of network, such as an eNodeB 210 , a mobility management entity (MME) 212 , a serving gateway (SGW) 214 , and a packet data network gateway (PGW) 216 which connects to an external packet data network such as the Internet.
- MME mobility management entity
- SGW serving gateway
- PGW packet data network gateway
- taps 202 are configured to replicate and forward GTP-C and GTP-U traffic that is exchanged on certain interfaces of core network 204 .
- core network 204 can be any other type of computer network known in the art, such as a mobile 3G network, a landline local area network (LAN) or wide area network (WAN), etc.
- packet broker 206 can perform various types of packet processing functions on the traffic (as configured/assigned by an operator of visibility network 200 ) and can forward the processed traffic to one or more analytic probes/tools 208 for analysis.
- packet broker 206 can be implemented solely in hardware, such as in the form of a network switch or router that relies on ASIC or FPGA-based packet processors to execute its assigned packet processing functions based on rules that are programmed into hardware memory tables (e.g., CAM tables) resident on the packet processors and/or line cards of the device.
- packet broker 206 can be implemented solely in software that runs on, e.g., one or more general purpose physical or virtual computer systems.
- packet broker 206 can be implemented using a combination of hardware and software, such as a combination of a hardware-based basic packet broker and a software-based “session director” cluster as described in co-owned U.S. patent application Ser. No. 15/205,889, entitled “Software-based Packet Broker,” the entire contents of which are incorporated herein by reference in its entirety for all purposes.
- packet broker 206 of FIG. 2 is enhanced to include a novel anomaly detection/prediction module 218 .
- anomaly detection/prediction module 218 can be implemented in software, hardware, or a combination thereof.
- anomaly detection/prediction module 218 can (1) train one or more machine learning models that are designed to model core network 204 's traffic patterns (and thereby learn the typical behavior of core network 204 ); (2) apply the trained (as well as other pre-trained) machine learning models to subsequent traffic that is replicated from core network 204 in order to detect and/or predict the occurrence of traffic anomalies in core network 204 in real-time; and (3) upon detecting or predicting an anomaly, execute one or more predefined actions, such as steer replicated traffic that is deemed to be associated with the anomaly to a particular analytic probe/tool 208 for storage and further analysis.
- predefined actions such as steer replicated traffic that is deemed to be associated with the anomaly to a particular analytic probe/tool 208 for storage and further analysis.
- anomaly detection/prediction module 218 can eliminate or minimize many of the problems associated with conventional post-hoc anomaly detection on analytic probes/tools 208 .
- the details for implementing the training, detection, and prediction steps above are described in the sections that follow.
- FIG. 2 is illustrative and not intended to limit embodiments of the present disclosure.
- the various entities shown in FIG. 2 may be arranged according to different configurations and/or include subcomponents or functions that are not specifically described.
- One of ordinary skill in the art will recognize other variations, modifications, and alternatives.
- FIG. 3 depicts a workflow 300 that can be executed by anomaly detection/prediction module 218 of packet broker 206 for training a machine learning model that will be used for detecting/predicting traffic anomalies in core network 204 according to an embodiment.
- training workflow 300 will be applied to machine learning models that model traffic patterns/behavior which may differ from one network to another (and thus benefit from learning the specific patterns/behavior of a specific core network). Examples of such machine learning models include time-series models that track changes in the values of certain core network data or signaling parameters (e.g., subscriber attach rate, paging rate, packets per second, etc.) over time.
- Training workflow 300 does not need to be applied to machine learning models that model traffic patterns/behavior which will be substantially similar across different deployments, such as protocol language models.
- module 218 can first select a machine learning model to be trained for anomaly detection/prediction.
- the manufacturer/vendor of packet broker 206 can pre-install a number of different machine learning models for this purpose on packet broker 206 and module 218 can select one of the pre-installed models.
- the pre-installed models may be pre-trained by the manufacturer/vendor using generic training data so that they have an initial “base state” to work from (which can shorten the time needed to complete training workflow 300 ).
- the user/customer operating packet broker 206 may define and supply their own pre-trained or not-pre-trained machine learning model as part of block 302 .
- the machine learning model that is selected for training will generally be one that benefits from learning the specific traffic patterns and behaviors of core network 204 , such as a time-series model that learns time-series data from the core network.
- a time-series model that learns time-series data from the core network.
- machine learning algorithms and constructs that can be used for implementing a time-series model, such as a Long Short Term Memory (LSTM) neural network.
- LSTM Long Short Term Memory
- the network can learn the “normal” behavior of a given parameter x over time and, once trained, can output an expected (i.e., modeled) value for this parameter (x′) at n different time points ranging from t (i.e., the current point in time) to t+n.
- t i.e., the current point in time
- FIG. 4 A block diagram of an example LSTM neural network 400 is shown in FIG. 4 .
- Other types of machine learning algorithms/constructs can also be used
- module 218 can carry out a first training phase that involves (1) receiving, from a knowledge base comprising historical traffic logged from core network 204 , traffic data regarding the core network parameter modeled by the selected machine learning model (block 304 ), and (2) training/updating the machine learning model based on the historical traffic data (block 306 ). For example, if the machine learning model is designed to model subscriber attach rate, module 218 can receive from the knowledge base traffic data indicating how subscriber attach rate changed over some prior period of time in core network 204 and can train the model accordingly.
- module 218 can “prime” the machine learning model using traffic data that packet broker 206 will likely receive from the actual, live version of core network 204 , without having to insert packet broker 206 into the production environment yet.
- the volume of historical training data learned during this first training phase can differ depending on the nature of the machine learning model and/or core network 204 , and can range from a few days' worth of data to weeks, months, or more.
- packet broker 206 can be deployed at the actual, live (i.e., production) site of core network 204 (block 308 ). Then, at blocks 310 and 312 , module 218 can carry out a second training phase that is similar to the first training phase, but trains the machine learning model using live traffic data replicated from core network 204 (rather than historical traffic data received from the knowledge base). In this way, module 218 can refine the machine learning model using real-time traffic data generated at the production site and thereby ensure that the model is as accurate and up-to-date as possible. Like the first training phase, the volume of data learned during this second training phase can vary depending on the nature of the machine learning model and/or core network 204 .
- module 218 can store the trained machine learning model and mark it as being ready for use in detecting/predicting anomalies in core network 204 .
- module 218 may also return to block 310 and repeat the second training phase on a continuous or periodic basis in order to keep the machine learning model up-to-date with respect to the ongoing traffic patterns occurring in core network 204 .
- workflow 300 of FIG. 3 is illustrative and various modifications and enhancements are possible.
- the specific manner and/or order in which the first and training phases are executed may differ on a case-by-case basis.
- the first training phase (based on historical traffic data) may be omitted and module 218 may train the machine learning model solely using live traffic data from core network 204 .
- the second training phase may be omitted and module 218 may train the machine learning model solely using historical traffic data from the knowledge base.
- both the first and training phases may be executed, but they may be performed concurrently, in a different order, or in an overlapping manner.
- module 218 may repeat workflow 300 (or run multiple instances of workflow 300 concurrently) in order to train several different types of machine learning models and/or temporal variations of a single type of model. For example, it is possible that the pattern/behavior of a given core network parameter can change significantly on a day-to-day basis. In this scenario, module 218 may train seven different machine learning models that all relate to the same core network parameter, but apply to different days of the week (e.g., a Monday model variant, a Tuesday model variant, etc.). With this approach, module 218 can subsequently use the appropriate daily model for anomaly detection/prediction based on the current day of the week.
- modules 218 can subsequently use the appropriate daily model for anomaly detection/prediction based on the current day of the week.
- anomaly detection/prediction module 218 can execute a workflow for performing real-time detection of anomalies in core network 204 using the trained model.
- FIG. 5 depicts a workflow 500 of this detection process according to embodiment.
- the trained machine learning model may be a time-series model (which models the value of a core network parameter over time), a protocol language model (which models valid protocol message exchanges and flows), or any other type of machine learning model that is usable for identifying deviations in the normal traffic patterns/behavior of core network 204 .
- module 218 can, for a current time interval t, receive replicated traffic from core network 204 and can extract information from the replicated traffic that enables module 218 to determine the current actual value of a core network parameter or criterion modeled by the machine learning model. For example, if the machine learning model is a time-series model M 1 configured to model the value of a core network parameter x, module 218 can extract information from the replicated traffic that enables module 218 to determine the actual value of x in core network 204 for the current time interval t (i.e., x t ).
- the machine learning model is a time-series model M 1 configured to model the value of a core network parameter x
- module 218 can extract information from the replicated traffic that enables module 218 to determine the actual value of x in core network 204 for the current time interval t (i.e., x t ).
- module 218 can extract information from the replicated traffic that enables module 218 to determine the specific message exchanges made using protocol P in the current time interval t.
- module 218 can use the machine learning model to determine, for the current time interval t, an expected (i.e., modeled) value for the same network parameter or criterion determined at block 504 .
- an expected (i.e., modeled) value for the same network parameter or criterion determined at block 504 For example, in the case of time-series model M 1 above, module 218 can use M 1 to output an expected value for parameter x at time t (i.e., x′ t ). Alternatively, in the case of protocol language model M 2 above, module 218 can use M 2 to output an expected message exchange or flow using protocol P at time t.
- module 218 can compare the two values and determine whether there is a discrepancy between the two values that exceeds a predefined threshold or reflects a critical inconsistency (block 508 ). For example, module 218 can determine whether x′ t -x t exceeds a numerical threshold T, or whether the actual and expected message exchanges are substantially different/out of order/etc. (indicating that the actual message exchange may be invalid).
- module 218 can conclude that core network 204 is behaving normally (block 510 ). As a result, module 218 can wait for the start of the next time interval t+1 (block 512 ) and then return to block 502 in order to repeat the detection process at time t+1.
- module 218 can conclude that an anomaly with respect to the parameter/criterion has occurred (or is in the progress of occurring) in core network 204 (block 514 ). In this case, module 218 can execute one or more predefined actions that are associated with the model (block 516 ). For example, in one embodiment, module 218 can apply a filter that steers all replicated traffic from core network 204 that is deemed to be related to the anomaly (e.g., all traffic from a particular location or a particular host/subscriber) to one or more special analytic probes/tools 208 for storage and further analysis.
- a filter that steers all replicated traffic from core network 204 that is deemed to be related to the anomaly (e.g., all traffic from a particular location or a particular host/subscriber) to one or more special analytic probes/tools 208 for storage and further analysis.
- module 218 can selectively forward only the traffic that is likely to be of interest for anomaly analysis purposes to those special probes/tools.
- module 218 can also generate and send metadata information related to the steered traffic (in the form of, e.g., IPFix packets) to the special analytic probes/tools.
- This metadata information can include, e.g., where the traffic originated from, subscriber/session info, and other contextual cues which the probes/tools can use to facilitate their analysis of the anomalous traffic and help identify the root cause of the anomaly.
- module 218 can execute other actions in addition to (or in lieu of) the traffic steering described above, such as generating an alert for a network administrator, metering further traffic replicated from core network 204 , and so on.
- the specific nature of these actions can be configurable by a user/administrator of packet broker 206 .
- module 218 can wait for the next time interval t+1 as mentioned previously (block 512 ) and subsequently return to block 502 in order to repeat the detection process at time t+1.
- module 218 of packet broker 206 can also perform real-time prediction of future anomalies in core network 204 via its trained machine learning model(s).
- FIG. 6 depicts a workflow 600 illustrating this prediction process according to an embodiment.
- Workflow 600 assumes that the machine learning model used for anomaly prediction is specifically a time-series model that tracks the value of a core network parameter x over time.
- module 218 can, for a current time interval t, receive replicated traffic from core network 204 , extract information from the replicated traffic that enables module 218 to determine the current value for core network parameter x (i.e., x t ), and store x t in a local data store. Further, at block 606 , module 218 can retrieve from the data store the last m values of parameter x (i.e., x t ⁇ 1 , x t ⁇ 2 , . . . x t ⁇ m ).
- module 218 can fit the m values retrieved at block 606 to a linear regression model in order to extrapolate a value of core network parameter x at some future point in time t+n (i.e., x t+n ). Module 218 can then compare the extrapolated value with a predefined threshold T (block 612 ). This predefined threshold can be different from the threshold discussed with respect to anomaly detection workflow 500 .
- module 218 can conclude that there will be no future anomaly with respect to core network parameter x at time t+n (block 614 ). As a result, module 218 can wait for the start of the next time interval t+1 (block 616 ) and subsequently return to block 602 in order to repeat the prediction process at time t+1.
- module 218 can conclude that an anomaly with respect to parameter x will occur at time t+n in core network 204 (block 618 ).
- module 218 can execute one or more predefined actions that are associated with the model (block 620 ), such as steering all replicated traffic from core network 204 that is deemed to be related to the anomaly to one or more special analytic probes/tools 208 for storage and further analysis. In this way, the special probes/tools can analyze and potentially implement steps to avoid the anomaly before it actually occurs.
- Module 218 also execute other actions at block 620 such as generating an administrator alert, dropping/metering the replicated traffic, and so on.
- module 218 can wait for the next time interval t+1 as mentioned previously (block 616 ) and subsequently return to block 602 to repeat the prediction process at time t+1.
- anomaly detection and prediction workflows 500 and 600 are illustrative and modifications and enhancements are possible.
- module 218 may repeat or execute multiple instances of these workflows concurrently in order to detect and/or predict different types of anomalies in core network 204 via different machine learning models.
- module 218 may execute workflow 500 simultaneously with workflow 600 in order to perform anomaly detection and prediction in parallel.
- One of ordinary skill in the art will recognize other variations, modifications, and alternatives.
- packet broker 206 of FIG. 2 may also implement automated discovery of the topology and entities in core network 204 .
- this automated discovery feature the configuration of packet broker 206 can be streamlined, since there is no need for an administrator to manually enter information into packet broker 206 regarding core network 204 (e.g., IP addresses, interfaces, etc.). Instead, this configuration can be determined automatically based on the discovered core network entities and topology. Further, this automated discovery feature can enable packet broker 206 to implement new types of traffic filters, such as a filter to steer traffic of a newly detected core network entity to a particular analytic probe/tool, or a filter to drop traffic from portions of core network 204 that are known to carry duplicate packets.
- traffic filters such as a filter to steer traffic of a newly detected core network entity to a particular analytic probe/tool, or a filter to drop traffic from portions of core network 204 that are known to carry duplicate packets.
- this feature can entail automatically discovering what network entities are deployed in core network 204 , what the properties of those network entities are (e.g., IP addresses, etc.), and how the network entities are interconnected.
- Packet broker 206 can perform this discovery by, e.g., monitoring and analyzing the control and/or data traffic that is tapped from core network 204 .
- the specific nature of the discovery process will differ depending on the type of the core network (e.g., a 3G network, an LTE network, etc.).
- Packet broker 206 can perform the discovery upon initialization, as well as on a continuous basis throughout its runtime (in order to detect newly added or removed entities).
- Packet broker 206 can then use this core network information to facilitate its configuration as well as perform other functions. For example, in one embodiment packet broker 206 can automatically setup access control lists/filters based on the discovered network entities. This can include, e.g., default filters for forwarding traffic tapped from certain network entities to certain probes/tools, as well as filters for removing duplicate traffic, filters for forwarding traffic from newly added notes, and so on.
- packet broker 206 can group discovered network entities or zones in order to ease configuration management. This can help in steering traffic to corresponding zones to appropriate analytic probes/tools so that certain problems (such as duplicate packets) can be avoided.
- packet broker 206 can setup notifications/alerts when there are modifications in core network 204 (e.g., entities are added, removed, etc.). Packet broker 206 can then apply policies to update its configuration based on the core network modifications. This can be particularly useful if core network 204 is virtualized, since the configuration of the core network will likely change on a frequent basis in this scenario.
- packet broker 206 can provide the discovered network information to a tool (e.g., an SDN app running on an SDN controller) so that users can visualize the topology of core network 204 .
- FIG. 7 depicts an example UI 700 that illustrates a visualization of a core network using such a tool according to an embodiment.
- a user can view the entities and their connections/interfaces, and can filter the view based on types of entities (e.g., ENodeB, SGW, MME, PGW, HSS, AAA, etc.) and other criteria.
- a user can also view alerts/notifications pertaining to anomalies that are detected or predicted by packet broker 206 in accordance with the techniques described in the foregoing sections.
- FIG. 8 depicts an example network device (e.g., switch and/or router) 800 in which certain embodiments of the present disclosure may be implemented.
- network device 800 may be used to implement packet broker 206 of FIG. 2 (either wholly or in part).
- network device 800 includes a management module 802 , a switch fabric module 804 , and a number of I/O modules 806 ( 1 )- 806 (N).
- Management module 802 includes one or more management CPUs 808 for managing/controlling the operation of the device.
- Each management CPU 808 can be a general purpose processor, such as a PowerPC, Intel, AMD, or ARM-based processor, that operates under the control of software stored in an associated memory (not shown).
- Switch fabric module 804 and I/O modules 806 ( 1 )- 806 (N) collectively represent the data, or forwarding, plane of network device 800 .
- Switch fabric module 804 is configured to interconnect the various other modules of network device 800 .
- Each I/O module 806 ( 1 )- 806 (N) can include one or more input/output ports 810 ( 1 )- 810 (N) that are used by network device 800 to send and receive data packets.
- Each I/O module 806 ( 1 )- 806 (N) can also include a packet processor 812 ( 1 )- 812 (N).
- Packet processor 812 ( 1 )- 812 (N) is a hardware processing component (e.g., an FPGA or ASIC) that can make wire speed decisions on how to handle incoming or outgoing data packets.
- network device 800 is illustrative and many other configurations having more or fewer components than network device 800 are possible.
- FIG. 9 depicts an example computer system 900 in which certain embodiments of the present disclosure may be implemented.
- computer system 900 may be used to implement packet broker 206 of FIG. 2 (either wholly or in part).
- computer system 900 includes one or more processors 902 that communicate with a number of peripheral devices via a bus subsystem 904 .
- peripheral devices include a storage subsystem 906 (comprising a memory subsystem 908 and a file storage subsystem 910 ), user interface input devices 912 , user interface output devices 914 , and a network interface subsystem 916 .
- Bus subsystem 904 can provide a mechanism for letting the various components and subsystems of computer system 900 communicate with each other as intended. Although bus subsystem 904 is shown schematically as a single bus, alternative embodiments of the bus subsystem can utilize multiple buses.
- Network interface subsystem 916 can serve as an interface for communicating data between computer system 900 and other computing devices or networks.
- Embodiments of network interface subsystem 916 can include wired (e.g., coaxial, twisted pair, or fiber optic Ethernet) and/or wireless (e.g., Wi-Fi, cellular, Bluetooth, etc.) interfaces.
- User interface input devices 912 can include a keyboard, pointing devices (e.g., mouse, trackball, touchpad, etc.), a scanner, a barcode scanner, a touch-screen incorporated into a display, audio input devices (e.g., voice recognition systems, microphones, etc.), and other types of input devices.
- pointing devices e.g., mouse, trackball, touchpad, etc.
- audio input devices e.g., voice recognition systems, microphones, etc.
- use of the term “input device” is intended to include all possible types of devices and mechanisms for inputting information into computer system 900 .
- User interface output devices 914 can include a display subsystem, a printer, a fax machine, or non-visual displays such as audio output devices, etc.
- the display subsystem can be a cathode ray tube (CRT), a flat-panel device such as a liquid crystal display (LCD), or a projection device.
- CTR cathode ray tube
- LCD liquid crystal display
- output device is intended to include all possible types of devices and mechanisms for outputting information from computer system 900 .
- Storage subsystem 906 includes a memory subsystem 908 and a file/disk storage subsystem 910 .
- Subsystems 908 and 910 represent non-transitory computer-readable storage media that can store program code and/or data that provide the functionality of various embodiments described herein.
- Memory subsystem 908 includes a number of memories including a main random access memory (RAM) 918 for storage of instructions and data during program execution and a read-only memory (ROM) 920 in which fixed instructions are stored.
- File storage subsystem 910 can provide persistent (i.e., non-volatile) storage for program and data files and can include a magnetic or solid-state hard disk drive, an optical drive along with associated removable media (e.g., CD-ROM, DVD, Blu-Ray, etc.), a removable flash memory-based drive or card, and/or other types of storage media known in the art.
- computer system 900 is illustrative and many other configurations having more or fewer components than computer system 900 are possible.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Artificial Intelligence (AREA)
- Mathematical Physics (AREA)
- Evolutionary Computation (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computational Linguistics (AREA)
- Molecular Biology (AREA)
- General Health & Medical Sciences (AREA)
- Biophysics (AREA)
- Biomedical Technology (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Probability & Statistics with Applications (AREA)
- Pure & Applied Mathematics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
- The present application claims the benefit and priority of India Provisional Application No. 201641016960, filed May 17, 2016, entitled “NETWORK LEARNING IN A VISIBILITY FABRIC.” The entire contents of this application are incorporated herein by reference in its entirety for all purposes.
- In the field of computer networking, a visibility network (also known as a “visibility fabric”) is a type of network that facilitates the monitoring and analysis of traffic flowing through another, “core” network (e.g., a production network). The reasons for deploying a visibility network are varied and can include network management and optimization, business intelligence/reporting, compliance validation, service assurance, security monitoring, and so on.
-
FIG. 1 depicts anexample visibility network 100 according to an embodiment. As shown,visibility network 100 includes a number oftaps 102 that are deployed within acore network 104.Taps 102 are configured to replicate data and control traffic that is exchanged between network elements incore network 104 and forward the replicated traffic to a packet broker 106 (note that, in addition to or in lieu oftaps 102, one or more routers or switches incore network 104 can be tasked to replicate and forward data/control traffic topacket broker 106 using their respective SPAN or mirror functions).Packet broker 106 can perform various packet processing functions on the replicated traffic, such as removing protocol headers, filtering/classifying packets based on configured rules, and so on.Packet broker 106 can then forward the processed traffic to one or more analytic probes/tools 108, which can carry out various calculations and analyses on the traffic in accordance with the business goals/purposes of visibility network 100 (e.g., calculation of key performance indicators (KPIs), detection of traffic anomalies, generation of reports, etc.). - In cases where analytic probes/
tools 108 are configured to perform traffic anomaly detection, existing implementations of these probes/tools generally follow an approach that involves (1) recording/storing all of the traffic data replicated from core network 104 (i.e., both anomalous and non-anomalous traffic data), and (2) subsequently performing a post-hoc analysis on the stored data in order to identify anomalies. While this approach is functional, it also suffers from a number of inefficiencies and drawbacks. For example, consider a scenario wherecore network 104 is a very high volume network such as, e.g., a mobile service provider network. In this case, the amount of compute and storage resources needed on analytic probes/tools 108 in order to store and analyze all of the traffic replicated fromcore network 104 will also be very high (even though only a small percentage of that traffic may actually be anomalous), resulting in significant infrastructure costs and poor scaling ofvisibility network 100 as the scope ofcore network 104 grows. - Further, the post-hoc analysis described above is typically performed long after the anomalies being detected have occurred in
core network 104. This makes it difficult or impossible for analytic probes/tools 108 to implement measures that address the root causes of the anomalies while they are in progress, or to actively predict the occurrence of future anomalies. - Techniques for performing anomaly detection and prediction in a packet broker of a visibility network are provided. According to one embodiment, the packet broker can apply one or more machine learning models to network traffic that is replicated from a core network. The packet broker can further detect or predict, based on the application of the one or more machine learning models, the occurrence of a network traffic anomaly in the core network. The packet broker can then take one or more predefined actions in response to the detection/prediction of the anomaly.
- The following detailed description and accompanying drawings provide a better understanding of the nature and advantages of particular embodiments.
-
FIG. 1 depicts an example visibility network. -
FIG. 2 depicts a visibility network in which the anomaly detection/prediction techniques of the present disclosure may be implemented according to an embodiment. -
FIG. 3 depicts a workflow for training a machine learning model used for anomaly detection/prediction according to an embodiment. -
FIG. 4 depicts an example LSTM neural network according to an embodiment. -
FIG. 5 depicts a workflow for performing anomaly detection according to an embodiment. -
FIG. 6 depicts a workflow for performing anomaly prediction according to an embodiment. -
FIG. 7 depicts an example user interface for a core network visualization tool according to an embodiment. -
FIG. 8 depicts an example network device according to an embodiment. -
FIG. 9 depicts an example computer system according to an embodiment. - In the following description, for purposes of explanation, numerous examples and details are set forth in order to provide an understanding of various embodiments. It will be evident, however, to one skilled in the art that certain embodiments can be practiced without some of these details, or can be practiced with modifications or equivalents thereof.
- Embodiments of the present disclosure provide techniques that can be implemented by a packet broker in a visibility network for detecting and predicting anomalies in the network traffic of a core network. In one set of embodiments, these techniques can include training, by the packet broker based on traffic data replicated from the core network, one or more machine learning models that are designed to model the core network's typical traffic patterns. For instance, one such machine learning model can be designed to model changes in the value of a particular core network parameter over time (e.g., subscriber attach rate, paging rate, data throughput, etc.).
- Once the machine learning models have been trained, the packet broker can apply these models (and/or other pre-trained models) to subsequent traffic that is replicated from the core network in order to detect and/or predict the occurrence of traffic anomalies in the core network in real-time. For example, in the case where the packet broker has trained a machine learning model M that models subscriber attach rate, the packet broker can compare the current subscriber attach rate in the core network with the subscriber attach rate value modeled by M for the current point in time. If the difference between these two values exceeds a threshold, the packet broker can determine that an anomaly with respect to subscriber attach rate has occurred (or is in the process of occurring). Alternatively or in addition, the packet broker can compare an extrapolated future subscriber attach rate in the core network modeled by M with a predefined threshold. If the extrapolated future value exceeds the threshold, the packet broker can predict that an anomaly with respect to subscriber attach rate will very likely occur in the future.
- Then, upon determining that a traffic anomaly has occurred or will soon occur in the core network, the packet broker can take one or more predefined (e.g., user-defined) actions. These predefined actions can include applying a filter that steers replicated traffic related to the anomalous event (e.g., traffic originating from a particular location or associated with a particular host/subscriber) to one or more special analytic probes/tools for further analysis and storage. The predefined actions can also include, e.g., generating an alert for a network administrator, implementing metering or sampling of the replicated traffic (in the case of an anomalous traffic burst), and others.
- With the general approach described above, a number of benefits can be realized over prior art techniques that implement anomaly detection in a post-hoc fashion on the analytic probes/tools of the visibility network. First, by moving the anomaly detection task from the analytic probes/tools to the packet broker, the packet broker can advantageously steer only anomalous (or likely to be anomalous) traffic to the probes/tools, which will typically make up a small percentage of the overall traffic replicated from the core network. This means that the computational and storage resources needed on the analytic probes/tools can be significantly reduced, which in turn can allow these components to scale out and handle very large traffic volumes in the core network in an efficient manner.
- Second, since the packet broker monitors for anomalies in a real-time manner, in certain embodiments the packet broker can actively predict the occurrence of future anomalies and take steps to address them. For example, the packet broker may forward a traffic flow associated with a predicted future anomaly to the analytic probes/tools for preemptive analysis and review, before the anomaly actually occurs.
- Third, by performing anomaly detection and prediction using various different machine learning models, the packet broker can flexibly and accurately detect/predict a large number of different anomalies. For example, as mentioned above, the packet broker may apply one set of machine learning models (referred to herein as “time-series models”) to detect/predict anomalies in time-series traffic data, such as subscriber attach rate, paging rate, data throughput, etc., derived from the core network. The packet broker may also apply another set of machine learning models (referred to herein as “protocol language models”) to detect/predict anomalies in protocol message exchanges/flows replicated from the core network. The particular machine learning models that are in use at any point in time, as well as the specific detection/prediction rules that are applied for each model, may be configurable by a network administrator.
- These any other aspects of the present disclosure are described in further detail below.
-
FIG. 2 depicts avisibility network 200 that may be used to implement the anomaly detection/prediction techniques of the present disclosure according to an embodiment. As shown,visibility network 200 includes a number oftaps 202 that are deployed in acore network 204 and are configured to replicate traffic exchanged innetwork 204 to apacket broker 206. InFIG. 2 ,core network 204 is a mobile LTE network that comprises network elements specific to this type of network, such as an eNodeB 210, a mobility management entity (MME) 212, a serving gateway (SGW) 214, and a packet data network gateway (PGW) 216 which connects to an external packet data network such as the Internet. Further, in this particular example,taps 202 are configured to replicate and forward GTP-C and GTP-U traffic that is exchanged on certain interfaces ofcore network 204. However, it should be appreciated thatcore network 204 can be any other type of computer network known in the art, such as a mobile 3G network, a landline local area network (LAN) or wide area network (WAN), etc. - Upon receiving the replicated traffic via
taps 202,packet broker 206 can perform various types of packet processing functions on the traffic (as configured/assigned by an operator of visibility network 200) and can forward the processed traffic to one or more analytic probes/tools 208 for analysis. In one embodiment,packet broker 206 can be implemented solely in hardware, such as in the form of a network switch or router that relies on ASIC or FPGA-based packet processors to execute its assigned packet processing functions based on rules that are programmed into hardware memory tables (e.g., CAM tables) resident on the packet processors and/or line cards of the device. In another embodiment,packet broker 206 can be implemented solely in software that runs on, e.g., one or more general purpose physical or virtual computer systems. In yet another embodiment,packet broker 206 can be implemented using a combination of hardware and software, such as a combination of a hardware-based basic packet broker and a software-based “session director” cluster as described in co-owned U.S. patent application Ser. No. 15/205,889, entitled “Software-based Packet Broker,” the entire contents of which are incorporated herein by reference in its entirety for all purposes. - As noted in the Background section, in cases where analytic probes/
tools 208 are tasked with detecting traffic anomalies incore network 204, conventional implementations of these probe/tools record and store all of the traffic replicated fromcore network 204 and perform a post-hoc analysis on the stored data. However, this approach suffers from a number of inefficiencies and limitations, such as heavy investment cost for probes/tools 208 in scenarios wherecore network 204 generates high volumes of traffic, inability to address and predict anomalies in real-time, and so on. - To address these and other similar issues,
packet broker 206 ofFIG. 2 is enhanced to include a novel anomaly detection/prediction module 218. Depending on the configuration ofpacket broker 206, anomaly detection/prediction module 218 can be implemented in software, hardware, or a combination thereof. At a high level, anomaly detection/prediction module 218 can (1) train one or more machine learning models that are designed to modelcore network 204's traffic patterns (and thereby learn the typical behavior of core network 204); (2) apply the trained (as well as other pre-trained) machine learning models to subsequent traffic that is replicated fromcore network 204 in order to detect and/or predict the occurrence of traffic anomalies incore network 204 in real-time; and (3) upon detecting or predicting an anomaly, execute one or more predefined actions, such as steer replicated traffic that is deemed to be associated with the anomaly to a particular analytic probe/tool 208 for storage and further analysis. In this way, anomaly detection/prediction module 218 can eliminate or minimize many of the problems associated with conventional post-hoc anomaly detection on analytic probes/tools 208. The details for implementing the training, detection, and prediction steps above are described in the sections that follow. - It should be appreciated that
FIG. 2 is illustrative and not intended to limit embodiments of the present disclosure. For example, the various entities shown inFIG. 2 may be arranged according to different configurations and/or include subcomponents or functions that are not specifically described. One of ordinary skill in the art will recognize other variations, modifications, and alternatives. -
FIG. 3 depicts aworkflow 300 that can be executed by anomaly detection/prediction module 218 ofpacket broker 206 for training a machine learning model that will be used for detecting/predicting traffic anomalies incore network 204 according to an embodiment. Generally speaking,training workflow 300 will be applied to machine learning models that model traffic patterns/behavior which may differ from one network to another (and thus benefit from learning the specific patterns/behavior of a specific core network). Examples of such machine learning models include time-series models that track changes in the values of certain core network data or signaling parameters (e.g., subscriber attach rate, paging rate, packets per second, etc.) over time.Training workflow 300 does not need to be applied to machine learning models that model traffic patterns/behavior which will be substantially similar across different deployments, such as protocol language models. - Starting
block 302,module 218 can first select a machine learning model to be trained for anomaly detection/prediction. In one set of embodiments, the manufacturer/vendor ofpacket broker 206 can pre-install a number of different machine learning models for this purpose onpacket broker 206 andmodule 218 can select one of the pre-installed models. In these cases, the pre-installed models may be pre-trained by the manufacturer/vendor using generic training data so that they have an initial “base state” to work from (which can shorten the time needed to complete training workflow 300). In other embodiments, the user/customeroperating packet broker 206 may define and supply their own pre-trained or not-pre-trained machine learning model as part ofblock 302. - As mentioned previously, the machine learning model that is selected for training will generally be one that benefits from learning the specific traffic patterns and behaviors of
core network 204, such as a time-series model that learns time-series data from the core network. There are a number of different machine learning algorithms and constructs that can be used for implementing a time-series model, such as a Long Short Term Memory (LSTM) neural network. In the specific case of a LSTM neural network, the network can learn the “normal” behavior of a given parameter x over time and, once trained, can output an expected (i.e., modeled) value for this parameter (x′) at n different time points ranging from t (i.e., the current point in time) to t+n. A block diagram of an example LSTMneural network 400 is shown inFIG. 4 . Other types of machine learning algorithms/constructs can also be used for time-series based modeling and will be apparent to one of ordinary skill in the art. - Returning to
FIG. 3 , once the machine learning model is selected,module 218 can carry out a first training phase that involves (1) receiving, from a knowledge base comprising historical traffic logged fromcore network 204, traffic data regarding the core network parameter modeled by the selected machine learning model (block 304), and (2) training/updating the machine learning model based on the historical traffic data (block 306). For example, if the machine learning model is designed to model subscriber attach rate,module 218 can receive from the knowledge base traffic data indicating how subscriber attach rate changed over some prior period of time incore network 204 and can train the model accordingly. In this way,module 218 can “prime” the machine learning model using traffic data thatpacket broker 206 will likely receive from the actual, live version ofcore network 204, without having to insertpacket broker 206 into the production environment yet. The volume of historical training data learned during this first training phase can differ depending on the nature of the machine learning model and/orcore network 204, and can range from a few days' worth of data to weeks, months, or more. - Upon completion of the first training phase,
packet broker 206 can be deployed at the actual, live (i.e., production) site of core network 204 (block 308). Then, atblocks module 218 can carry out a second training phase that is similar to the first training phase, but trains the machine learning model using live traffic data replicated from core network 204 (rather than historical traffic data received from the knowledge base). In this way,module 218 can refine the machine learning model using real-time traffic data generated at the production site and thereby ensure that the model is as accurate and up-to-date as possible. Like the first training phase, the volume of data learned during this second training phase can vary depending on the nature of the machine learning model and/orcore network 204. - Finally, at
block 314,module 218 can store the trained machine learning model and mark it as being ready for use in detecting/predicting anomalies incore network 204. In some embodiments,module 218 may also return to block 310 and repeat the second training phase on a continuous or periodic basis in order to keep the machine learning model up-to-date with respect to the ongoing traffic patterns occurring incore network 204. - It should be appreciated that
workflow 300 ofFIG. 3 is illustrative and various modifications and enhancements are possible. For example, the specific manner and/or order in which the first and training phases are executed may differ on a case-by-case basis. In some cases, the first training phase (based on historical traffic data) may be omitted andmodule 218 may train the machine learning model solely using live traffic data fromcore network 204. In other cases, the second training phase may be omitted andmodule 218 may train the machine learning model solely using historical traffic data from the knowledge base. In yet other cases, both the first and training phases may be executed, but they may be performed concurrently, in a different order, or in an overlapping manner. - Further, although not explicitly shown,
module 218 may repeat workflow 300 (or run multiple instances ofworkflow 300 concurrently) in order to train several different types of machine learning models and/or temporal variations of a single type of model. For example, it is possible that the pattern/behavior of a given core network parameter can change significantly on a day-to-day basis. In this scenario,module 218 may train seven different machine learning models that all relate to the same core network parameter, but apply to different days of the week (e.g., a Monday model variant, a Tuesday model variant, etc.). With this approach,module 218 can subsequently use the appropriate daily model for anomaly detection/prediction based on the current day of the week. One of ordinary skill in the art will recognize other variations, modifications, and alternatives. - Once anomaly detection/
prediction module 218 has access to at least one trained machine learning model (either viatraining workflow 300 ofFIG. 3 or a different pre-training process),module 218 can execute a workflow for performing real-time detection of anomalies incore network 204 using the trained model.FIG. 5 depicts aworkflow 500 of this detection process according to embodiment. As noted previously, the trained machine learning model may be a time-series model (which models the value of a core network parameter over time), a protocol language model (which models valid protocol message exchanges and flows), or any other type of machine learning model that is usable for identifying deviations in the normal traffic patterns/behavior ofcore network 204. - Starting with
blocks workflow 500,module 218 can, for a current time interval t, receive replicated traffic fromcore network 204 and can extract information from the replicated traffic that enablesmodule 218 to determine the current actual value of a core network parameter or criterion modeled by the machine learning model. For example, if the machine learning model is a time-series model M1 configured to model the value of a core network parameter x,module 218 can extract information from the replicated traffic that enablesmodule 218 to determine the actual value of x incore network 204 for the current time interval t (i.e., xt). Alternatively, if the machine learning model is a protocol language model M2 configured to model valid message exchanges for a given network protocol P,module 218 can extract information from the replicated traffic that enablesmodule 218 to determine the specific message exchanges made using protocol P in the current time interval t. - At
block 506,module 218 can use the machine learning model to determine, for the current time interval t, an expected (i.e., modeled) value for the same network parameter or criterion determined atblock 504. For example, in the case of time-series model M1 above,module 218 can use M1 to output an expected value for parameter x at time t (i.e., x′t). Alternatively, in the case of protocol language model M2 above,module 218 can use M2 to output an expected message exchange or flow using protocol P at time t. - Once
module 218 has determined the actual and expected values of the network parameter or criterion,module 218 can compare the two values and determine whether there is a discrepancy between the two values that exceeds a predefined threshold or reflects a critical inconsistency (block 508). For example,module 218 can determine whether x′t-xt exceeds a numerical threshold T, or whether the actual and expected message exchanges are substantially different/out of order/etc. (indicating that the actual message exchange may be invalid). - If the discrepancy between the two values does not exceed the threshold or does not reflect a critical inconsistency,
module 218 can conclude thatcore network 204 is behaving normally (block 510). As a result,module 218 can wait for the start of the next time interval t+1 (block 512) and then return to block 502 in order to repeat the detection process attime t+ 1. - However, if the discrepancy between the two values does exceed the threshold or does reflect a critical inconsistency,
module 218 can conclude that an anomaly with respect to the parameter/criterion has occurred (or is in the progress of occurring) in core network 204 (block 514). In this case,module 218 can execute one or more predefined actions that are associated with the model (block 516). For example, in one embodiment,module 218 can apply a filter that steers all replicated traffic fromcore network 204 that is deemed to be related to the anomaly (e.g., all traffic from a particular location or a particular host/subscriber) to one or more special analytic probes/tools 208 for storage and further analysis. In this way,module 218 can selectively forward only the traffic that is likely to be of interest for anomaly analysis purposes to those special probes/tools. As part of this steering step, incertain embodiments module 218 can also generate and send metadata information related to the steered traffic (in the form of, e.g., IPFix packets) to the special analytic probes/tools. This metadata information can include, e.g., where the traffic originated from, subscriber/session info, and other contextual cues which the probes/tools can use to facilitate their analysis of the anomalous traffic and help identify the root cause of the anomaly. - In other embodiments,
module 218 can execute other actions in addition to (or in lieu of) the traffic steering described above, such as generating an alert for a network administrator, metering further traffic replicated fromcore network 204, and so on. The specific nature of these actions can be configurable by a user/administrator ofpacket broker 206. - Finally, once the predefined action(s) have been executed,
module 218 can wait for the next time interval t+1 as mentioned previously (block 512) and subsequently return to block 502 in order to repeat the detection process attime t+ 1. - In addition to real-time anomaly detection,
module 218 ofpacket broker 206 can also perform real-time prediction of future anomalies incore network 204 via its trained machine learning model(s).FIG. 6 depicts aworkflow 600 illustrating this prediction process according to an embodiment.Workflow 600 assumes that the machine learning model used for anomaly prediction is specifically a time-series model that tracks the value of a core network parameter x over time. - Starting with
blocks module 218 can, for a current time interval t, receive replicated traffic fromcore network 204, extract information from the replicated traffic that enablesmodule 218 to determine the current value for core network parameter x (i.e., xt), and store xt in a local data store. Further, atblock 606,module 218 can retrieve from the data store the last m values of parameter x (i.e., xt−1, xt−2, . . . xt−m). - At
block 608,module 218 can fit the m values retrieved atblock 606 to a linear regression model in order to extrapolate a value of core network parameter x at some future point in time t+n (i.e., xt+n).Module 218 can then compare the extrapolated value with a predefined threshold T (block 612). This predefined threshold can be different from the threshold discussed with respect toanomaly detection workflow 500. - If the extrapolated future value does not exceed the predefined threshold T,
module 218 can conclude that there will be no future anomaly with respect to core network parameter x at time t+n (block 614). As a result,module 218 can wait for the start of the next time interval t+1 (block 616) and subsequently return to block 602 in order to repeat the prediction process attime t+ 1. - However, if the extrapolated future value does exceed threshold T,
module 218 can conclude that an anomaly with respect to parameter x will occur at time t+n in core network 204 (block 618). In this case,module 218 can execute one or more predefined actions that are associated with the model (block 620), such as steering all replicated traffic fromcore network 204 that is deemed to be related to the anomaly to one or more special analytic probes/tools 208 for storage and further analysis. In this way, the special probes/tools can analyze and potentially implement steps to avoid the anomaly before it actually occurs.Module 218 also execute other actions atblock 620 such as generating an administrator alert, dropping/metering the replicated traffic, and so on. - Finally, once the predefined action(s) have been executed,
module 218 can wait for the next time interval t+1 as mentioned previously (block 616) and subsequently return to block 602 to repeat the prediction process attime t+ 1. - It should be appreciated that anomaly detection and
prediction workflows module 218 may repeat or execute multiple instances of these workflows concurrently in order to detect and/or predict different types of anomalies incore network 204 via different machine learning models. Further,module 218 may executeworkflow 500 simultaneously withworkflow 600 in order to perform anomaly detection and prediction in parallel. One of ordinary skill in the art will recognize other variations, modifications, and alternatives. - Beyond the anomaly detection and prediction techniques described in the foregoing sections, in certain
embodiments packet broker 206 ofFIG. 2 may also implement automated discovery of the topology and entities incore network 204. With this automated discovery feature, the configuration ofpacket broker 206 can be streamlined, since there is no need for an administrator to manually enter information intopacket broker 206 regarding core network 204 (e.g., IP addresses, interfaces, etc.). Instead, this configuration can be determined automatically based on the discovered core network entities and topology. Further, this automated discovery feature can enablepacket broker 206 to implement new types of traffic filters, such as a filter to steer traffic of a newly detected core network entity to a particular analytic probe/tool, or a filter to drop traffic from portions ofcore network 204 that are known to carry duplicate packets. - According to one set of embodiments, this feature can entail automatically discovering what network entities are deployed in
core network 204, what the properties of those network entities are (e.g., IP addresses, etc.), and how the network entities are interconnected.Packet broker 206 can perform this discovery by, e.g., monitoring and analyzing the control and/or data traffic that is tapped fromcore network 204. The specific nature of the discovery process will differ depending on the type of the core network (e.g., a 3G network, an LTE network, etc.).Packet broker 206 can perform the discovery upon initialization, as well as on a continuous basis throughout its runtime (in order to detect newly added or removed entities). -
Packet broker 206 can then use this core network information to facilitate its configuration as well as perform other functions. For example, in oneembodiment packet broker 206 can automatically setup access control lists/filters based on the discovered network entities. This can include, e.g., default filters for forwarding traffic tapped from certain network entities to certain probes/tools, as well as filters for removing duplicate traffic, filters for forwarding traffic from newly added notes, and so on. - In another embodiment,
packet broker 206 can group discovered network entities or zones in order to ease configuration management. This can help in steering traffic to corresponding zones to appropriate analytic probes/tools so that certain problems (such as duplicate packets) can be avoided. - In yet another embodiment,
packet broker 206 can setup notifications/alerts when there are modifications in core network 204 (e.g., entities are added, removed, etc.).Packet broker 206 can then apply policies to update its configuration based on the core network modifications. This can be particularly useful ifcore network 204 is virtualized, since the configuration of the core network will likely change on a frequent basis in this scenario. - In yet another embodiment,
packet broker 206 can provide the discovered network information to a tool (e.g., an SDN app running on an SDN controller) so that users can visualize the topology ofcore network 204.FIG. 7 depicts anexample UI 700 that illustrates a visualization of a core network using such a tool according to an embodiment. In this tool, a user can view the entities and their connections/interfaces, and can filter the view based on types of entities (e.g., ENodeB, SGW, MME, PGW, HSS, AAA, etc.) and other criteria. A user can also view alerts/notifications pertaining to anomalies that are detected or predicted bypacket broker 206 in accordance with the techniques described in the foregoing sections. -
FIG. 8 depicts an example network device (e.g., switch and/or router) 800 in which certain embodiments of the present disclosure may be implemented. For example, in one set of embodiments,network device 800 may be used to implementpacket broker 206 ofFIG. 2 (either wholly or in part). - As shown,
network device 800 includes amanagement module 802, aswitch fabric module 804, and a number of I/O modules 806(1)-806(N).Management module 802 includes one ormore management CPUs 808 for managing/controlling the operation of the device. Eachmanagement CPU 808 can be a general purpose processor, such as a PowerPC, Intel, AMD, or ARM-based processor, that operates under the control of software stored in an associated memory (not shown). -
Switch fabric module 804 and I/O modules 806(1)-806(N) collectively represent the data, or forwarding, plane ofnetwork device 800.Switch fabric module 804 is configured to interconnect the various other modules ofnetwork device 800. Each I/O module 806(1)-806(N) can include one or more input/output ports 810(1)-810(N) that are used bynetwork device 800 to send and receive data packets. Each I/O module 806(1)-806(N) can also include a packet processor 812(1)-812(N). Packet processor 812(1)-812(N) is a hardware processing component (e.g., an FPGA or ASIC) that can make wire speed decisions on how to handle incoming or outgoing data packets. - It should be appreciated that
network device 800 is illustrative and many other configurations having more or fewer components thannetwork device 800 are possible. -
FIG. 9 depicts anexample computer system 900 in which certain embodiments of the present disclosure may be implemented. For example, in one set of embodiments,computer system 900 may be used to implementpacket broker 206 ofFIG. 2 (either wholly or in part). - As shown in
FIG. 9 ,computer system 900 includes one ormore processors 902 that communicate with a number of peripheral devices via abus subsystem 904. These peripheral devices include a storage subsystem 906 (comprising amemory subsystem 908 and a file storage subsystem 910), userinterface input devices 912, userinterface output devices 914, and anetwork interface subsystem 916. -
Bus subsystem 904 can provide a mechanism for letting the various components and subsystems ofcomputer system 900 communicate with each other as intended. Althoughbus subsystem 904 is shown schematically as a single bus, alternative embodiments of the bus subsystem can utilize multiple buses. -
Network interface subsystem 916 can serve as an interface for communicating data betweencomputer system 900 and other computing devices or networks. Embodiments ofnetwork interface subsystem 916 can include wired (e.g., coaxial, twisted pair, or fiber optic Ethernet) and/or wireless (e.g., Wi-Fi, cellular, Bluetooth, etc.) interfaces. - User
interface input devices 912 can include a keyboard, pointing devices (e.g., mouse, trackball, touchpad, etc.), a scanner, a barcode scanner, a touch-screen incorporated into a display, audio input devices (e.g., voice recognition systems, microphones, etc.), and other types of input devices. In general, use of the term “input device” is intended to include all possible types of devices and mechanisms for inputting information intocomputer system 900. - User
interface output devices 914 can include a display subsystem, a printer, a fax machine, or non-visual displays such as audio output devices, etc. The display subsystem can be a cathode ray tube (CRT), a flat-panel device such as a liquid crystal display (LCD), or a projection device. In general, use of the term “output device” is intended to include all possible types of devices and mechanisms for outputting information fromcomputer system 900. -
Storage subsystem 906 includes amemory subsystem 908 and a file/disk storage subsystem 910.Subsystems -
Memory subsystem 908 includes a number of memories including a main random access memory (RAM) 918 for storage of instructions and data during program execution and a read-only memory (ROM) 920 in which fixed instructions are stored.File storage subsystem 910 can provide persistent (i.e., non-volatile) storage for program and data files and can include a magnetic or solid-state hard disk drive, an optical drive along with associated removable media (e.g., CD-ROM, DVD, Blu-Ray, etc.), a removable flash memory-based drive or card, and/or other types of storage media known in the art. - It should be appreciated that
computer system 900 is illustrative and many other configurations having more or fewer components thancomputer system 900 are possible. - The above description illustrates various embodiments of the present invention along with examples of how aspects of the present invention may be implemented. The above examples and embodiments should not be deemed to be the only embodiments, and are presented to illustrate the flexibility and advantages of the present invention as defined by the following claims. For example, although certain embodiments have been described with respect to particular process flows and steps, it should be apparent to those skilled in the art that the scope of the present invention is not strictly limited to the described flows and steps. Steps described as sequential may be executed in parallel, order of steps may be varied, and steps may be modified, combined, added, or omitted. As another example, although certain embodiments have been described using a particular combination of hardware and software, it should be recognized that other combinations of hardware and software are possible, and that specific operations described as being implemented in software can also be implemented in hardware and vice versa.
- The specification and drawings are, accordingly, to be regarded in an illustrative rather than restrictive sense. Other arrangements, embodiments, implementations and equivalents will be evident to those skilled in the art and may be employed without departing from the spirit and scope of the invention as set forth in the following claims.
Claims (20)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP17799821.8A EP3459209A4 (en) | 2016-05-17 | 2017-04-04 | Anomaly detection and prediction in a packet broker |
CN201780039948.XA CN109417495A (en) | 2016-05-17 | 2017-04-04 | Abnormality detection and prediction in grouping agency |
PCT/US2017/025998 WO2017200651A1 (en) | 2016-05-17 | 2017-04-04 | Anomaly detection and prediction in a packet broker |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN201641016960 | 2016-05-17 | ||
IN201641016960 | 2016-05-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20170339022A1 true US20170339022A1 (en) | 2017-11-23 |
Family
ID=60331037
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/466,732 Abandoned US20170339022A1 (en) | 2016-05-17 | 2017-03-22 | Anomaly detection and prediction in a packet broker |
Country Status (3)
Country | Link |
---|---|
US (1) | US20170339022A1 (en) |
EP (1) | EP3459209A4 (en) |
CN (1) | CN109417495A (en) |
Cited By (88)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108234496A (en) * | 2018-01-05 | 2018-06-29 | 宝牧科技(天津)有限公司 | A kind of method for predicting based on neural network |
CN108510741A (en) * | 2018-05-24 | 2018-09-07 | 浙江工业大学 | A kind of traffic flow forecasting method based on Conv1D-LSTM neural network structures |
CN108768750A (en) * | 2018-06-22 | 2018-11-06 | 广东电网有限责任公司 | communication network fault positioning method and device |
EP3496015A1 (en) * | 2017-12-07 | 2019-06-12 | Accenture Global Solutions Limited | Data transformation of performance statistics and ticket information for network devices for use in machine learning models |
CN109948471A (en) * | 2019-03-04 | 2019-06-28 | 南京邮电大学 | Traffic haze visibility detection method based on improved InceptionV4 network |
US20190281078A1 (en) * | 2018-03-08 | 2019-09-12 | Cisco Technology, Inc. | Predicting and mitigating layer-2 anomalies and instabilities |
EP3541016A1 (en) * | 2018-03-12 | 2019-09-18 | Adtran, Inc. | Telecommunications network troubleshooting systems |
US20190324431A1 (en) * | 2017-08-02 | 2019-10-24 | Strong Force Iot Portfolio 2016, Llc | Data collection systems and methods with alternate routing of input channels |
US20190349287A1 (en) * | 2018-05-10 | 2019-11-14 | Dell Products L. P. | System and method to learn and prescribe optimal network path for sdn |
US20200019613A1 (en) * | 2018-01-10 | 2020-01-16 | International Business Machines Corporation | Machine Learning Model Modification and Natural Language Processing |
JP2020017952A (en) * | 2018-07-24 | 2020-01-30 | バイドゥ オンライン ネットワーク テクノロジー (ベイジン) カンパニー リミテッド | Method and device for warning |
US10750387B2 (en) | 2015-03-23 | 2020-08-18 | Extreme Networks, Inc. | Configuration of rules in a network visibility system |
US10754334B2 (en) | 2016-05-09 | 2020-08-25 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for industrial internet of things data collection for process adjustment in an upstream oil and gas environment |
US10771475B2 (en) | 2015-03-23 | 2020-09-08 | Extreme Networks, Inc. | Techniques for exchanging control and configuration information in a network visibility system |
WO2020202857A1 (en) * | 2019-03-29 | 2020-10-08 | Mitsubishi Electric Corporation | Predictive classification of future operations |
WO2020219685A1 (en) * | 2019-04-23 | 2020-10-29 | Sciencelogic, Inc. | Distributed learning anomaly detector |
US10868829B2 (en) | 2018-10-10 | 2020-12-15 | Northrop Grumman Systems Corporation | Predicted network traffic |
US10903985B2 (en) | 2017-08-25 | 2021-01-26 | Keysight Technologies Singapore (Sales) Pte. Ltd. | Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques |
US10911353B2 (en) | 2015-06-17 | 2021-02-02 | Extreme Networks, Inc. | Architecture for a network visibility system |
US10949542B2 (en) * | 2018-11-25 | 2021-03-16 | International Business Machines Corporation | Self-evolved adjustment framework for cloud-based large system based on machine learning |
US10951461B2 (en) | 2019-01-31 | 2021-03-16 | Hewlett Packard Enterprise Development Lp | Anomaly-driven packet capture and spectrum capture in an access point |
CN112585926A (en) * | 2018-08-23 | 2021-03-30 | 摩根士丹利服务集团有限公司 | Distributed system component failure identification |
US10977574B2 (en) * | 2017-02-14 | 2021-04-13 | Cisco Technology, Inc. | Prediction of network device control plane instabilities |
EP3806396A1 (en) * | 2019-10-11 | 2021-04-14 | Juniper Networks, Inc. | Employing machine learning to predict and dynamically tune static configuration parameters |
US10983507B2 (en) | 2016-05-09 | 2021-04-20 | Strong Force Iot Portfolio 2016, Llc | Method for data collection and frequency analysis with self-organization functionality |
US10992652B2 (en) | 2017-08-25 | 2021-04-27 | Keysight Technologies Singapore (Sales) Pte. Ltd. | Methods, systems, and computer readable media for monitoring encrypted network traffic flows |
US20210126931A1 (en) * | 2019-10-25 | 2021-04-29 | Cognizant Technology Solutions India Pvt. Ltd | System and a method for detecting anomalous patterns in a network |
US20210203606A1 (en) * | 2019-12-31 | 2021-07-01 | Opanga Networks, Inc. | Data transport network protocol based on real time transport network congestion conditions |
US11128551B2 (en) * | 2017-09-28 | 2021-09-21 | Siemens Mobility GmbH | Method and apparatus for immediate and reaction-free transmission of log messages |
US11153175B2 (en) * | 2017-10-16 | 2021-10-19 | International Business Machines Corporation | Latency management by edge analytics in industrial production environments |
US11190417B2 (en) * | 2020-02-04 | 2021-11-30 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for processing network flow metadata at a network packet broker |
US11199835B2 (en) | 2016-05-09 | 2021-12-14 | Strong Force Iot Portfolio 2016, Llc | Method and system of a noise pattern data marketplace in an industrial environment |
US11201807B2 (en) * | 2018-04-24 | 2021-12-14 | Nippon Telegraph And Telephone Corporation | Traffic estimation apparatus, traffic estimation method and program |
US11199837B2 (en) | 2017-08-02 | 2021-12-14 | Strong Force Iot Portfolio 2016, Llc | Data monitoring systems and methods to update input channel routing in response to an alarm state |
US11218879B2 (en) | 2018-12-05 | 2022-01-04 | At&T Intellectual Property I, L.P. | Providing security through characterizing internet protocol traffic to detect outliers |
US11237546B2 (en) | 2016-06-15 | 2022-02-01 | Strong Force loT Portfolio 2016, LLC | Method and system of modifying a data collection trajectory for vehicles |
US20220060492A1 (en) * | 2018-12-03 | 2022-02-24 | British Telecommunications Public Limited Company | Detecting anomalies in computer networks |
US20220095164A1 (en) * | 2019-06-06 | 2022-03-24 | Huawei Technologies Co., Ltd. | Traffic volume prediction method and apparatus |
US11310117B2 (en) * | 2020-06-24 | 2022-04-19 | Red Hat, Inc. | Pairing of a probe entity with another entity in a cloud computing environment |
KR20220071843A (en) * | 2020-11-24 | 2022-05-31 | 고려대학교 산학협력단 | Generative adversarial network model and training method to generate message id sequence on unmanned moving objects |
US20220239596A1 (en) * | 2021-01-28 | 2022-07-28 | Vmware, Inc. | Dynamic sd-wan hub cluster scaling with machine learning |
US20220413481A1 (en) * | 2021-06-28 | 2022-12-29 | Oracle International Corporation | Geometric aging data reduction for machine learning applications |
US20220417770A1 (en) * | 2021-01-08 | 2022-12-29 | Verizon Patent And Licensing Inc. | Systems and methods for determining baselines for network parameters used to configure base stations |
US11552872B2 (en) * | 2020-11-23 | 2023-01-10 | Verizon Patent And Licensing Inc. | Systems and methods for automated remote network performance monitoring |
US20230029794A1 (en) * | 2020-01-07 | 2023-02-02 | Microsoft Technology Licensing, Llc | Customized anomaly detection |
US11588835B2 (en) | 2021-05-18 | 2023-02-21 | Bank Of America Corporation | Dynamic network security monitoring system |
US20230107011A1 (en) * | 2021-10-04 | 2023-04-06 | Mellanox Technologies, Ltd. | Digital simulator of data communication apparatus |
US11716313B2 (en) | 2018-08-10 | 2023-08-01 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for implementing bandwidth limitations on specific application traffic at a proxy element |
US20230269143A1 (en) * | 2022-02-22 | 2023-08-24 | Ciena Corporation | Switching among multiple machine learning models during training and inference |
US11774944B2 (en) | 2016-05-09 | 2023-10-03 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for the industrial internet of things |
US11792213B2 (en) | 2021-05-18 | 2023-10-17 | Bank Of America Corporation | Temporal-based anomaly detection for network security |
US11792127B2 (en) | 2021-01-18 | 2023-10-17 | Vmware, Inc. | Network-aware load balancing |
CN116896469A (en) * | 2023-07-18 | 2023-10-17 | 哈尔滨工业大学 | Encryption agent application identification method based on Burst sequence |
US11799879B2 (en) | 2021-05-18 | 2023-10-24 | Bank Of America Corporation | Real-time anomaly detection for network security |
US11804988B2 (en) | 2013-07-10 | 2023-10-31 | Nicira, Inc. | Method and system of overlay flow control |
US11831414B2 (en) | 2019-08-27 | 2023-11-28 | Vmware, Inc. | Providing recommendations for implementing virtual networks |
US11855805B2 (en) | 2017-10-02 | 2023-12-26 | Vmware, Inc. | Deploying firewall for virtual network defined over public cloud infrastructure |
US11895194B2 (en) | 2017-10-02 | 2024-02-06 | VMware LLC | Layer four optimization for a virtual network defined over public cloud |
US11894949B2 (en) | 2017-10-02 | 2024-02-06 | VMware LLC | Identifying multiple nodes in a virtual network defined over a set of public clouds to connect to an external SaaS provider |
US11902086B2 (en) | 2017-11-09 | 2024-02-13 | Nicira, Inc. | Method and system of a dynamic high-availability mode based on current wide area network connectivity |
US11909815B2 (en) | 2022-06-06 | 2024-02-20 | VMware LLC | Routing based on geolocation costs |
US11929903B2 (en) | 2020-12-29 | 2024-03-12 | VMware LLC | Emulating packet flows to assess network links for SD-WAN |
US11943146B2 (en) | 2021-10-01 | 2024-03-26 | VMware LLC | Traffic prioritization in SD-WAN |
US11949570B2 (en) * | 2021-07-30 | 2024-04-02 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for utilizing machine learning to automatically configure filters at a network packet broker |
US11960610B2 (en) | 2018-12-03 | 2024-04-16 | British Telecommunications Public Limited Company | Detecting vulnerability change in software systems |
US11989307B2 (en) | 2018-12-03 | 2024-05-21 | British Telecommunications Public Company Limited | Detecting vulnerable software systems |
US11989289B2 (en) | 2018-12-03 | 2024-05-21 | British Telecommunications Public Limited Company | Remediating software vulnerabilities |
US12009987B2 (en) | 2021-05-03 | 2024-06-11 | VMware LLC | Methods to support dynamic transit paths through hub clustering across branches in SD-WAN |
US12015536B2 (en) | 2021-06-18 | 2024-06-18 | VMware LLC | Method and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics of types of resource elements in the public clouds |
US12034587B1 (en) | 2023-03-27 | 2024-07-09 | VMware LLC | Identifying and remediating anomalies in a self-healing network |
US12034630B2 (en) | 2017-01-31 | 2024-07-09 | VMware LLC | Method and apparatus for distributed data network traffic optimization |
US12041479B2 (en) | 2020-01-24 | 2024-07-16 | VMware LLC | Accurate traffic steering between links through sub-path path quality metrics |
US12047244B2 (en) | 2017-02-11 | 2024-07-23 | Nicira, Inc. | Method and system of connecting to a multipath hub in a cluster |
US12047282B2 (en) | 2021-07-22 | 2024-07-23 | VMware LLC | Methods for smart bandwidth aggregation based dynamic overlay selection among preferred exits in SD-WAN |
US12058030B2 (en) | 2017-01-31 | 2024-08-06 | VMware LLC | High performance software-defined core network |
US12057993B1 (en) | 2023-03-27 | 2024-08-06 | VMware LLC | Identifying and remediating anomalies in a self-healing network |
WO2024228021A1 (en) * | 2023-05-02 | 2024-11-07 | Net Ai Tech Ltd | Methods of training an artificial intelligence model for operational anomaly prediction in a communications network, and systems |
US12160408B2 (en) | 2015-04-13 | 2024-12-03 | Nicira, Inc. | Method and system of establishing a virtual private network in a cloud service for branch networking |
US12166661B2 (en) | 2022-07-18 | 2024-12-10 | VMware LLC | DNS-based GSLB-aware SD-WAN for low latency SaaS applications |
US12177130B2 (en) | 2019-12-12 | 2024-12-24 | VMware LLC | Performing deep packet inspection in a software defined wide area network |
US12184557B2 (en) | 2022-01-04 | 2024-12-31 | VMware LLC | Explicit congestion notification in a virtual environment |
US12218800B2 (en) | 2021-05-06 | 2025-02-04 | VMware LLC | Methods for application defined virtual network service among multiple transport in sd-wan |
US12218845B2 (en) | 2021-01-18 | 2025-02-04 | VMware LLC | Network-aware load balancing |
US12237990B2 (en) | 2022-07-20 | 2025-02-25 | VMware LLC | Method for modifying an SD-WAN using metric-based heat maps |
US12250114B2 (en) | 2021-06-18 | 2025-03-11 | VMware LLC | Method and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics of sub-types of resource elements in the public clouds |
US12255794B2 (en) | 2022-03-15 | 2025-03-18 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for selectively processing a packet flow using a flow inspection engine |
US12261777B2 (en) | 2023-08-16 | 2025-03-25 | VMware LLC | Forwarding packets in multi-regional large scale deployments with distributed gateways |
US12267364B2 (en) | 2021-07-24 | 2025-04-01 | VMware LLC | Network management services in a virtual network |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113994641B (en) * | 2019-06-25 | 2024-11-01 | 马维尔亚洲私人有限公司 | Automobile network switch with anomaly detection |
CN110601916A (en) * | 2019-08-14 | 2019-12-20 | 天津大学 | Flow sampling and application sensing system based on machine learning |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140351414A1 (en) * | 2013-05-24 | 2014-11-27 | Alcatel Lucent | Systems And Methods For Providing Prediction-Based Dynamic Monitoring |
US20150113132A1 (en) * | 2013-10-21 | 2015-04-23 | Nyansa, Inc. | System and method for observing and controlling a programmable network using a remote network manager |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101188531B (en) * | 2007-12-27 | 2010-04-07 | 东软集团股份有限公司 | A method and system for monitoring network traffic exception |
FI20096394A0 (en) * | 2009-12-23 | 2009-12-23 | Valtion Teknillinen | DETECTING DETECTION IN COMMUNICATIONS NETWORKS |
US9774522B2 (en) * | 2014-01-06 | 2017-09-26 | Cisco Technology, Inc. | Triggering reroutes using early learning machine-based prediction of failures |
US9503467B2 (en) * | 2014-05-22 | 2016-11-22 | Accenture Global Services Limited | Network anomaly detection |
US9497215B2 (en) * | 2014-07-23 | 2016-11-15 | Cisco Technology, Inc. | Stealth mitigation for simulating the success of an attack |
-
2017
- 2017-03-22 US US15/466,732 patent/US20170339022A1/en not_active Abandoned
- 2017-04-04 CN CN201780039948.XA patent/CN109417495A/en active Pending
- 2017-04-04 EP EP17799821.8A patent/EP3459209A4/en not_active Withdrawn
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140351414A1 (en) * | 2013-05-24 | 2014-11-27 | Alcatel Lucent | Systems And Methods For Providing Prediction-Based Dynamic Monitoring |
US20150113132A1 (en) * | 2013-10-21 | 2015-04-23 | Nyansa, Inc. | System and method for observing and controlling a programmable network using a remote network manager |
Cited By (214)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11804988B2 (en) | 2013-07-10 | 2023-10-31 | Nicira, Inc. | Method and system of overlay flow control |
US10750387B2 (en) | 2015-03-23 | 2020-08-18 | Extreme Networks, Inc. | Configuration of rules in a network visibility system |
US10771475B2 (en) | 2015-03-23 | 2020-09-08 | Extreme Networks, Inc. | Techniques for exchanging control and configuration information in a network visibility system |
US12160408B2 (en) | 2015-04-13 | 2024-12-03 | Nicira, Inc. | Method and system of establishing a virtual private network in a cloud service for branch networking |
US10911353B2 (en) | 2015-06-17 | 2021-02-02 | Extreme Networks, Inc. | Architecture for a network visibility system |
US11366455B2 (en) | 2016-05-09 | 2022-06-21 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for optimization of data collection and storage using 3rd party data from a data marketplace in an industrial internet of things environment |
US11334063B2 (en) | 2016-05-09 | 2022-05-17 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for policy automation for a data collection system |
US11372394B2 (en) | 2016-05-09 | 2022-06-28 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for detection in an industrial internet of things data collection environment with self-organizing expert system detection for complex industrial, chemical process |
US12282837B2 (en) | 2016-05-09 | 2025-04-22 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for processing data collected in an industrial environment using neural networks |
US12259711B2 (en) | 2016-05-09 | 2025-03-25 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for the industrial internet of things |
US12244359B2 (en) | 2016-05-09 | 2025-03-04 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for monitoring pumps and fans |
US12237873B2 (en) | 2016-05-09 | 2025-02-25 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for balancing remote oil and gas equipment |
US12191926B2 (en) | 2016-05-09 | 2025-01-07 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for detection in an industrial internet of things data collection environment with noise detection and system response for vibrating components |
US12140930B2 (en) | 2016-05-09 | 2024-11-12 | Strong Force Iot Portfolio 2016, Llc | Method for determining service event of machine from sensor data |
US12099911B2 (en) | 2016-05-09 | 2024-09-24 | Strong Force loT Portfolio 2016, LLC | Systems and methods for learning data patterns predictive of an outcome |
US10754334B2 (en) | 2016-05-09 | 2020-08-25 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for industrial internet of things data collection for process adjustment in an upstream oil and gas environment |
US12079701B2 (en) | 2016-05-09 | 2024-09-03 | Strong Force Iot Portfolio 2016, Llc | System, methods and apparatus for modifying a data collection trajectory for conveyors |
US12039426B2 (en) | 2016-05-09 | 2024-07-16 | Strong Force Iot Portfolio 2016, Llc | Methods for self-organizing data collection, distribution and storage in a distribution environment |
US11996900B2 (en) | 2016-05-09 | 2024-05-28 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for processing data collected in an industrial environment using neural networks |
US11836571B2 (en) | 2016-05-09 | 2023-12-05 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for enabling user selection of components for data collection in an industrial environment |
US11838036B2 (en) | 2016-05-09 | 2023-12-05 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for detection in an industrial internet of things data collection environment |
US11797821B2 (en) | 2016-05-09 | 2023-10-24 | Strong Force Iot Portfolio 2016, Llc | System, methods and apparatus for modifying a data collection trajectory for centrifuges |
US11791914B2 (en) | 2016-05-09 | 2023-10-17 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for detection in an industrial Internet of Things data collection environment with a self-organizing data marketplace and notifications for industrial processes |
US11774944B2 (en) | 2016-05-09 | 2023-10-03 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for the industrial internet of things |
US10866584B2 (en) | 2016-05-09 | 2020-12-15 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for data processing in an industrial internet of things data collection environment with large data sets |
US11770196B2 (en) | 2016-05-09 | 2023-09-26 | Strong Force TX Portfolio 2018, LLC | Systems and methods for removing background noise in an industrial pump environment |
US11755878B2 (en) | 2016-05-09 | 2023-09-12 | Strong Force Iot Portfolio 2016, Llc | Methods and systems of diagnosing machine components using analog sensor data and neural network |
US11728910B2 (en) | 2016-05-09 | 2023-08-15 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for detection in an industrial internet of things data collection environment with expert systems to predict failures and system state for slow rotating components |
US11663442B2 (en) | 2016-05-09 | 2023-05-30 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for detection in an industrial Internet of Things data collection environment with intelligent data management for industrial processes including sensors |
US11646808B2 (en) | 2016-05-09 | 2023-05-09 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for adaption of data storage and communication in an internet of things downstream oil and gas environment |
US11609553B2 (en) | 2016-05-09 | 2023-03-21 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for data collection and frequency evaluation for pumps and fans |
US11609552B2 (en) | 2016-05-09 | 2023-03-21 | Strong Force Iot Portfolio 2016, Llc | Method and system for adjusting an operating parameter on a production line |
US11586188B2 (en) | 2016-05-09 | 2023-02-21 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for a data marketplace for high volume industrial processes |
US11586181B2 (en) | 2016-05-09 | 2023-02-21 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for adjusting process parameters in a production environment |
US11573557B2 (en) | 2016-05-09 | 2023-02-07 | Strong Force Iot Portfolio 2016, Llc | Methods and systems of industrial processes with self organizing data collectors and neural networks |
US10983514B2 (en) | 2016-05-09 | 2021-04-20 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for equipment monitoring in an Internet of Things mining environment |
US10983507B2 (en) | 2016-05-09 | 2021-04-20 | Strong Force Iot Portfolio 2016, Llc | Method for data collection and frequency analysis with self-organization functionality |
US11573558B2 (en) | 2016-05-09 | 2023-02-07 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for sensor fusion in a production line environment |
US11507075B2 (en) | 2016-05-09 | 2022-11-22 | Strong Force Iot Portfolio 2016, Llc | Method and system of a noise pattern data marketplace for a power station |
US11003179B2 (en) | 2016-05-09 | 2021-05-11 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for a data marketplace in an industrial internet of things environment |
US11009865B2 (en) | 2016-05-09 | 2021-05-18 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for a noise pattern data marketplace in an industrial internet of things environment |
US11029680B2 (en) | 2016-05-09 | 2021-06-08 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for detection in an industrial internet of things data collection environment with frequency band adjustments for diagnosing oil and gas production equipment |
US11507064B2 (en) | 2016-05-09 | 2022-11-22 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for industrial internet of things data collection in downstream oil and gas environment |
US11048248B2 (en) | 2016-05-09 | 2021-06-29 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for industrial internet of things data collection in a network sensitive mining environment |
US11493903B2 (en) | 2016-05-09 | 2022-11-08 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for a data marketplace in a conveyor environment |
US11415978B2 (en) | 2016-05-09 | 2022-08-16 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for enabling user selection of components for data collection in an industrial environment |
US11378938B2 (en) | 2016-05-09 | 2022-07-05 | Strong Force Iot Portfolio 2016, Llc | System, method, and apparatus for changing a sensed parameter group for a pump or fan |
US11409266B2 (en) | 2016-05-09 | 2022-08-09 | Strong Force Iot Portfolio 2016, Llc | System, method, and apparatus for changing a sensed parameter group for a motor |
US11073826B2 (en) | 2016-05-09 | 2021-07-27 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for data collection providing a haptic user interface |
US11086311B2 (en) | 2016-05-09 | 2021-08-10 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for data collection having intelligent data collection bands |
US11092955B2 (en) | 2016-05-09 | 2021-08-17 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for data collection utilizing relative phase detection |
US11106199B2 (en) | 2016-05-09 | 2021-08-31 | Strong Force Iot Portfolio 2016, Llc | Systems, methods and apparatus for providing a reduced dimensionality view of data collected on a self-organizing network |
US11112784B2 (en) | 2016-05-09 | 2021-09-07 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for communications in an industrial internet of things data collection environment with large data sets |
US11112785B2 (en) | 2016-05-09 | 2021-09-07 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for data collection and signal conditioning in an industrial environment |
US11119473B2 (en) | 2016-05-09 | 2021-09-14 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for data collection and processing with IP front-end signal conditioning |
US11402826B2 (en) | 2016-05-09 | 2022-08-02 | Strong Force Iot Portfolio 2016, Llc | Methods and systems of industrial production line with self organizing data collectors and neural networks |
US11397421B2 (en) | 2016-05-09 | 2022-07-26 | Strong Force Iot Portfolio 2016, Llc | Systems, devices and methods for bearing analysis in an industrial environment |
US11126171B2 (en) | 2016-05-09 | 2021-09-21 | Strong Force Iot Portfolio 2016, Llc | Methods and systems of diagnosing machine components using neural networks and having bandwidth allocation |
US11397422B2 (en) | 2016-05-09 | 2022-07-26 | Strong Force Iot Portfolio 2016, Llc | System, method, and apparatus for changing a sensed parameter group for a mixer or agitator |
US11137752B2 (en) | 2016-05-09 | 2021-10-05 | Strong Force loT Portfolio 2016, LLC | Systems, methods and apparatus for data collection and storage according to a data storage profile |
US11392116B2 (en) | 2016-05-09 | 2022-07-19 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for self-organizing data collection based on production environment parameter |
US11392111B2 (en) | 2016-05-09 | 2022-07-19 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for intelligent data collection for a production line |
US11156998B2 (en) | 2016-05-09 | 2021-10-26 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for process adjustments in an internet of things chemical production process |
US11169511B2 (en) | 2016-05-09 | 2021-11-09 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for network-sensitive data collection and intelligent process adjustment in an industrial environment |
US11392109B2 (en) | 2016-05-09 | 2022-07-19 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for data collection in an industrial refining environment with haptic feedback and data storage control |
US11181893B2 (en) | 2016-05-09 | 2021-11-23 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for data communication over a plurality of data paths |
US11385623B2 (en) | 2016-05-09 | 2022-07-12 | Strong Force Iot Portfolio 2016, Llc | Systems and methods of data collection and analysis of data from a plurality of monitoring devices |
US11194319B2 (en) | 2016-05-09 | 2021-12-07 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for data collection in a vehicle steering system utilizing relative phase detection |
US11194318B2 (en) | 2016-05-09 | 2021-12-07 | Strong Force Iot Portfolio 2016, Llc | Systems and methods utilizing noise analysis to determine conveyor performance |
US11054817B2 (en) | 2016-05-09 | 2021-07-06 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for data collection and intelligent process adjustment in an industrial environment |
US11199835B2 (en) | 2016-05-09 | 2021-12-14 | Strong Force Iot Portfolio 2016, Llc | Method and system of a noise pattern data marketplace in an industrial environment |
US11372395B2 (en) | 2016-05-09 | 2022-06-28 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for detection in an industrial Internet of Things data collection environment with expert systems diagnostics for vibrating components |
US11366456B2 (en) | 2016-05-09 | 2022-06-21 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for detection in an industrial internet of things data collection environment with intelligent data management for industrial processes including analog sensors |
US11360459B2 (en) | 2016-05-09 | 2022-06-14 | Strong Force Iot Portfolio 2016, Llc | Method and system for adjusting an operating parameter in a marginal network |
US11353852B2 (en) | 2016-05-09 | 2022-06-07 | Strong Force Iot Portfolio 2016, Llc | Method and system of modifying a data collection trajectory for pumps and fans |
US11353851B2 (en) | 2016-05-09 | 2022-06-07 | Strong Force Iot Portfolio 2016, Llc | Systems and methods of data collection monitoring utilizing a peak detection circuit |
US11353850B2 (en) | 2016-05-09 | 2022-06-07 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for data collection and signal evaluation to determine sensor status |
US11215980B2 (en) | 2016-05-09 | 2022-01-04 | Strong Force Iot Portfolio 2016, Llc | Systems and methods utilizing routing schemes to optimize data collection |
US11221613B2 (en) | 2016-05-09 | 2022-01-11 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for noise detection and removal in a motor |
US11347206B2 (en) | 2016-05-09 | 2022-05-31 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for data collection in a chemical or pharmaceutical production process with haptic feedback and control of data communication |
US11347205B2 (en) | 2016-05-09 | 2022-05-31 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for network-sensitive data collection and process assessment in an industrial environment |
US11243522B2 (en) | 2016-05-09 | 2022-02-08 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for detection in an industrial Internet of Things data collection environment with intelligent data collection and equipment package adjustment for a production line |
US11243528B2 (en) | 2016-05-09 | 2022-02-08 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for data collection utilizing adaptive scheduling of a multiplexer |
US11243521B2 (en) | 2016-05-09 | 2022-02-08 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for data collection in an industrial environment with haptic feedback and data communication and bandwidth control |
US11256242B2 (en) | 2016-05-09 | 2022-02-22 | Strong Force Iot Portfolio 2016, Llc | Methods and systems of chemical or pharmaceutical production line with self organizing data collectors and neural networks |
US11256243B2 (en) | 2016-05-09 | 2022-02-22 | Strong Force loT Portfolio 2016, LLC | Methods and systems for detection in an industrial Internet of Things data collection environment with intelligent data collection and equipment package adjustment for fluid conveyance equipment |
US11347215B2 (en) | 2016-05-09 | 2022-05-31 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for detection in an industrial internet of things data collection environment with intelligent management of data selection in high data volume data streams |
US11262737B2 (en) | 2016-05-09 | 2022-03-01 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for monitoring a vehicle steering system |
US11269318B2 (en) | 2016-05-09 | 2022-03-08 | Strong Force Iot Portfolio 2016, Llc | Systems, apparatus and methods for data collection utilizing an adaptively controlled analog crosspoint switch |
US11269319B2 (en) | 2016-05-09 | 2022-03-08 | Strong Force Iot Portfolio 2016, Llc | Methods for determining candidate sources of data collection |
US11281202B2 (en) | 2016-05-09 | 2022-03-22 | Strong Force Iot Portfolio 2016, Llc | Method and system of modifying a data collection trajectory for bearings |
US11340589B2 (en) | 2016-05-09 | 2022-05-24 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for detection in an industrial Internet of Things data collection environment with expert systems diagnostics and process adjustments for vibrating components |
US11385622B2 (en) | 2016-05-09 | 2022-07-12 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for characterizing an industrial system |
US11307565B2 (en) | 2016-05-09 | 2022-04-19 | Strong Force Iot Portfolio 2016, Llc | Method and system of a noise pattern data marketplace for motors |
US11327475B2 (en) | 2016-05-09 | 2022-05-10 | Strong Force Iot Portfolio 2016, Llc | Methods and systems for intelligent collection and analysis of vehicle data |
US11237546B2 (en) | 2016-06-15 | 2022-02-01 | Strong Force loT Portfolio 2016, LLC | Method and system of modifying a data collection trajectory for vehicles |
US12058030B2 (en) | 2017-01-31 | 2024-08-06 | VMware LLC | High performance software-defined core network |
US12034630B2 (en) | 2017-01-31 | 2024-07-09 | VMware LLC | Method and apparatus for distributed data network traffic optimization |
US12047244B2 (en) | 2017-02-11 | 2024-07-23 | Nicira, Inc. | Method and system of connecting to a multipath hub in a cluster |
US10977574B2 (en) * | 2017-02-14 | 2021-04-13 | Cisco Technology, Inc. | Prediction of network device control plane instabilities |
US10795350B2 (en) | 2017-08-02 | 2020-10-06 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for data collection including pattern recognition |
US20190324431A1 (en) * | 2017-08-02 | 2019-10-24 | Strong Force Iot Portfolio 2016, Llc | Data collection systems and methods with alternate routing of input channels |
US10824140B2 (en) | 2017-08-02 | 2020-11-03 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for network-sensitive data collection |
US11067976B2 (en) | 2017-08-02 | 2021-07-20 | Strong Force Iot Portfolio 2016, Llc | Data collection systems having a self-sufficient data acquisition box |
US10908602B2 (en) | 2017-08-02 | 2021-02-02 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for network-sensitive data collection |
US11209813B2 (en) | 2017-08-02 | 2021-12-28 | Strong Force Iot Portfolio 2016, Llc | Data monitoring systems and methods to update input channel routing in response to an alarm state |
US11199837B2 (en) | 2017-08-02 | 2021-12-14 | Strong Force Iot Portfolio 2016, Llc | Data monitoring systems and methods to update input channel routing in response to an alarm state |
US11126173B2 (en) | 2017-08-02 | 2021-09-21 | Strong Force Iot Portfolio 2016, Llc | Data collection systems having a self-sufficient data acquisition box |
US11036215B2 (en) | 2017-08-02 | 2021-06-15 | Strong Force Iot Portfolio 2016, Llc | Data collection systems with pattern analysis for an industrial environment |
US11231705B2 (en) | 2017-08-02 | 2022-01-25 | Strong Force Iot Portfolio 2016, Llc | Methods for data monitoring with changeable routing of input channels |
US10921801B2 (en) | 2017-08-02 | 2021-02-16 | Strong Force loT Portfolio 2016, LLC | Data collection systems and methods for updating sensed parameter groups based on pattern recognition |
US11397428B2 (en) | 2017-08-02 | 2022-07-26 | Strong Force Iot Portfolio 2016, Llc | Self-organizing systems and methods for data collection |
US11442445B2 (en) * | 2017-08-02 | 2022-09-13 | Strong Force Iot Portfolio 2016, Llc | Data collection systems and methods with alternate routing of input channels |
US11175653B2 (en) | 2017-08-02 | 2021-11-16 | Strong Force Iot Portfolio 2016, Llc | Systems for data collection and storage including network evaluation and data storage profiles |
US11131989B2 (en) | 2017-08-02 | 2021-09-28 | Strong Force Iot Portfolio 2016, Llc | Systems and methods for data collection including pattern recognition |
US11144047B2 (en) | 2017-08-02 | 2021-10-12 | Strong Force Iot Portfolio 2016, Llc | Systems for data collection and self-organizing storage including enhancing resolution |
US10903985B2 (en) | 2017-08-25 | 2021-01-26 | Keysight Technologies Singapore (Sales) Pte. Ltd. | Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques |
US11489666B2 (en) | 2017-08-25 | 2022-11-01 | Keysight Technologies Singapore (Sales) Pte. Ltd. | Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques |
US10992652B2 (en) | 2017-08-25 | 2021-04-27 | Keysight Technologies Singapore (Sales) Pte. Ltd. | Methods, systems, and computer readable media for monitoring encrypted network traffic flows |
US11128551B2 (en) * | 2017-09-28 | 2021-09-21 | Siemens Mobility GmbH | Method and apparatus for immediate and reaction-free transmission of log messages |
US11894949B2 (en) | 2017-10-02 | 2024-02-06 | VMware LLC | Identifying multiple nodes in a virtual network defined over a set of public clouds to connect to an external SaaS provider |
US11855805B2 (en) | 2017-10-02 | 2023-12-26 | Vmware, Inc. | Deploying firewall for virtual network defined over public cloud infrastructure |
US11895194B2 (en) | 2017-10-02 | 2024-02-06 | VMware LLC | Layer four optimization for a virtual network defined over public cloud |
US11153175B2 (en) * | 2017-10-16 | 2021-10-19 | International Business Machines Corporation | Latency management by edge analytics in industrial production environments |
US11902086B2 (en) | 2017-11-09 | 2024-02-13 | Nicira, Inc. | Method and system of a dynamic high-availability mode based on current wide area network connectivity |
US10693740B2 (en) | 2017-12-07 | 2020-06-23 | Accenture Global Solutions Limited | Data transformation of performance statistics and ticket information for network devices for use in machine learning models |
EP3496015A1 (en) * | 2017-12-07 | 2019-06-12 | Accenture Global Solutions Limited | Data transformation of performance statistics and ticket information for network devices for use in machine learning models |
CN108234496A (en) * | 2018-01-05 | 2018-06-29 | 宝牧科技(天津)有限公司 | A kind of method for predicting based on neural network |
US10846485B2 (en) * | 2018-01-10 | 2020-11-24 | International Business Machines Corporation | Machine learning model modification and natural language processing |
US10606958B2 (en) * | 2018-01-10 | 2020-03-31 | International Business Machines Corporation | Machine learning modification and natural language processing |
US20200019613A1 (en) * | 2018-01-10 | 2020-01-16 | International Business Machines Corporation | Machine Learning Model Modification and Natural Language Processing |
US20190281078A1 (en) * | 2018-03-08 | 2019-09-12 | Cisco Technology, Inc. | Predicting and mitigating layer-2 anomalies and instabilities |
US10862910B2 (en) * | 2018-03-08 | 2020-12-08 | Cisco Technology, Inc. | Predicting and mitigating layer-2 anomalies and instabilities |
EP3541016A1 (en) * | 2018-03-12 | 2019-09-18 | Adtran, Inc. | Telecommunications network troubleshooting systems |
US10716017B2 (en) | 2018-03-12 | 2020-07-14 | Adtran, Inc. | Telecommunications network troubleshooting systems |
US11201807B2 (en) * | 2018-04-24 | 2021-12-14 | Nippon Telegraph And Telephone Corporation | Traffic estimation apparatus, traffic estimation method and program |
US20190349287A1 (en) * | 2018-05-10 | 2019-11-14 | Dell Products L. P. | System and method to learn and prescribe optimal network path for sdn |
US11050656B2 (en) * | 2018-05-10 | 2021-06-29 | Dell Products L.P. | System and method to learn and prescribe network path for SDN |
CN108510741A (en) * | 2018-05-24 | 2018-09-07 | 浙江工业大学 | A kind of traffic flow forecasting method based on Conv1D-LSTM neural network structures |
CN108768750A (en) * | 2018-06-22 | 2018-11-06 | 广东电网有限责任公司 | communication network fault positioning method and device |
JP2020017952A (en) * | 2018-07-24 | 2020-01-30 | バイドゥ オンライン ネットワーク テクノロジー (ベイジン) カンパニー リミテッド | Method and device for warning |
US10951500B2 (en) | 2018-07-24 | 2021-03-16 | Baidu Online Network Technology (Beijing) Co., Ltd. | Method and apparatus for warning |
US11716313B2 (en) | 2018-08-10 | 2023-08-01 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for implementing bandwidth limitations on specific application traffic at a proxy element |
CN112585926A (en) * | 2018-08-23 | 2021-03-30 | 摩根士丹利服务集团有限公司 | Distributed system component failure identification |
JP7200359B2 (en) | 2018-08-23 | 2023-01-06 | モルガン スタンレー サービシーズ グループ,インコーポレイテッド | Identifying fault distribution system components |
JP2021534690A (en) * | 2018-08-23 | 2021-12-09 | モルガン スタンレー サービシーズ グループ, インコーポレイテッドMorgan Stanley Services Group, Inc. | Disability distribution system component identification |
US11425232B2 (en) | 2018-08-23 | 2022-08-23 | Morgan Stanley Services Group Inc. | Faulty distributed system component identification |
EP3841724A4 (en) * | 2018-08-23 | 2022-05-18 | Morgan Stanley Services Group Inc. | IDENTIFICATION OF FAULTY COMPONENTS OF A DISTRIBUTED SYSTEM |
US10868829B2 (en) | 2018-10-10 | 2020-12-15 | Northrop Grumman Systems Corporation | Predicted network traffic |
US10949542B2 (en) * | 2018-11-25 | 2021-03-16 | International Business Machines Corporation | Self-evolved adjustment framework for cloud-based large system based on machine learning |
US11989289B2 (en) | 2018-12-03 | 2024-05-21 | British Telecommunications Public Limited Company | Remediating software vulnerabilities |
US11989307B2 (en) | 2018-12-03 | 2024-05-21 | British Telecommunications Public Company Limited | Detecting vulnerable software systems |
US11960610B2 (en) | 2018-12-03 | 2024-04-16 | British Telecommunications Public Limited Company | Detecting vulnerability change in software systems |
US11973778B2 (en) * | 2018-12-03 | 2024-04-30 | British Telecommunications Public Limited Company | Detecting anomalies in computer networks |
US20220060492A1 (en) * | 2018-12-03 | 2022-02-24 | British Telecommunications Public Limited Company | Detecting anomalies in computer networks |
US11218879B2 (en) | 2018-12-05 | 2022-01-04 | At&T Intellectual Property I, L.P. | Providing security through characterizing internet protocol traffic to detect outliers |
US10951461B2 (en) | 2019-01-31 | 2021-03-16 | Hewlett Packard Enterprise Development Lp | Anomaly-driven packet capture and spectrum capture in an access point |
CN109948471A (en) * | 2019-03-04 | 2019-06-28 | 南京邮电大学 | Traffic haze visibility detection method based on improved InceptionV4 network |
WO2020202857A1 (en) * | 2019-03-29 | 2020-10-08 | Mitsubishi Electric Corporation | Predictive classification of future operations |
US12067489B2 (en) | 2019-04-23 | 2024-08-20 | Sciencelogic, Inc. | Distributed learning anomaly detector |
US11210587B2 (en) * | 2019-04-23 | 2021-12-28 | Sciencelogic, Inc. | Distributed learning anomaly detector |
WO2020219685A1 (en) * | 2019-04-23 | 2020-10-29 | Sciencelogic, Inc. | Distributed learning anomaly detector |
US20220095164A1 (en) * | 2019-06-06 | 2022-03-24 | Huawei Technologies Co., Ltd. | Traffic volume prediction method and apparatus |
US11831414B2 (en) | 2019-08-27 | 2023-11-28 | Vmware, Inc. | Providing recommendations for implementing virtual networks |
US12132671B2 (en) | 2019-08-27 | 2024-10-29 | VMware LLC | Providing recommendations for implementing virtual networks |
US11212229B2 (en) | 2019-10-11 | 2021-12-28 | Juniper Networks, Inc. | Employing machine learning to predict and dynamically tune static configuration parameters |
EP3806396A1 (en) * | 2019-10-11 | 2021-04-14 | Juniper Networks, Inc. | Employing machine learning to predict and dynamically tune static configuration parameters |
US11496495B2 (en) * | 2019-10-25 | 2022-11-08 | Cognizant Technology Solutions India Pvt. Ltd. | System and a method for detecting anomalous patterns in a network |
US20210126931A1 (en) * | 2019-10-25 | 2021-04-29 | Cognizant Technology Solutions India Pvt. Ltd | System and a method for detecting anomalous patterns in a network |
US12177130B2 (en) | 2019-12-12 | 2024-12-24 | VMware LLC | Performing deep packet inspection in a software defined wide area network |
US20210203606A1 (en) * | 2019-12-31 | 2021-07-01 | Opanga Networks, Inc. | Data transport network protocol based on real time transport network congestion conditions |
US11785442B2 (en) * | 2019-12-31 | 2023-10-10 | Opanga Networks, Inc. | Data transport network protocol based on real time transport network congestion conditions |
US20230029794A1 (en) * | 2020-01-07 | 2023-02-02 | Microsoft Technology Licensing, Llc | Customized anomaly detection |
US12238129B2 (en) * | 2020-01-07 | 2025-02-25 | Microsoft Technology Licensing, Llc | Customized anomaly detection |
US12041479B2 (en) | 2020-01-24 | 2024-07-16 | VMware LLC | Accurate traffic steering between links through sub-path path quality metrics |
US11190417B2 (en) * | 2020-02-04 | 2021-11-30 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for processing network flow metadata at a network packet broker |
US11310117B2 (en) * | 2020-06-24 | 2022-04-19 | Red Hat, Inc. | Pairing of a probe entity with another entity in a cloud computing environment |
US12113695B2 (en) | 2020-11-23 | 2024-10-08 | Verizon Patent And Licensing Inc. | Systems and methods for automated remote network performance monitoring |
US11552872B2 (en) * | 2020-11-23 | 2023-01-10 | Verizon Patent And Licensing Inc. | Systems and methods for automated remote network performance monitoring |
KR20220071843A (en) * | 2020-11-24 | 2022-05-31 | 고려대학교 산학협력단 | Generative adversarial network model and training method to generate message id sequence on unmanned moving objects |
KR102691125B1 (en) | 2020-11-24 | 2024-08-02 | 고려대학교 산학협력단 | Generative adversarial network model and training method to generate message id sequence on unmanned moving objects |
US11929903B2 (en) | 2020-12-29 | 2024-03-12 | VMware LLC | Emulating packet flows to assess network links for SD-WAN |
US20220417770A1 (en) * | 2021-01-08 | 2022-12-29 | Verizon Patent And Licensing Inc. | Systems and methods for determining baselines for network parameters used to configure base stations |
US11956650B2 (en) * | 2021-01-08 | 2024-04-09 | Verizon Patent And Licensing Inc. | Systems and methods for determining baselines for network parameters used to configure base stations |
US11792127B2 (en) | 2021-01-18 | 2023-10-17 | Vmware, Inc. | Network-aware load balancing |
US12218845B2 (en) | 2021-01-18 | 2025-02-04 | VMware LLC | Network-aware load balancing |
US11979325B2 (en) * | 2021-01-28 | 2024-05-07 | VMware LLC | Dynamic SD-WAN hub cluster scaling with machine learning |
US20220239596A1 (en) * | 2021-01-28 | 2022-07-28 | Vmware, Inc. | Dynamic sd-wan hub cluster scaling with machine learning |
US12009987B2 (en) | 2021-05-03 | 2024-06-11 | VMware LLC | Methods to support dynamic transit paths through hub clustering across branches in SD-WAN |
US12218800B2 (en) | 2021-05-06 | 2025-02-04 | VMware LLC | Methods for application defined virtual network service among multiple transport in sd-wan |
US11799879B2 (en) | 2021-05-18 | 2023-10-24 | Bank Of America Corporation | Real-time anomaly detection for network security |
US11792213B2 (en) | 2021-05-18 | 2023-10-17 | Bank Of America Corporation | Temporal-based anomaly detection for network security |
US11588835B2 (en) | 2021-05-18 | 2023-02-21 | Bank Of America Corporation | Dynamic network security monitoring system |
US12015536B2 (en) | 2021-06-18 | 2024-06-18 | VMware LLC | Method and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics of types of resource elements in the public clouds |
US12250114B2 (en) | 2021-06-18 | 2025-03-11 | VMware LLC | Method and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics of sub-types of resource elements in the public clouds |
US12007759B2 (en) * | 2021-06-28 | 2024-06-11 | Oracle International Corporation | Geometric aging data reduction for machine learning applications |
US20220413481A1 (en) * | 2021-06-28 | 2022-12-29 | Oracle International Corporation | Geometric aging data reduction for machine learning applications |
US12047282B2 (en) | 2021-07-22 | 2024-07-23 | VMware LLC | Methods for smart bandwidth aggregation based dynamic overlay selection among preferred exits in SD-WAN |
US12267364B2 (en) | 2021-07-24 | 2025-04-01 | VMware LLC | Network management services in a virtual network |
US11949570B2 (en) * | 2021-07-30 | 2024-04-02 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for utilizing machine learning to automatically configure filters at a network packet broker |
US11943146B2 (en) | 2021-10-01 | 2024-03-26 | VMware LLC | Traffic prioritization in SD-WAN |
US20230107011A1 (en) * | 2021-10-04 | 2023-04-06 | Mellanox Technologies, Ltd. | Digital simulator of data communication apparatus |
US12184557B2 (en) | 2022-01-04 | 2024-12-31 | VMware LLC | Explicit congestion notification in a virtual environment |
US20230269143A1 (en) * | 2022-02-22 | 2023-08-24 | Ciena Corporation | Switching among multiple machine learning models during training and inference |
US11956129B2 (en) * | 2022-02-22 | 2024-04-09 | Ciena Corporation | Switching among multiple machine learning models during training and inference |
US12255794B2 (en) | 2022-03-15 | 2025-03-18 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for selectively processing a packet flow using a flow inspection engine |
US11909815B2 (en) | 2022-06-06 | 2024-02-20 | VMware LLC | Routing based on geolocation costs |
US12166661B2 (en) | 2022-07-18 | 2024-12-10 | VMware LLC | DNS-based GSLB-aware SD-WAN for low latency SaaS applications |
US12237990B2 (en) | 2022-07-20 | 2025-02-25 | VMware LLC | Method for modifying an SD-WAN using metric-based heat maps |
US12034587B1 (en) | 2023-03-27 | 2024-07-09 | VMware LLC | Identifying and remediating anomalies in a self-healing network |
US12057993B1 (en) | 2023-03-27 | 2024-08-06 | VMware LLC | Identifying and remediating anomalies in a self-healing network |
WO2024228021A1 (en) * | 2023-05-02 | 2024-11-07 | Net Ai Tech Ltd | Methods of training an artificial intelligence model for operational anomaly prediction in a communications network, and systems |
CN116896469A (en) * | 2023-07-18 | 2023-10-17 | 哈尔滨工业大学 | Encryption agent application identification method based on Burst sequence |
US12261777B2 (en) | 2023-08-16 | 2025-03-25 | VMware LLC | Forwarding packets in multi-regional large scale deployments with distributed gateways |
Also Published As
Publication number | Publication date |
---|---|
EP3459209A4 (en) | 2019-10-30 |
EP3459209A1 (en) | 2019-03-27 |
CN109417495A (en) | 2019-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20170339022A1 (en) | Anomaly detection and prediction in a packet broker | |
US11050770B2 (en) | Network defense system and method thereof | |
US10887786B2 (en) | Near-uniform load balancing in a visibility network via usage prediction | |
CN108370370B (en) | System and method for passive assessment of industrial perimeter security | |
US12175364B2 (en) | Reinforcement-learning modeling interfaces | |
JP6419967B2 (en) | System and method for network management | |
US8677485B2 (en) | Detecting network anomaly | |
WO2017200651A1 (en) | Anomaly detection and prediction in a packet broker | |
CN108259194B (en) | Network fault early warning method and device | |
US11283683B2 (en) | Network modification impact prediction | |
US10404577B2 (en) | Network compatibility determination based on flow requirements of an application and stored flow capabilities of a software-defined network | |
WO2022165143A1 (en) | Systems and methods for artificial intelligence-defined networking | |
US20160065428A1 (en) | Scalable framework for monitoring and managing network devices | |
US12199812B2 (en) | Enhanced analysis and remediation of network performance | |
US20220247630A1 (en) | Identification of network device configuration changes | |
US11909522B2 (en) | System and method to measure and score application health via correctable errors | |
CN117768347A (en) | Cloud computing platform service monitoring method and device, computer equipment and storage medium | |
WO2016122659A1 (en) | Performance monitoring at edge of communication networks | |
CN117294587A (en) | Network configuration fault analysis method, server and medium | |
US8000337B2 (en) | Runtime flow debugging a network device by examining packet counters at internal points | |
US20250150325A1 (en) | Enhanced analysis and remediation of network performance | |
US10031788B2 (en) | Request profile in multi-threaded service systems with kernel events | |
CN119094371A (en) | Road network performance prediction method, device, electronic device, storage medium and computer program product | |
TW202308353A (en) | Self-healing system and self-healing method for telecommunication network | |
WO2025079103A1 (en) | Method and system for anomaly detection in a network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: BROCADE COMMUNICATIONS SYSTEMS, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HEGDE, DEEPAK;SHARMA, SHAILENDER;VEDAM, JUDE PRAGASH;AND OTHERS;REEL/FRAME:041689/0139 Effective date: 20170322 |
|
AS | Assignment |
Owner name: SILICON VALLEY BANK, CALIFORNIA Free format text: THIRD AMENDED AND RESTATED PATENT AND TRADEMARK SECURITY AGREEMENT;ASSIGNOR:EXTREME NETWORKS, INC.;REEL/FRAME:044639/0300 Effective date: 20171027 |
|
AS | Assignment |
Owner name: EXTREME NETWORKS, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BROCADE COMMUNICATIONS SYSTEMS, INC.;FOUNDRY NETWORKS, LLC;REEL/FRAME:044125/0547 Effective date: 20171107 |
|
AS | Assignment |
Owner name: BANK OF MONTREAL, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:EXTREME NETWORKS, INC.;REEL/FRAME:046050/0546 Effective date: 20180501 Owner name: EXTREME NETWORKS, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:046051/0775 Effective date: 20180501 |
|
AS | Assignment |
Owner name: KEYBANK NATIONAL ASSOCIATION, OHIO Free format text: THIRD AMENDMENT AND CONFIRMATION OF INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNOR:ALABAMA METAL INDUSTRIES CORPORATION;REEL/FRAME:048285/0480 Effective date: 20190124 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
AS | Assignment |
Owner name: ALABAMA METAL INDUSTRIES CORPORATION, NEW YORK Free format text: RELEASE OF SECURITY INTEREST IN UNITED STATES PATENTS;ASSIGNOR:KEYBANK NATIONAL ASSOCIATION;REEL/FRAME:055401/0051 Effective date: 20210223 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCV | Information on status: appeal procedure |
Free format text: NOTICE OF APPEAL FILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |