US20170339022A1 - Anomaly detection and prediction in a packet broker - Google Patents

Anomaly detection and prediction in a packet broker Download PDF

Info

Publication number
US20170339022A1
US20170339022A1 US15/466,732 US201715466732A US2017339022A1 US 20170339022 A1 US20170339022 A1 US 20170339022A1 US 201715466732 A US201715466732 A US 201715466732A US 2017339022 A1 US2017339022 A1 US 2017339022A1
Authority
US
United States
Prior art keywords
core network
network
machine learning
packet broker
learning models
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/466,732
Inventor
Deepak Hegde
Shailender Sharma
Jude Pragash Vedam
Ashwin Naresh
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Extreme Networks Inc
Original Assignee
Extreme Networks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Extreme Networks Inc filed Critical Extreme Networks Inc
Assigned to BROCADE COMMUNICATIONS SYSTEMS, INC. reassignment BROCADE COMMUNICATIONS SYSTEMS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HEGDE, DEEPAK, NARESH, Ashwin, SHARMA, SHAILENDER, VEDAM, JUDE PRAGASH
Priority to EP17799821.8A priority Critical patent/EP3459209A4/en
Priority to CN201780039948.XA priority patent/CN109417495A/en
Priority to PCT/US2017/025998 priority patent/WO2017200651A1/en
Assigned to SILICON VALLEY BANK reassignment SILICON VALLEY BANK THIRD AMENDED AND RESTATED PATENT AND TRADEMARK SECURITY AGREEMENT Assignors: EXTREME NETWORKS, INC.
Assigned to EXTREME NETWORKS, INC. reassignment EXTREME NETWORKS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BROCADE COMMUNICATIONS SYSTEMS, INC., FOUNDRY NETWORKS, LLC
Publication of US20170339022A1 publication Critical patent/US20170339022A1/en
Assigned to BANK OF MONTREAL reassignment BANK OF MONTREAL SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EXTREME NETWORKS, INC.
Assigned to EXTREME NETWORKS, INC. reassignment EXTREME NETWORKS, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: SILICON VALLEY BANK
Assigned to KEYBANK NATIONAL ASSOCIATION reassignment KEYBANK NATIONAL ASSOCIATION THIRD AMENDMENT AND CONFIRMATION OF INTELLECTUAL PROPERTY SECURITY AGREEMENT Assignors: ALABAMA METAL INDUSTRIES CORPORATION
Assigned to ALABAMA METAL INDUSTRIES CORPORATION reassignment ALABAMA METAL INDUSTRIES CORPORATION RELEASE OF SECURITY INTEREST IN UNITED STATES PATENTS Assignors: KEYBANK NATIONAL ASSOCIATION
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/044Recurrent networks, e.g. Hopfield networks
    • G06N99/005
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/142Network analysis or design using statistical or mathematical methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/147Network analysis or design for predicting network behaviour
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/16Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/04Processing captured monitoring data, e.g. for logfile generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/06Generation of reports
    • H04L43/062Generation of reports related to network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring

Definitions

  • a visibility network (also known as a “visibility fabric”) is a type of network that facilitates the monitoring and analysis of traffic flowing through another, “core” network (e.g., a production network).
  • core e.g., a production network.
  • the reasons for deploying a visibility network are varied and can include network management and optimization, business intelligence/reporting, compliance validation, service assurance, security monitoring, and so on.
  • FIG. 1 depicts an example visibility network 100 according to an embodiment.
  • visibility network 100 includes a number of taps 102 that are deployed within a core network 104 .
  • Taps 102 are configured to replicate data and control traffic that is exchanged between network elements in core network 104 and forward the replicated traffic to a packet broker 106 (note that, in addition to or in lieu of taps 102 , one or more routers or switches in core network 104 can be tasked to replicate and forward data/control traffic to packet broker 106 using their respective SPAN or mirror functions).
  • Packet broker 106 can perform various packet processing functions on the replicated traffic, such as removing protocol headers, filtering/classifying packets based on configured rules, and so on.
  • Packet broker 106 can then forward the processed traffic to one or more analytic probes/tools 108 , which can carry out various calculations and analyses on the traffic in accordance with the business goals/purposes of visibility network 100 (e.g., calculation of key performance indicators (KPIs), detection of traffic anomalies, generation of reports, etc.).
  • KPIs key performance indicators
  • analytic probes/tools 108 are configured to perform traffic anomaly detection
  • existing implementations of these probes/tools generally follow an approach that involves (1) recording/storing all of the traffic data replicated from core network 104 (i.e., both anomalous and non-anomalous traffic data), and (2) subsequently performing a post-hoc analysis on the stored data in order to identify anomalies. While this approach is functional, it also suffers from a number of inefficiencies and drawbacks. For example, consider a scenario where core network 104 is a very high volume network such as, e.g., a mobile service provider network.
  • the amount of compute and storage resources needed on analytic probes/tools 108 in order to store and analyze all of the traffic replicated from core network 104 will also be very high (even though only a small percentage of that traffic may actually be anomalous), resulting in significant infrastructure costs and poor scaling of visibility network 100 as the scope of core network 104 grows.
  • the post-hoc analysis described above is typically performed long after the anomalies being detected have occurred in core network 104 . This makes it difficult or impossible for analytic probes/tools 108 to implement measures that address the root causes of the anomalies while they are in progress, or to actively predict the occurrence of future anomalies.
  • the packet broker can apply one or more machine learning models to network traffic that is replicated from a core network.
  • the packet broker can further detect or predict, based on the application of the one or more machine learning models, the occurrence of a network traffic anomaly in the core network.
  • the packet broker can then take one or more predefined actions in response to the detection/prediction of the anomaly.
  • FIG. 1 depicts an example visibility network.
  • FIG. 2 depicts a visibility network in which the anomaly detection/prediction techniques of the present disclosure may be implemented according to an embodiment.
  • FIG. 3 depicts a workflow for training a machine learning model used for anomaly detection/prediction according to an embodiment.
  • FIG. 4 depicts an example LSTM neural network according to an embodiment.
  • FIG. 5 depicts a workflow for performing anomaly detection according to an embodiment.
  • FIG. 6 depicts a workflow for performing anomaly prediction according to an embodiment.
  • FIG. 7 depicts an example user interface for a core network visualization tool according to an embodiment.
  • FIG. 8 depicts an example network device according to an embodiment.
  • FIG. 9 depicts an example computer system according to an embodiment.
  • Embodiments of the present disclosure provide techniques that can be implemented by a packet broker in a visibility network for detecting and predicting anomalies in the network traffic of a core network.
  • these techniques can include training, by the packet broker based on traffic data replicated from the core network, one or more machine learning models that are designed to model the core network's typical traffic patterns.
  • one such machine learning model can be designed to model changes in the value of a particular core network parameter over time (e.g., subscriber attach rate, paging rate, data throughput, etc.).
  • the packet broker can apply these models (and/or other pre-trained models) to subsequent traffic that is replicated from the core network in order to detect and/or predict the occurrence of traffic anomalies in the core network in real-time. For example, in the case where the packet broker has trained a machine learning model M that models subscriber attach rate, the packet broker can compare the current subscriber attach rate in the core network with the subscriber attach rate value modeled by M for the current point in time. If the difference between these two values exceeds a threshold, the packet broker can determine that an anomaly with respect to subscriber attach rate has occurred (or is in the process of occurring).
  • the packet broker can compare an extrapolated future subscriber attach rate in the core network modeled by M with a predefined threshold. If the extrapolated future value exceeds the threshold, the packet broker can predict that an anomaly with respect to subscriber attach rate will very likely occur in the future.
  • the packet broker can take one or more predefined (e.g., user-defined) actions.
  • predefined actions can include applying a filter that steers replicated traffic related to the anomalous event (e.g., traffic originating from a particular location or associated with a particular host/subscriber) to one or more special analytic probes/tools for further analysis and storage.
  • the predefined actions can also include, e.g., generating an alert for a network administrator, implementing metering or sampling of the replicated traffic (in the case of an anomalous traffic burst), and others.
  • the packet broker can advantageously steer only anomalous (or likely to be anomalous) traffic to the probes/tools, which will typically make up a small percentage of the overall traffic replicated from the core network. This means that the computational and storage resources needed on the analytic probes/tools can be significantly reduced, which in turn can allow these components to scale out and handle very large traffic volumes in the core network in an efficient manner.
  • the packet broker can actively predict the occurrence of future anomalies and take steps to address them. For example, the packet broker may forward a traffic flow associated with a predicted future anomaly to the analytic probes/tools for preemptive analysis and review, before the anomaly actually occurs.
  • the packet broker can flexibly and accurately detect/predict a large number of different anomalies.
  • the packet broker may apply one set of machine learning models (referred to herein as “time-series models”) to detect/predict anomalies in time-series traffic data, such as subscriber attach rate, paging rate, data throughput, etc., derived from the core network.
  • the packet broker may also apply another set of machine learning models (referred to herein as “protocol language models”) to detect/predict anomalies in protocol message exchanges/flows replicated from the core network.
  • the particular machine learning models that are in use at any point in time, as well as the specific detection/prediction rules that are applied for each model, may be configurable by a network administrator.
  • FIG. 2 depicts a visibility network 200 that may be used to implement the anomaly detection/prediction techniques of the present disclosure according to an embodiment.
  • visibility network 200 includes a number of taps 202 that are deployed in a core network 204 and are configured to replicate traffic exchanged in network 204 to a packet broker 206 .
  • core network 204 is a mobile LTE network that comprises network elements specific to this type of network, such as an eNodeB 210 , a mobility management entity (MME) 212 , a serving gateway (SGW) 214 , and a packet data network gateway (PGW) 216 which connects to an external packet data network such as the Internet.
  • MME mobility management entity
  • SGW serving gateway
  • PGW packet data network gateway
  • taps 202 are configured to replicate and forward GTP-C and GTP-U traffic that is exchanged on certain interfaces of core network 204 .
  • core network 204 can be any other type of computer network known in the art, such as a mobile 3G network, a landline local area network (LAN) or wide area network (WAN), etc.
  • packet broker 206 can perform various types of packet processing functions on the traffic (as configured/assigned by an operator of visibility network 200 ) and can forward the processed traffic to one or more analytic probes/tools 208 for analysis.
  • packet broker 206 can be implemented solely in hardware, such as in the form of a network switch or router that relies on ASIC or FPGA-based packet processors to execute its assigned packet processing functions based on rules that are programmed into hardware memory tables (e.g., CAM tables) resident on the packet processors and/or line cards of the device.
  • packet broker 206 can be implemented solely in software that runs on, e.g., one or more general purpose physical or virtual computer systems.
  • packet broker 206 can be implemented using a combination of hardware and software, such as a combination of a hardware-based basic packet broker and a software-based “session director” cluster as described in co-owned U.S. patent application Ser. No. 15/205,889, entitled “Software-based Packet Broker,” the entire contents of which are incorporated herein by reference in its entirety for all purposes.
  • packet broker 206 of FIG. 2 is enhanced to include a novel anomaly detection/prediction module 218 .
  • anomaly detection/prediction module 218 can be implemented in software, hardware, or a combination thereof.
  • anomaly detection/prediction module 218 can (1) train one or more machine learning models that are designed to model core network 204 's traffic patterns (and thereby learn the typical behavior of core network 204 ); (2) apply the trained (as well as other pre-trained) machine learning models to subsequent traffic that is replicated from core network 204 in order to detect and/or predict the occurrence of traffic anomalies in core network 204 in real-time; and (3) upon detecting or predicting an anomaly, execute one or more predefined actions, such as steer replicated traffic that is deemed to be associated with the anomaly to a particular analytic probe/tool 208 for storage and further analysis.
  • predefined actions such as steer replicated traffic that is deemed to be associated with the anomaly to a particular analytic probe/tool 208 for storage and further analysis.
  • anomaly detection/prediction module 218 can eliminate or minimize many of the problems associated with conventional post-hoc anomaly detection on analytic probes/tools 208 .
  • the details for implementing the training, detection, and prediction steps above are described in the sections that follow.
  • FIG. 2 is illustrative and not intended to limit embodiments of the present disclosure.
  • the various entities shown in FIG. 2 may be arranged according to different configurations and/or include subcomponents or functions that are not specifically described.
  • One of ordinary skill in the art will recognize other variations, modifications, and alternatives.
  • FIG. 3 depicts a workflow 300 that can be executed by anomaly detection/prediction module 218 of packet broker 206 for training a machine learning model that will be used for detecting/predicting traffic anomalies in core network 204 according to an embodiment.
  • training workflow 300 will be applied to machine learning models that model traffic patterns/behavior which may differ from one network to another (and thus benefit from learning the specific patterns/behavior of a specific core network). Examples of such machine learning models include time-series models that track changes in the values of certain core network data or signaling parameters (e.g., subscriber attach rate, paging rate, packets per second, etc.) over time.
  • Training workflow 300 does not need to be applied to machine learning models that model traffic patterns/behavior which will be substantially similar across different deployments, such as protocol language models.
  • module 218 can first select a machine learning model to be trained for anomaly detection/prediction.
  • the manufacturer/vendor of packet broker 206 can pre-install a number of different machine learning models for this purpose on packet broker 206 and module 218 can select one of the pre-installed models.
  • the pre-installed models may be pre-trained by the manufacturer/vendor using generic training data so that they have an initial “base state” to work from (which can shorten the time needed to complete training workflow 300 ).
  • the user/customer operating packet broker 206 may define and supply their own pre-trained or not-pre-trained machine learning model as part of block 302 .
  • the machine learning model that is selected for training will generally be one that benefits from learning the specific traffic patterns and behaviors of core network 204 , such as a time-series model that learns time-series data from the core network.
  • a time-series model that learns time-series data from the core network.
  • machine learning algorithms and constructs that can be used for implementing a time-series model, such as a Long Short Term Memory (LSTM) neural network.
  • LSTM Long Short Term Memory
  • the network can learn the “normal” behavior of a given parameter x over time and, once trained, can output an expected (i.e., modeled) value for this parameter (x′) at n different time points ranging from t (i.e., the current point in time) to t+n.
  • t i.e., the current point in time
  • FIG. 4 A block diagram of an example LSTM neural network 400 is shown in FIG. 4 .
  • Other types of machine learning algorithms/constructs can also be used
  • module 218 can carry out a first training phase that involves (1) receiving, from a knowledge base comprising historical traffic logged from core network 204 , traffic data regarding the core network parameter modeled by the selected machine learning model (block 304 ), and (2) training/updating the machine learning model based on the historical traffic data (block 306 ). For example, if the machine learning model is designed to model subscriber attach rate, module 218 can receive from the knowledge base traffic data indicating how subscriber attach rate changed over some prior period of time in core network 204 and can train the model accordingly.
  • module 218 can “prime” the machine learning model using traffic data that packet broker 206 will likely receive from the actual, live version of core network 204 , without having to insert packet broker 206 into the production environment yet.
  • the volume of historical training data learned during this first training phase can differ depending on the nature of the machine learning model and/or core network 204 , and can range from a few days' worth of data to weeks, months, or more.
  • packet broker 206 can be deployed at the actual, live (i.e., production) site of core network 204 (block 308 ). Then, at blocks 310 and 312 , module 218 can carry out a second training phase that is similar to the first training phase, but trains the machine learning model using live traffic data replicated from core network 204 (rather than historical traffic data received from the knowledge base). In this way, module 218 can refine the machine learning model using real-time traffic data generated at the production site and thereby ensure that the model is as accurate and up-to-date as possible. Like the first training phase, the volume of data learned during this second training phase can vary depending on the nature of the machine learning model and/or core network 204 .
  • module 218 can store the trained machine learning model and mark it as being ready for use in detecting/predicting anomalies in core network 204 .
  • module 218 may also return to block 310 and repeat the second training phase on a continuous or periodic basis in order to keep the machine learning model up-to-date with respect to the ongoing traffic patterns occurring in core network 204 .
  • workflow 300 of FIG. 3 is illustrative and various modifications and enhancements are possible.
  • the specific manner and/or order in which the first and training phases are executed may differ on a case-by-case basis.
  • the first training phase (based on historical traffic data) may be omitted and module 218 may train the machine learning model solely using live traffic data from core network 204 .
  • the second training phase may be omitted and module 218 may train the machine learning model solely using historical traffic data from the knowledge base.
  • both the first and training phases may be executed, but they may be performed concurrently, in a different order, or in an overlapping manner.
  • module 218 may repeat workflow 300 (or run multiple instances of workflow 300 concurrently) in order to train several different types of machine learning models and/or temporal variations of a single type of model. For example, it is possible that the pattern/behavior of a given core network parameter can change significantly on a day-to-day basis. In this scenario, module 218 may train seven different machine learning models that all relate to the same core network parameter, but apply to different days of the week (e.g., a Monday model variant, a Tuesday model variant, etc.). With this approach, module 218 can subsequently use the appropriate daily model for anomaly detection/prediction based on the current day of the week.
  • modules 218 can subsequently use the appropriate daily model for anomaly detection/prediction based on the current day of the week.
  • anomaly detection/prediction module 218 can execute a workflow for performing real-time detection of anomalies in core network 204 using the trained model.
  • FIG. 5 depicts a workflow 500 of this detection process according to embodiment.
  • the trained machine learning model may be a time-series model (which models the value of a core network parameter over time), a protocol language model (which models valid protocol message exchanges and flows), or any other type of machine learning model that is usable for identifying deviations in the normal traffic patterns/behavior of core network 204 .
  • module 218 can, for a current time interval t, receive replicated traffic from core network 204 and can extract information from the replicated traffic that enables module 218 to determine the current actual value of a core network parameter or criterion modeled by the machine learning model. For example, if the machine learning model is a time-series model M 1 configured to model the value of a core network parameter x, module 218 can extract information from the replicated traffic that enables module 218 to determine the actual value of x in core network 204 for the current time interval t (i.e., x t ).
  • the machine learning model is a time-series model M 1 configured to model the value of a core network parameter x
  • module 218 can extract information from the replicated traffic that enables module 218 to determine the actual value of x in core network 204 for the current time interval t (i.e., x t ).
  • module 218 can extract information from the replicated traffic that enables module 218 to determine the specific message exchanges made using protocol P in the current time interval t.
  • module 218 can use the machine learning model to determine, for the current time interval t, an expected (i.e., modeled) value for the same network parameter or criterion determined at block 504 .
  • an expected (i.e., modeled) value for the same network parameter or criterion determined at block 504 For example, in the case of time-series model M 1 above, module 218 can use M 1 to output an expected value for parameter x at time t (i.e., x′ t ). Alternatively, in the case of protocol language model M 2 above, module 218 can use M 2 to output an expected message exchange or flow using protocol P at time t.
  • module 218 can compare the two values and determine whether there is a discrepancy between the two values that exceeds a predefined threshold or reflects a critical inconsistency (block 508 ). For example, module 218 can determine whether x′ t -x t exceeds a numerical threshold T, or whether the actual and expected message exchanges are substantially different/out of order/etc. (indicating that the actual message exchange may be invalid).
  • module 218 can conclude that core network 204 is behaving normally (block 510 ). As a result, module 218 can wait for the start of the next time interval t+1 (block 512 ) and then return to block 502 in order to repeat the detection process at time t+1.
  • module 218 can conclude that an anomaly with respect to the parameter/criterion has occurred (or is in the progress of occurring) in core network 204 (block 514 ). In this case, module 218 can execute one or more predefined actions that are associated with the model (block 516 ). For example, in one embodiment, module 218 can apply a filter that steers all replicated traffic from core network 204 that is deemed to be related to the anomaly (e.g., all traffic from a particular location or a particular host/subscriber) to one or more special analytic probes/tools 208 for storage and further analysis.
  • a filter that steers all replicated traffic from core network 204 that is deemed to be related to the anomaly (e.g., all traffic from a particular location or a particular host/subscriber) to one or more special analytic probes/tools 208 for storage and further analysis.
  • module 218 can selectively forward only the traffic that is likely to be of interest for anomaly analysis purposes to those special probes/tools.
  • module 218 can also generate and send metadata information related to the steered traffic (in the form of, e.g., IPFix packets) to the special analytic probes/tools.
  • This metadata information can include, e.g., where the traffic originated from, subscriber/session info, and other contextual cues which the probes/tools can use to facilitate their analysis of the anomalous traffic and help identify the root cause of the anomaly.
  • module 218 can execute other actions in addition to (or in lieu of) the traffic steering described above, such as generating an alert for a network administrator, metering further traffic replicated from core network 204 , and so on.
  • the specific nature of these actions can be configurable by a user/administrator of packet broker 206 .
  • module 218 can wait for the next time interval t+1 as mentioned previously (block 512 ) and subsequently return to block 502 in order to repeat the detection process at time t+1.
  • module 218 of packet broker 206 can also perform real-time prediction of future anomalies in core network 204 via its trained machine learning model(s).
  • FIG. 6 depicts a workflow 600 illustrating this prediction process according to an embodiment.
  • Workflow 600 assumes that the machine learning model used for anomaly prediction is specifically a time-series model that tracks the value of a core network parameter x over time.
  • module 218 can, for a current time interval t, receive replicated traffic from core network 204 , extract information from the replicated traffic that enables module 218 to determine the current value for core network parameter x (i.e., x t ), and store x t in a local data store. Further, at block 606 , module 218 can retrieve from the data store the last m values of parameter x (i.e., x t ⁇ 1 , x t ⁇ 2 , . . . x t ⁇ m ).
  • module 218 can fit the m values retrieved at block 606 to a linear regression model in order to extrapolate a value of core network parameter x at some future point in time t+n (i.e., x t+n ). Module 218 can then compare the extrapolated value with a predefined threshold T (block 612 ). This predefined threshold can be different from the threshold discussed with respect to anomaly detection workflow 500 .
  • module 218 can conclude that there will be no future anomaly with respect to core network parameter x at time t+n (block 614 ). As a result, module 218 can wait for the start of the next time interval t+1 (block 616 ) and subsequently return to block 602 in order to repeat the prediction process at time t+1.
  • module 218 can conclude that an anomaly with respect to parameter x will occur at time t+n in core network 204 (block 618 ).
  • module 218 can execute one or more predefined actions that are associated with the model (block 620 ), such as steering all replicated traffic from core network 204 that is deemed to be related to the anomaly to one or more special analytic probes/tools 208 for storage and further analysis. In this way, the special probes/tools can analyze and potentially implement steps to avoid the anomaly before it actually occurs.
  • Module 218 also execute other actions at block 620 such as generating an administrator alert, dropping/metering the replicated traffic, and so on.
  • module 218 can wait for the next time interval t+1 as mentioned previously (block 616 ) and subsequently return to block 602 to repeat the prediction process at time t+1.
  • anomaly detection and prediction workflows 500 and 600 are illustrative and modifications and enhancements are possible.
  • module 218 may repeat or execute multiple instances of these workflows concurrently in order to detect and/or predict different types of anomalies in core network 204 via different machine learning models.
  • module 218 may execute workflow 500 simultaneously with workflow 600 in order to perform anomaly detection and prediction in parallel.
  • One of ordinary skill in the art will recognize other variations, modifications, and alternatives.
  • packet broker 206 of FIG. 2 may also implement automated discovery of the topology and entities in core network 204 .
  • this automated discovery feature the configuration of packet broker 206 can be streamlined, since there is no need for an administrator to manually enter information into packet broker 206 regarding core network 204 (e.g., IP addresses, interfaces, etc.). Instead, this configuration can be determined automatically based on the discovered core network entities and topology. Further, this automated discovery feature can enable packet broker 206 to implement new types of traffic filters, such as a filter to steer traffic of a newly detected core network entity to a particular analytic probe/tool, or a filter to drop traffic from portions of core network 204 that are known to carry duplicate packets.
  • traffic filters such as a filter to steer traffic of a newly detected core network entity to a particular analytic probe/tool, or a filter to drop traffic from portions of core network 204 that are known to carry duplicate packets.
  • this feature can entail automatically discovering what network entities are deployed in core network 204 , what the properties of those network entities are (e.g., IP addresses, etc.), and how the network entities are interconnected.
  • Packet broker 206 can perform this discovery by, e.g., monitoring and analyzing the control and/or data traffic that is tapped from core network 204 .
  • the specific nature of the discovery process will differ depending on the type of the core network (e.g., a 3G network, an LTE network, etc.).
  • Packet broker 206 can perform the discovery upon initialization, as well as on a continuous basis throughout its runtime (in order to detect newly added or removed entities).
  • Packet broker 206 can then use this core network information to facilitate its configuration as well as perform other functions. For example, in one embodiment packet broker 206 can automatically setup access control lists/filters based on the discovered network entities. This can include, e.g., default filters for forwarding traffic tapped from certain network entities to certain probes/tools, as well as filters for removing duplicate traffic, filters for forwarding traffic from newly added notes, and so on.
  • packet broker 206 can group discovered network entities or zones in order to ease configuration management. This can help in steering traffic to corresponding zones to appropriate analytic probes/tools so that certain problems (such as duplicate packets) can be avoided.
  • packet broker 206 can setup notifications/alerts when there are modifications in core network 204 (e.g., entities are added, removed, etc.). Packet broker 206 can then apply policies to update its configuration based on the core network modifications. This can be particularly useful if core network 204 is virtualized, since the configuration of the core network will likely change on a frequent basis in this scenario.
  • packet broker 206 can provide the discovered network information to a tool (e.g., an SDN app running on an SDN controller) so that users can visualize the topology of core network 204 .
  • FIG. 7 depicts an example UI 700 that illustrates a visualization of a core network using such a tool according to an embodiment.
  • a user can view the entities and their connections/interfaces, and can filter the view based on types of entities (e.g., ENodeB, SGW, MME, PGW, HSS, AAA, etc.) and other criteria.
  • a user can also view alerts/notifications pertaining to anomalies that are detected or predicted by packet broker 206 in accordance with the techniques described in the foregoing sections.
  • FIG. 8 depicts an example network device (e.g., switch and/or router) 800 in which certain embodiments of the present disclosure may be implemented.
  • network device 800 may be used to implement packet broker 206 of FIG. 2 (either wholly or in part).
  • network device 800 includes a management module 802 , a switch fabric module 804 , and a number of I/O modules 806 ( 1 )- 806 (N).
  • Management module 802 includes one or more management CPUs 808 for managing/controlling the operation of the device.
  • Each management CPU 808 can be a general purpose processor, such as a PowerPC, Intel, AMD, or ARM-based processor, that operates under the control of software stored in an associated memory (not shown).
  • Switch fabric module 804 and I/O modules 806 ( 1 )- 806 (N) collectively represent the data, or forwarding, plane of network device 800 .
  • Switch fabric module 804 is configured to interconnect the various other modules of network device 800 .
  • Each I/O module 806 ( 1 )- 806 (N) can include one or more input/output ports 810 ( 1 )- 810 (N) that are used by network device 800 to send and receive data packets.
  • Each I/O module 806 ( 1 )- 806 (N) can also include a packet processor 812 ( 1 )- 812 (N).
  • Packet processor 812 ( 1 )- 812 (N) is a hardware processing component (e.g., an FPGA or ASIC) that can make wire speed decisions on how to handle incoming or outgoing data packets.
  • network device 800 is illustrative and many other configurations having more or fewer components than network device 800 are possible.
  • FIG. 9 depicts an example computer system 900 in which certain embodiments of the present disclosure may be implemented.
  • computer system 900 may be used to implement packet broker 206 of FIG. 2 (either wholly or in part).
  • computer system 900 includes one or more processors 902 that communicate with a number of peripheral devices via a bus subsystem 904 .
  • peripheral devices include a storage subsystem 906 (comprising a memory subsystem 908 and a file storage subsystem 910 ), user interface input devices 912 , user interface output devices 914 , and a network interface subsystem 916 .
  • Bus subsystem 904 can provide a mechanism for letting the various components and subsystems of computer system 900 communicate with each other as intended. Although bus subsystem 904 is shown schematically as a single bus, alternative embodiments of the bus subsystem can utilize multiple buses.
  • Network interface subsystem 916 can serve as an interface for communicating data between computer system 900 and other computing devices or networks.
  • Embodiments of network interface subsystem 916 can include wired (e.g., coaxial, twisted pair, or fiber optic Ethernet) and/or wireless (e.g., Wi-Fi, cellular, Bluetooth, etc.) interfaces.
  • User interface input devices 912 can include a keyboard, pointing devices (e.g., mouse, trackball, touchpad, etc.), a scanner, a barcode scanner, a touch-screen incorporated into a display, audio input devices (e.g., voice recognition systems, microphones, etc.), and other types of input devices.
  • pointing devices e.g., mouse, trackball, touchpad, etc.
  • audio input devices e.g., voice recognition systems, microphones, etc.
  • use of the term “input device” is intended to include all possible types of devices and mechanisms for inputting information into computer system 900 .
  • User interface output devices 914 can include a display subsystem, a printer, a fax machine, or non-visual displays such as audio output devices, etc.
  • the display subsystem can be a cathode ray tube (CRT), a flat-panel device such as a liquid crystal display (LCD), or a projection device.
  • CTR cathode ray tube
  • LCD liquid crystal display
  • output device is intended to include all possible types of devices and mechanisms for outputting information from computer system 900 .
  • Storage subsystem 906 includes a memory subsystem 908 and a file/disk storage subsystem 910 .
  • Subsystems 908 and 910 represent non-transitory computer-readable storage media that can store program code and/or data that provide the functionality of various embodiments described herein.
  • Memory subsystem 908 includes a number of memories including a main random access memory (RAM) 918 for storage of instructions and data during program execution and a read-only memory (ROM) 920 in which fixed instructions are stored.
  • File storage subsystem 910 can provide persistent (i.e., non-volatile) storage for program and data files and can include a magnetic or solid-state hard disk drive, an optical drive along with associated removable media (e.g., CD-ROM, DVD, Blu-Ray, etc.), a removable flash memory-based drive or card, and/or other types of storage media known in the art.
  • computer system 900 is illustrative and many other configurations having more or fewer components than computer system 900 are possible.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Artificial Intelligence (AREA)
  • Mathematical Physics (AREA)
  • Evolutionary Computation (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Molecular Biology (AREA)
  • General Health & Medical Sciences (AREA)
  • Biophysics (AREA)
  • Biomedical Technology (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Probability & Statistics with Applications (AREA)
  • Pure & Applied Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Techniques for performing anomaly detection and prediction in a packet broker of a visibility network are provided. According to one embodiment, the packet broker can apply one or more machine learning models to network traffic that is replicated from a core network. The packet broker can further detect or predict, based on the application of the one or more machine learning models, the occurrence of a network traffic anomaly in the core network. The packet broker can then take one or more predefined actions in response to the detection/prediction of the anomaly.

Description

    CROSS-REFERENCES TO RELATED APPLICATIONS
  • The present application claims the benefit and priority of India Provisional Application No. 201641016960, filed May 17, 2016, entitled “NETWORK LEARNING IN A VISIBILITY FABRIC.” The entire contents of this application are incorporated herein by reference in its entirety for all purposes.
  • BACKGROUND
  • In the field of computer networking, a visibility network (also known as a “visibility fabric”) is a type of network that facilitates the monitoring and analysis of traffic flowing through another, “core” network (e.g., a production network). The reasons for deploying a visibility network are varied and can include network management and optimization, business intelligence/reporting, compliance validation, service assurance, security monitoring, and so on.
  • FIG. 1 depicts an example visibility network 100 according to an embodiment. As shown, visibility network 100 includes a number of taps 102 that are deployed within a core network 104. Taps 102 are configured to replicate data and control traffic that is exchanged between network elements in core network 104 and forward the replicated traffic to a packet broker 106 (note that, in addition to or in lieu of taps 102, one or more routers or switches in core network 104 can be tasked to replicate and forward data/control traffic to packet broker 106 using their respective SPAN or mirror functions). Packet broker 106 can perform various packet processing functions on the replicated traffic, such as removing protocol headers, filtering/classifying packets based on configured rules, and so on. Packet broker 106 can then forward the processed traffic to one or more analytic probes/tools 108, which can carry out various calculations and analyses on the traffic in accordance with the business goals/purposes of visibility network 100 (e.g., calculation of key performance indicators (KPIs), detection of traffic anomalies, generation of reports, etc.).
  • In cases where analytic probes/tools 108 are configured to perform traffic anomaly detection, existing implementations of these probes/tools generally follow an approach that involves (1) recording/storing all of the traffic data replicated from core network 104 (i.e., both anomalous and non-anomalous traffic data), and (2) subsequently performing a post-hoc analysis on the stored data in order to identify anomalies. While this approach is functional, it also suffers from a number of inefficiencies and drawbacks. For example, consider a scenario where core network 104 is a very high volume network such as, e.g., a mobile service provider network. In this case, the amount of compute and storage resources needed on analytic probes/tools 108 in order to store and analyze all of the traffic replicated from core network 104 will also be very high (even though only a small percentage of that traffic may actually be anomalous), resulting in significant infrastructure costs and poor scaling of visibility network 100 as the scope of core network 104 grows.
  • Further, the post-hoc analysis described above is typically performed long after the anomalies being detected have occurred in core network 104. This makes it difficult or impossible for analytic probes/tools 108 to implement measures that address the root causes of the anomalies while they are in progress, or to actively predict the occurrence of future anomalies.
  • SUMMARY
  • Techniques for performing anomaly detection and prediction in a packet broker of a visibility network are provided. According to one embodiment, the packet broker can apply one or more machine learning models to network traffic that is replicated from a core network. The packet broker can further detect or predict, based on the application of the one or more machine learning models, the occurrence of a network traffic anomaly in the core network. The packet broker can then take one or more predefined actions in response to the detection/prediction of the anomaly.
  • The following detailed description and accompanying drawings provide a better understanding of the nature and advantages of particular embodiments.
  • BRIEF DESCRIPTION OF DRAWINGS
  • FIG. 1 depicts an example visibility network.
  • FIG. 2 depicts a visibility network in which the anomaly detection/prediction techniques of the present disclosure may be implemented according to an embodiment.
  • FIG. 3 depicts a workflow for training a machine learning model used for anomaly detection/prediction according to an embodiment.
  • FIG. 4 depicts an example LSTM neural network according to an embodiment.
  • FIG. 5 depicts a workflow for performing anomaly detection according to an embodiment.
  • FIG. 6 depicts a workflow for performing anomaly prediction according to an embodiment.
  • FIG. 7 depicts an example user interface for a core network visualization tool according to an embodiment.
  • FIG. 8 depicts an example network device according to an embodiment.
  • FIG. 9 depicts an example computer system according to an embodiment.
  • DETAILED DESCRIPTION
  • In the following description, for purposes of explanation, numerous examples and details are set forth in order to provide an understanding of various embodiments. It will be evident, however, to one skilled in the art that certain embodiments can be practiced without some of these details, or can be practiced with modifications or equivalents thereof.
  • 1. Overview
  • Embodiments of the present disclosure provide techniques that can be implemented by a packet broker in a visibility network for detecting and predicting anomalies in the network traffic of a core network. In one set of embodiments, these techniques can include training, by the packet broker based on traffic data replicated from the core network, one or more machine learning models that are designed to model the core network's typical traffic patterns. For instance, one such machine learning model can be designed to model changes in the value of a particular core network parameter over time (e.g., subscriber attach rate, paging rate, data throughput, etc.).
  • Once the machine learning models have been trained, the packet broker can apply these models (and/or other pre-trained models) to subsequent traffic that is replicated from the core network in order to detect and/or predict the occurrence of traffic anomalies in the core network in real-time. For example, in the case where the packet broker has trained a machine learning model M that models subscriber attach rate, the packet broker can compare the current subscriber attach rate in the core network with the subscriber attach rate value modeled by M for the current point in time. If the difference between these two values exceeds a threshold, the packet broker can determine that an anomaly with respect to subscriber attach rate has occurred (or is in the process of occurring). Alternatively or in addition, the packet broker can compare an extrapolated future subscriber attach rate in the core network modeled by M with a predefined threshold. If the extrapolated future value exceeds the threshold, the packet broker can predict that an anomaly with respect to subscriber attach rate will very likely occur in the future.
  • Then, upon determining that a traffic anomaly has occurred or will soon occur in the core network, the packet broker can take one or more predefined (e.g., user-defined) actions. These predefined actions can include applying a filter that steers replicated traffic related to the anomalous event (e.g., traffic originating from a particular location or associated with a particular host/subscriber) to one or more special analytic probes/tools for further analysis and storage. The predefined actions can also include, e.g., generating an alert for a network administrator, implementing metering or sampling of the replicated traffic (in the case of an anomalous traffic burst), and others.
  • With the general approach described above, a number of benefits can be realized over prior art techniques that implement anomaly detection in a post-hoc fashion on the analytic probes/tools of the visibility network. First, by moving the anomaly detection task from the analytic probes/tools to the packet broker, the packet broker can advantageously steer only anomalous (or likely to be anomalous) traffic to the probes/tools, which will typically make up a small percentage of the overall traffic replicated from the core network. This means that the computational and storage resources needed on the analytic probes/tools can be significantly reduced, which in turn can allow these components to scale out and handle very large traffic volumes in the core network in an efficient manner.
  • Second, since the packet broker monitors for anomalies in a real-time manner, in certain embodiments the packet broker can actively predict the occurrence of future anomalies and take steps to address them. For example, the packet broker may forward a traffic flow associated with a predicted future anomaly to the analytic probes/tools for preemptive analysis and review, before the anomaly actually occurs.
  • Third, by performing anomaly detection and prediction using various different machine learning models, the packet broker can flexibly and accurately detect/predict a large number of different anomalies. For example, as mentioned above, the packet broker may apply one set of machine learning models (referred to herein as “time-series models”) to detect/predict anomalies in time-series traffic data, such as subscriber attach rate, paging rate, data throughput, etc., derived from the core network. The packet broker may also apply another set of machine learning models (referred to herein as “protocol language models”) to detect/predict anomalies in protocol message exchanges/flows replicated from the core network. The particular machine learning models that are in use at any point in time, as well as the specific detection/prediction rules that are applied for each model, may be configurable by a network administrator.
  • These any other aspects of the present disclosure are described in further detail below.
  • 2. Visibility Network
  • FIG. 2 depicts a visibility network 200 that may be used to implement the anomaly detection/prediction techniques of the present disclosure according to an embodiment. As shown, visibility network 200 includes a number of taps 202 that are deployed in a core network 204 and are configured to replicate traffic exchanged in network 204 to a packet broker 206. In FIG. 2, core network 204 is a mobile LTE network that comprises network elements specific to this type of network, such as an eNodeB 210, a mobility management entity (MME) 212, a serving gateway (SGW) 214, and a packet data network gateway (PGW) 216 which connects to an external packet data network such as the Internet. Further, in this particular example, taps 202 are configured to replicate and forward GTP-C and GTP-U traffic that is exchanged on certain interfaces of core network 204. However, it should be appreciated that core network 204 can be any other type of computer network known in the art, such as a mobile 3G network, a landline local area network (LAN) or wide area network (WAN), etc.
  • Upon receiving the replicated traffic via taps 202, packet broker 206 can perform various types of packet processing functions on the traffic (as configured/assigned by an operator of visibility network 200) and can forward the processed traffic to one or more analytic probes/tools 208 for analysis. In one embodiment, packet broker 206 can be implemented solely in hardware, such as in the form of a network switch or router that relies on ASIC or FPGA-based packet processors to execute its assigned packet processing functions based on rules that are programmed into hardware memory tables (e.g., CAM tables) resident on the packet processors and/or line cards of the device. In another embodiment, packet broker 206 can be implemented solely in software that runs on, e.g., one or more general purpose physical or virtual computer systems. In yet another embodiment, packet broker 206 can be implemented using a combination of hardware and software, such as a combination of a hardware-based basic packet broker and a software-based “session director” cluster as described in co-owned U.S. patent application Ser. No. 15/205,889, entitled “Software-based Packet Broker,” the entire contents of which are incorporated herein by reference in its entirety for all purposes.
  • As noted in the Background section, in cases where analytic probes/tools 208 are tasked with detecting traffic anomalies in core network 204, conventional implementations of these probe/tools record and store all of the traffic replicated from core network 204 and perform a post-hoc analysis on the stored data. However, this approach suffers from a number of inefficiencies and limitations, such as heavy investment cost for probes/tools 208 in scenarios where core network 204 generates high volumes of traffic, inability to address and predict anomalies in real-time, and so on.
  • To address these and other similar issues, packet broker 206 of FIG. 2 is enhanced to include a novel anomaly detection/prediction module 218. Depending on the configuration of packet broker 206, anomaly detection/prediction module 218 can be implemented in software, hardware, or a combination thereof. At a high level, anomaly detection/prediction module 218 can (1) train one or more machine learning models that are designed to model core network 204's traffic patterns (and thereby learn the typical behavior of core network 204); (2) apply the trained (as well as other pre-trained) machine learning models to subsequent traffic that is replicated from core network 204 in order to detect and/or predict the occurrence of traffic anomalies in core network 204 in real-time; and (3) upon detecting or predicting an anomaly, execute one or more predefined actions, such as steer replicated traffic that is deemed to be associated with the anomaly to a particular analytic probe/tool 208 for storage and further analysis. In this way, anomaly detection/prediction module 218 can eliminate or minimize many of the problems associated with conventional post-hoc anomaly detection on analytic probes/tools 208. The details for implementing the training, detection, and prediction steps above are described in the sections that follow.
  • It should be appreciated that FIG. 2 is illustrative and not intended to limit embodiments of the present disclosure. For example, the various entities shown in FIG. 2 may be arranged according to different configurations and/or include subcomponents or functions that are not specifically described. One of ordinary skill in the art will recognize other variations, modifications, and alternatives.
  • 3. Model Training Workflow
  • FIG. 3 depicts a workflow 300 that can be executed by anomaly detection/prediction module 218 of packet broker 206 for training a machine learning model that will be used for detecting/predicting traffic anomalies in core network 204 according to an embodiment. Generally speaking, training workflow 300 will be applied to machine learning models that model traffic patterns/behavior which may differ from one network to another (and thus benefit from learning the specific patterns/behavior of a specific core network). Examples of such machine learning models include time-series models that track changes in the values of certain core network data or signaling parameters (e.g., subscriber attach rate, paging rate, packets per second, etc.) over time. Training workflow 300 does not need to be applied to machine learning models that model traffic patterns/behavior which will be substantially similar across different deployments, such as protocol language models.
  • Starting block 302, module 218 can first select a machine learning model to be trained for anomaly detection/prediction. In one set of embodiments, the manufacturer/vendor of packet broker 206 can pre-install a number of different machine learning models for this purpose on packet broker 206 and module 218 can select one of the pre-installed models. In these cases, the pre-installed models may be pre-trained by the manufacturer/vendor using generic training data so that they have an initial “base state” to work from (which can shorten the time needed to complete training workflow 300). In other embodiments, the user/customer operating packet broker 206 may define and supply their own pre-trained or not-pre-trained machine learning model as part of block 302.
  • As mentioned previously, the machine learning model that is selected for training will generally be one that benefits from learning the specific traffic patterns and behaviors of core network 204, such as a time-series model that learns time-series data from the core network. There are a number of different machine learning algorithms and constructs that can be used for implementing a time-series model, such as a Long Short Term Memory (LSTM) neural network. In the specific case of a LSTM neural network, the network can learn the “normal” behavior of a given parameter x over time and, once trained, can output an expected (i.e., modeled) value for this parameter (x′) at n different time points ranging from t (i.e., the current point in time) to t+n. A block diagram of an example LSTM neural network 400 is shown in FIG. 4. Other types of machine learning algorithms/constructs can also be used for time-series based modeling and will be apparent to one of ordinary skill in the art.
  • Returning to FIG. 3, once the machine learning model is selected, module 218 can carry out a first training phase that involves (1) receiving, from a knowledge base comprising historical traffic logged from core network 204, traffic data regarding the core network parameter modeled by the selected machine learning model (block 304), and (2) training/updating the machine learning model based on the historical traffic data (block 306). For example, if the machine learning model is designed to model subscriber attach rate, module 218 can receive from the knowledge base traffic data indicating how subscriber attach rate changed over some prior period of time in core network 204 and can train the model accordingly. In this way, module 218 can “prime” the machine learning model using traffic data that packet broker 206 will likely receive from the actual, live version of core network 204, without having to insert packet broker 206 into the production environment yet. The volume of historical training data learned during this first training phase can differ depending on the nature of the machine learning model and/or core network 204, and can range from a few days' worth of data to weeks, months, or more.
  • Upon completion of the first training phase, packet broker 206 can be deployed at the actual, live (i.e., production) site of core network 204 (block 308). Then, at blocks 310 and 312, module 218 can carry out a second training phase that is similar to the first training phase, but trains the machine learning model using live traffic data replicated from core network 204 (rather than historical traffic data received from the knowledge base). In this way, module 218 can refine the machine learning model using real-time traffic data generated at the production site and thereby ensure that the model is as accurate and up-to-date as possible. Like the first training phase, the volume of data learned during this second training phase can vary depending on the nature of the machine learning model and/or core network 204.
  • Finally, at block 314, module 218 can store the trained machine learning model and mark it as being ready for use in detecting/predicting anomalies in core network 204. In some embodiments, module 218 may also return to block 310 and repeat the second training phase on a continuous or periodic basis in order to keep the machine learning model up-to-date with respect to the ongoing traffic patterns occurring in core network 204.
  • It should be appreciated that workflow 300 of FIG. 3 is illustrative and various modifications and enhancements are possible. For example, the specific manner and/or order in which the first and training phases are executed may differ on a case-by-case basis. In some cases, the first training phase (based on historical traffic data) may be omitted and module 218 may train the machine learning model solely using live traffic data from core network 204. In other cases, the second training phase may be omitted and module 218 may train the machine learning model solely using historical traffic data from the knowledge base. In yet other cases, both the first and training phases may be executed, but they may be performed concurrently, in a different order, or in an overlapping manner.
  • Further, although not explicitly shown, module 218 may repeat workflow 300 (or run multiple instances of workflow 300 concurrently) in order to train several different types of machine learning models and/or temporal variations of a single type of model. For example, it is possible that the pattern/behavior of a given core network parameter can change significantly on a day-to-day basis. In this scenario, module 218 may train seven different machine learning models that all relate to the same core network parameter, but apply to different days of the week (e.g., a Monday model variant, a Tuesday model variant, etc.). With this approach, module 218 can subsequently use the appropriate daily model for anomaly detection/prediction based on the current day of the week. One of ordinary skill in the art will recognize other variations, modifications, and alternatives.
  • 4. Anomaly Detection Workflow
  • Once anomaly detection/prediction module 218 has access to at least one trained machine learning model (either via training workflow 300 of FIG. 3 or a different pre-training process), module 218 can execute a workflow for performing real-time detection of anomalies in core network 204 using the trained model. FIG. 5 depicts a workflow 500 of this detection process according to embodiment. As noted previously, the trained machine learning model may be a time-series model (which models the value of a core network parameter over time), a protocol language model (which models valid protocol message exchanges and flows), or any other type of machine learning model that is usable for identifying deviations in the normal traffic patterns/behavior of core network 204.
  • Starting with blocks 502 and 504 of workflow 500, module 218 can, for a current time interval t, receive replicated traffic from core network 204 and can extract information from the replicated traffic that enables module 218 to determine the current actual value of a core network parameter or criterion modeled by the machine learning model. For example, if the machine learning model is a time-series model M1 configured to model the value of a core network parameter x, module 218 can extract information from the replicated traffic that enables module 218 to determine the actual value of x in core network 204 for the current time interval t (i.e., xt). Alternatively, if the machine learning model is a protocol language model M2 configured to model valid message exchanges for a given network protocol P, module 218 can extract information from the replicated traffic that enables module 218 to determine the specific message exchanges made using protocol P in the current time interval t.
  • At block 506, module 218 can use the machine learning model to determine, for the current time interval t, an expected (i.e., modeled) value for the same network parameter or criterion determined at block 504. For example, in the case of time-series model M1 above, module 218 can use M1 to output an expected value for parameter x at time t (i.e., x′t). Alternatively, in the case of protocol language model M2 above, module 218 can use M2 to output an expected message exchange or flow using protocol P at time t.
  • Once module 218 has determined the actual and expected values of the network parameter or criterion, module 218 can compare the two values and determine whether there is a discrepancy between the two values that exceeds a predefined threshold or reflects a critical inconsistency (block 508). For example, module 218 can determine whether x′t-xt exceeds a numerical threshold T, or whether the actual and expected message exchanges are substantially different/out of order/etc. (indicating that the actual message exchange may be invalid).
  • If the discrepancy between the two values does not exceed the threshold or does not reflect a critical inconsistency, module 218 can conclude that core network 204 is behaving normally (block 510). As a result, module 218 can wait for the start of the next time interval t+1 (block 512) and then return to block 502 in order to repeat the detection process at time t+1.
  • However, if the discrepancy between the two values does exceed the threshold or does reflect a critical inconsistency, module 218 can conclude that an anomaly with respect to the parameter/criterion has occurred (or is in the progress of occurring) in core network 204 (block 514). In this case, module 218 can execute one or more predefined actions that are associated with the model (block 516). For example, in one embodiment, module 218 can apply a filter that steers all replicated traffic from core network 204 that is deemed to be related to the anomaly (e.g., all traffic from a particular location or a particular host/subscriber) to one or more special analytic probes/tools 208 for storage and further analysis. In this way, module 218 can selectively forward only the traffic that is likely to be of interest for anomaly analysis purposes to those special probes/tools. As part of this steering step, in certain embodiments module 218 can also generate and send metadata information related to the steered traffic (in the form of, e.g., IPFix packets) to the special analytic probes/tools. This metadata information can include, e.g., where the traffic originated from, subscriber/session info, and other contextual cues which the probes/tools can use to facilitate their analysis of the anomalous traffic and help identify the root cause of the anomaly.
  • In other embodiments, module 218 can execute other actions in addition to (or in lieu of) the traffic steering described above, such as generating an alert for a network administrator, metering further traffic replicated from core network 204, and so on. The specific nature of these actions can be configurable by a user/administrator of packet broker 206.
  • Finally, once the predefined action(s) have been executed, module 218 can wait for the next time interval t+1 as mentioned previously (block 512) and subsequently return to block 502 in order to repeat the detection process at time t+1.
  • 5. Anomaly Prediction Workflow
  • In addition to real-time anomaly detection, module 218 of packet broker 206 can also perform real-time prediction of future anomalies in core network 204 via its trained machine learning model(s). FIG. 6 depicts a workflow 600 illustrating this prediction process according to an embodiment. Workflow 600 assumes that the machine learning model used for anomaly prediction is specifically a time-series model that tracks the value of a core network parameter x over time.
  • Starting with blocks 602 and 604, module 218 can, for a current time interval t, receive replicated traffic from core network 204, extract information from the replicated traffic that enables module 218 to determine the current value for core network parameter x (i.e., xt), and store xt in a local data store. Further, at block 606, module 218 can retrieve from the data store the last m values of parameter x (i.e., xt−1, xt−2, . . . xt−m).
  • At block 608, module 218 can fit the m values retrieved at block 606 to a linear regression model in order to extrapolate a value of core network parameter x at some future point in time t+n (i.e., xt+n). Module 218 can then compare the extrapolated value with a predefined threshold T (block 612). This predefined threshold can be different from the threshold discussed with respect to anomaly detection workflow 500.
  • If the extrapolated future value does not exceed the predefined threshold T, module 218 can conclude that there will be no future anomaly with respect to core network parameter x at time t+n (block 614). As a result, module 218 can wait for the start of the next time interval t+1 (block 616) and subsequently return to block 602 in order to repeat the prediction process at time t+1.
  • However, if the extrapolated future value does exceed threshold T, module 218 can conclude that an anomaly with respect to parameter x will occur at time t+n in core network 204 (block 618). In this case, module 218 can execute one or more predefined actions that are associated with the model (block 620), such as steering all replicated traffic from core network 204 that is deemed to be related to the anomaly to one or more special analytic probes/tools 208 for storage and further analysis. In this way, the special probes/tools can analyze and potentially implement steps to avoid the anomaly before it actually occurs. Module 218 also execute other actions at block 620 such as generating an administrator alert, dropping/metering the replicated traffic, and so on.
  • Finally, once the predefined action(s) have been executed, module 218 can wait for the next time interval t+1 as mentioned previously (block 616) and subsequently return to block 602 to repeat the prediction process at time t+1.
  • It should be appreciated that anomaly detection and prediction workflows 500 and 600 are illustrative and modifications and enhancements are possible. For example, module 218 may repeat or execute multiple instances of these workflows concurrently in order to detect and/or predict different types of anomalies in core network 204 via different machine learning models. Further, module 218 may execute workflow 500 simultaneously with workflow 600 in order to perform anomaly detection and prediction in parallel. One of ordinary skill in the art will recognize other variations, modifications, and alternatives.
  • 6. Automated Core Network Discovery
  • Beyond the anomaly detection and prediction techniques described in the foregoing sections, in certain embodiments packet broker 206 of FIG. 2 may also implement automated discovery of the topology and entities in core network 204. With this automated discovery feature, the configuration of packet broker 206 can be streamlined, since there is no need for an administrator to manually enter information into packet broker 206 regarding core network 204 (e.g., IP addresses, interfaces, etc.). Instead, this configuration can be determined automatically based on the discovered core network entities and topology. Further, this automated discovery feature can enable packet broker 206 to implement new types of traffic filters, such as a filter to steer traffic of a newly detected core network entity to a particular analytic probe/tool, or a filter to drop traffic from portions of core network 204 that are known to carry duplicate packets.
  • According to one set of embodiments, this feature can entail automatically discovering what network entities are deployed in core network 204, what the properties of those network entities are (e.g., IP addresses, etc.), and how the network entities are interconnected. Packet broker 206 can perform this discovery by, e.g., monitoring and analyzing the control and/or data traffic that is tapped from core network 204. The specific nature of the discovery process will differ depending on the type of the core network (e.g., a 3G network, an LTE network, etc.). Packet broker 206 can perform the discovery upon initialization, as well as on a continuous basis throughout its runtime (in order to detect newly added or removed entities).
  • Packet broker 206 can then use this core network information to facilitate its configuration as well as perform other functions. For example, in one embodiment packet broker 206 can automatically setup access control lists/filters based on the discovered network entities. This can include, e.g., default filters for forwarding traffic tapped from certain network entities to certain probes/tools, as well as filters for removing duplicate traffic, filters for forwarding traffic from newly added notes, and so on.
  • In another embodiment, packet broker 206 can group discovered network entities or zones in order to ease configuration management. This can help in steering traffic to corresponding zones to appropriate analytic probes/tools so that certain problems (such as duplicate packets) can be avoided.
  • In yet another embodiment, packet broker 206 can setup notifications/alerts when there are modifications in core network 204 (e.g., entities are added, removed, etc.). Packet broker 206 can then apply policies to update its configuration based on the core network modifications. This can be particularly useful if core network 204 is virtualized, since the configuration of the core network will likely change on a frequent basis in this scenario.
  • In yet another embodiment, packet broker 206 can provide the discovered network information to a tool (e.g., an SDN app running on an SDN controller) so that users can visualize the topology of core network 204. FIG. 7 depicts an example UI 700 that illustrates a visualization of a core network using such a tool according to an embodiment. In this tool, a user can view the entities and their connections/interfaces, and can filter the view based on types of entities (e.g., ENodeB, SGW, MME, PGW, HSS, AAA, etc.) and other criteria. A user can also view alerts/notifications pertaining to anomalies that are detected or predicted by packet broker 206 in accordance with the techniques described in the foregoing sections.
  • 7. Example Network Device
  • FIG. 8 depicts an example network device (e.g., switch and/or router) 800 in which certain embodiments of the present disclosure may be implemented. For example, in one set of embodiments, network device 800 may be used to implement packet broker 206 of FIG. 2 (either wholly or in part).
  • As shown, network device 800 includes a management module 802, a switch fabric module 804, and a number of I/O modules 806(1)-806(N). Management module 802 includes one or more management CPUs 808 for managing/controlling the operation of the device. Each management CPU 808 can be a general purpose processor, such as a PowerPC, Intel, AMD, or ARM-based processor, that operates under the control of software stored in an associated memory (not shown).
  • Switch fabric module 804 and I/O modules 806(1)-806(N) collectively represent the data, or forwarding, plane of network device 800. Switch fabric module 804 is configured to interconnect the various other modules of network device 800. Each I/O module 806(1)-806(N) can include one or more input/output ports 810(1)-810(N) that are used by network device 800 to send and receive data packets. Each I/O module 806(1)-806(N) can also include a packet processor 812(1)-812(N). Packet processor 812(1)-812(N) is a hardware processing component (e.g., an FPGA or ASIC) that can make wire speed decisions on how to handle incoming or outgoing data packets.
  • It should be appreciated that network device 800 is illustrative and many other configurations having more or fewer components than network device 800 are possible.
  • 8. Example Computer System
  • FIG. 9 depicts an example computer system 900 in which certain embodiments of the present disclosure may be implemented. For example, in one set of embodiments, computer system 900 may be used to implement packet broker 206 of FIG. 2 (either wholly or in part).
  • As shown in FIG. 9, computer system 900 includes one or more processors 902 that communicate with a number of peripheral devices via a bus subsystem 904. These peripheral devices include a storage subsystem 906 (comprising a memory subsystem 908 and a file storage subsystem 910), user interface input devices 912, user interface output devices 914, and a network interface subsystem 916.
  • Bus subsystem 904 can provide a mechanism for letting the various components and subsystems of computer system 900 communicate with each other as intended. Although bus subsystem 904 is shown schematically as a single bus, alternative embodiments of the bus subsystem can utilize multiple buses.
  • Network interface subsystem 916 can serve as an interface for communicating data between computer system 900 and other computing devices or networks. Embodiments of network interface subsystem 916 can include wired (e.g., coaxial, twisted pair, or fiber optic Ethernet) and/or wireless (e.g., Wi-Fi, cellular, Bluetooth, etc.) interfaces.
  • User interface input devices 912 can include a keyboard, pointing devices (e.g., mouse, trackball, touchpad, etc.), a scanner, a barcode scanner, a touch-screen incorporated into a display, audio input devices (e.g., voice recognition systems, microphones, etc.), and other types of input devices. In general, use of the term “input device” is intended to include all possible types of devices and mechanisms for inputting information into computer system 900.
  • User interface output devices 914 can include a display subsystem, a printer, a fax machine, or non-visual displays such as audio output devices, etc. The display subsystem can be a cathode ray tube (CRT), a flat-panel device such as a liquid crystal display (LCD), or a projection device. In general, use of the term “output device” is intended to include all possible types of devices and mechanisms for outputting information from computer system 900.
  • Storage subsystem 906 includes a memory subsystem 908 and a file/disk storage subsystem 910. Subsystems 908 and 910 represent non-transitory computer-readable storage media that can store program code and/or data that provide the functionality of various embodiments described herein.
  • Memory subsystem 908 includes a number of memories including a main random access memory (RAM) 918 for storage of instructions and data during program execution and a read-only memory (ROM) 920 in which fixed instructions are stored. File storage subsystem 910 can provide persistent (i.e., non-volatile) storage for program and data files and can include a magnetic or solid-state hard disk drive, an optical drive along with associated removable media (e.g., CD-ROM, DVD, Blu-Ray, etc.), a removable flash memory-based drive or card, and/or other types of storage media known in the art.
  • It should be appreciated that computer system 900 is illustrative and many other configurations having more or fewer components than computer system 900 are possible.
  • The above description illustrates various embodiments of the present invention along with examples of how aspects of the present invention may be implemented. The above examples and embodiments should not be deemed to be the only embodiments, and are presented to illustrate the flexibility and advantages of the present invention as defined by the following claims. For example, although certain embodiments have been described with respect to particular process flows and steps, it should be apparent to those skilled in the art that the scope of the present invention is not strictly limited to the described flows and steps. Steps described as sequential may be executed in parallel, order of steps may be varied, and steps may be modified, combined, added, or omitted. As another example, although certain embodiments have been described using a particular combination of hardware and software, it should be recognized that other combinations of hardware and software are possible, and that specific operations described as being implemented in software can also be implemented in hardware and vice versa.
  • The specification and drawings are, accordingly, to be regarded in an illustrative rather than restrictive sense. Other arrangements, embodiments, implementations and equivalents will be evident to those skilled in the art and may be employed without departing from the spirit and scope of the invention as set forth in the following claims.

Claims (20)

What is claimed is:
1. A method comprising:
applying, by a packet broker in a visibility network, one or more machine learning models to network traffic that is replicated from a core network;
detecting, by the packet broker based on the applying of the one or more machine learning models, that a network traffic anomaly has occurred or is occurring in the core network; and
in response to the detecting, taking, by the packet broker, one or more predefined actions.
2. The method of claim 1 wherein the one or more machine learning models include a time-series model adapted to model changes in value of a core network parameter over time.
3. The method of claim 1 wherein the one or more machine learning models include a protocol language model adapted to model valid message exchanges or flows with respect to a particular network protocol in the core network.
4. The method of claim 1 further comprising, prior to the applying:
training, by the packet broker, at least a first machine learning model in the one or more machine learning models using historical traffic data collected from the core network.
5. The method of claim 1 further comprising, prior to the applying:
training, by the packet broker, at least a first machine learning model in the one or more machine learning models using live traffic data replicated from the core network.
6. The method of claim 1 wherein the applying comprises:
determining, from the network traffic replicated from the core network, an actual value of a core network parameter or criterion that is modeled by one machine learning model in the one or more machine learning models; and
determining, using the machine learning model, an expected value of the core network parameter or criterion.
7. The method of claim 6 wherein the detecting comprises:
determining that a discrepancy exists between the actual value and the expected value that exceeds a predefined threshold or reflects an inconsistency.
8. The method of claim 1 wherein the one or more predefined actions include:
steering network traffic from the core network that is deemed to be related to the network traffic anomaly to one or more analytic probes or tools.
9. The method of claim 1 wherein the one or more predefined actions include:
generating an alert for a network administrator.
10. The method of claim 1 wherein the one or more predefined actions include:
metering network traffic from the core network that is deemed to be related to the network traffic anomaly.
11. The method of claim 1 further comprising:
predicting, by the packet broker based on the applying of the one or more machine learning models, that another network traffic anomaly will occur in the core network at a future point in time; and
in response to the predicting, taking, by the packet broker, one or more additional predefined actions.
12. The method of claim 11 wherein the predicting comprises:
retrieving a plurality of historical values of a core network parameter that is modeled by one machine learning model in the one or more machine learning models;
fitting the plurality of historical values to a linear regression model; and
extrapolating a value of the core network parameter at the future point in time.
13. The method of claim 12 wherein the predicting further comprises:
comparing the extrapolated value of the core network parameter at the future point in time with a predefined threshold.
14. The method of claim 1 further comprising:
automatically discovering, by the packet broker, information regarding the core network, the information including network entities in the core network and interconnections between the network entities; and
facilitating, by the packet broker, its configuration based on the discovered information
15. A non-transitory computer readable storage medium having stored thereon program code executable by a packet broker in a visibility network, the program code causing the packet broker to:
apply one or more machine learning models to network traffic that is replicated from a core network;
detect, based on the applying of the one or more machine learning models, that a network traffic anomaly has occurred or is occurring in the core network; and
in response to the detecting, take one or more predefined actions.
16. The non-transitory computer readable storage medium of claim 15 wherein the one or more predefined actions include:
steering network traffic from the core network that is deemed to be related to the network traffic anomaly to one or more analytic probes or tools.
17. The non-transitory computer readable storage medium of claim 15 wherein the program code further causes the packet broker to:
predict, based on the applying of the one or more machine learning models, that another network traffic anomaly will occur in the core network at a future point in time; and
in response to the predicting, take one or more additional predefined actions.
18. A packet broker comprising:
a processor; and
a non-transitory computer readable medium having stored thereon program code that, when executed by the processor, causes the processor to:
apply one or more machine learning models to network traffic that is replicated from a core network;
detect, based on the applying of the one or more machine learning models, that a network traffic anomaly has occurred or is occurring in the core network; and
in response to the detecting, take one or more predefined actions.
19. The packet broker of claim 18 wherein the one or more predefined actions include:
steering network traffic from the core network that is deemed to be related to the network traffic anomaly to one or more analytic probes or tools.
20. The packet broker of claim 18 wherein the program code further causes the processor to:
predict, based on the applying of the one or more machine learning models, that another network traffic anomaly will occur in the core network at a future point in time; and
in response to the predicting, take one or more additional predefined actions.
US15/466,732 2016-05-17 2017-03-22 Anomaly detection and prediction in a packet broker Abandoned US20170339022A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP17799821.8A EP3459209A4 (en) 2016-05-17 2017-04-04 Anomaly detection and prediction in a packet broker
CN201780039948.XA CN109417495A (en) 2016-05-17 2017-04-04 Abnormality detection and prediction in grouping agency
PCT/US2017/025998 WO2017200651A1 (en) 2016-05-17 2017-04-04 Anomaly detection and prediction in a packet broker

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN201641016960 2016-05-17
IN201641016960 2016-05-17

Publications (1)

Publication Number Publication Date
US20170339022A1 true US20170339022A1 (en) 2017-11-23

Family

ID=60331037

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/466,732 Abandoned US20170339022A1 (en) 2016-05-17 2017-03-22 Anomaly detection and prediction in a packet broker

Country Status (3)

Country Link
US (1) US20170339022A1 (en)
EP (1) EP3459209A4 (en)
CN (1) CN109417495A (en)

Cited By (88)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234496A (en) * 2018-01-05 2018-06-29 宝牧科技(天津)有限公司 A kind of method for predicting based on neural network
CN108510741A (en) * 2018-05-24 2018-09-07 浙江工业大学 A kind of traffic flow forecasting method based on Conv1D-LSTM neural network structures
CN108768750A (en) * 2018-06-22 2018-11-06 广东电网有限责任公司 communication network fault positioning method and device
EP3496015A1 (en) * 2017-12-07 2019-06-12 Accenture Global Solutions Limited Data transformation of performance statistics and ticket information for network devices for use in machine learning models
CN109948471A (en) * 2019-03-04 2019-06-28 南京邮电大学 Traffic haze visibility detection method based on improved InceptionV4 network
US20190281078A1 (en) * 2018-03-08 2019-09-12 Cisco Technology, Inc. Predicting and mitigating layer-2 anomalies and instabilities
EP3541016A1 (en) * 2018-03-12 2019-09-18 Adtran, Inc. Telecommunications network troubleshooting systems
US20190324431A1 (en) * 2017-08-02 2019-10-24 Strong Force Iot Portfolio 2016, Llc Data collection systems and methods with alternate routing of input channels
US20190349287A1 (en) * 2018-05-10 2019-11-14 Dell Products L. P. System and method to learn and prescribe optimal network path for sdn
US20200019613A1 (en) * 2018-01-10 2020-01-16 International Business Machines Corporation Machine Learning Model Modification and Natural Language Processing
JP2020017952A (en) * 2018-07-24 2020-01-30 バイドゥ オンライン ネットワーク テクノロジー (ベイジン) カンパニー リミテッド Method and device for warning
US10750387B2 (en) 2015-03-23 2020-08-18 Extreme Networks, Inc. Configuration of rules in a network visibility system
US10754334B2 (en) 2016-05-09 2020-08-25 Strong Force Iot Portfolio 2016, Llc Methods and systems for industrial internet of things data collection for process adjustment in an upstream oil and gas environment
US10771475B2 (en) 2015-03-23 2020-09-08 Extreme Networks, Inc. Techniques for exchanging control and configuration information in a network visibility system
WO2020202857A1 (en) * 2019-03-29 2020-10-08 Mitsubishi Electric Corporation Predictive classification of future operations
WO2020219685A1 (en) * 2019-04-23 2020-10-29 Sciencelogic, Inc. Distributed learning anomaly detector
US10868829B2 (en) 2018-10-10 2020-12-15 Northrop Grumman Systems Corporation Predicted network traffic
US10903985B2 (en) 2017-08-25 2021-01-26 Keysight Technologies Singapore (Sales) Pte. Ltd. Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques
US10911353B2 (en) 2015-06-17 2021-02-02 Extreme Networks, Inc. Architecture for a network visibility system
US10949542B2 (en) * 2018-11-25 2021-03-16 International Business Machines Corporation Self-evolved adjustment framework for cloud-based large system based on machine learning
US10951461B2 (en) 2019-01-31 2021-03-16 Hewlett Packard Enterprise Development Lp Anomaly-driven packet capture and spectrum capture in an access point
CN112585926A (en) * 2018-08-23 2021-03-30 摩根士丹利服务集团有限公司 Distributed system component failure identification
US10977574B2 (en) * 2017-02-14 2021-04-13 Cisco Technology, Inc. Prediction of network device control plane instabilities
EP3806396A1 (en) * 2019-10-11 2021-04-14 Juniper Networks, Inc. Employing machine learning to predict and dynamically tune static configuration parameters
US10983507B2 (en) 2016-05-09 2021-04-20 Strong Force Iot Portfolio 2016, Llc Method for data collection and frequency analysis with self-organization functionality
US10992652B2 (en) 2017-08-25 2021-04-27 Keysight Technologies Singapore (Sales) Pte. Ltd. Methods, systems, and computer readable media for monitoring encrypted network traffic flows
US20210126931A1 (en) * 2019-10-25 2021-04-29 Cognizant Technology Solutions India Pvt. Ltd System and a method for detecting anomalous patterns in a network
US20210203606A1 (en) * 2019-12-31 2021-07-01 Opanga Networks, Inc. Data transport network protocol based on real time transport network congestion conditions
US11128551B2 (en) * 2017-09-28 2021-09-21 Siemens Mobility GmbH Method and apparatus for immediate and reaction-free transmission of log messages
US11153175B2 (en) * 2017-10-16 2021-10-19 International Business Machines Corporation Latency management by edge analytics in industrial production environments
US11190417B2 (en) * 2020-02-04 2021-11-30 Keysight Technologies, Inc. Methods, systems, and computer readable media for processing network flow metadata at a network packet broker
US11199835B2 (en) 2016-05-09 2021-12-14 Strong Force Iot Portfolio 2016, Llc Method and system of a noise pattern data marketplace in an industrial environment
US11201807B2 (en) * 2018-04-24 2021-12-14 Nippon Telegraph And Telephone Corporation Traffic estimation apparatus, traffic estimation method and program
US11199837B2 (en) 2017-08-02 2021-12-14 Strong Force Iot Portfolio 2016, Llc Data monitoring systems and methods to update input channel routing in response to an alarm state
US11218879B2 (en) 2018-12-05 2022-01-04 At&T Intellectual Property I, L.P. Providing security through characterizing internet protocol traffic to detect outliers
US11237546B2 (en) 2016-06-15 2022-02-01 Strong Force loT Portfolio 2016, LLC Method and system of modifying a data collection trajectory for vehicles
US20220060492A1 (en) * 2018-12-03 2022-02-24 British Telecommunications Public Limited Company Detecting anomalies in computer networks
US20220095164A1 (en) * 2019-06-06 2022-03-24 Huawei Technologies Co., Ltd. Traffic volume prediction method and apparatus
US11310117B2 (en) * 2020-06-24 2022-04-19 Red Hat, Inc. Pairing of a probe entity with another entity in a cloud computing environment
KR20220071843A (en) * 2020-11-24 2022-05-31 고려대학교 산학협력단 Generative adversarial network model and training method to generate message id sequence on unmanned moving objects
US20220239596A1 (en) * 2021-01-28 2022-07-28 Vmware, Inc. Dynamic sd-wan hub cluster scaling with machine learning
US20220413481A1 (en) * 2021-06-28 2022-12-29 Oracle International Corporation Geometric aging data reduction for machine learning applications
US20220417770A1 (en) * 2021-01-08 2022-12-29 Verizon Patent And Licensing Inc. Systems and methods for determining baselines for network parameters used to configure base stations
US11552872B2 (en) * 2020-11-23 2023-01-10 Verizon Patent And Licensing Inc. Systems and methods for automated remote network performance monitoring
US20230029794A1 (en) * 2020-01-07 2023-02-02 Microsoft Technology Licensing, Llc Customized anomaly detection
US11588835B2 (en) 2021-05-18 2023-02-21 Bank Of America Corporation Dynamic network security monitoring system
US20230107011A1 (en) * 2021-10-04 2023-04-06 Mellanox Technologies, Ltd. Digital simulator of data communication apparatus
US11716313B2 (en) 2018-08-10 2023-08-01 Keysight Technologies, Inc. Methods, systems, and computer readable media for implementing bandwidth limitations on specific application traffic at a proxy element
US20230269143A1 (en) * 2022-02-22 2023-08-24 Ciena Corporation Switching among multiple machine learning models during training and inference
US11774944B2 (en) 2016-05-09 2023-10-03 Strong Force Iot Portfolio 2016, Llc Methods and systems for the industrial internet of things
US11792213B2 (en) 2021-05-18 2023-10-17 Bank Of America Corporation Temporal-based anomaly detection for network security
US11792127B2 (en) 2021-01-18 2023-10-17 Vmware, Inc. Network-aware load balancing
CN116896469A (en) * 2023-07-18 2023-10-17 哈尔滨工业大学 Encryption agent application identification method based on Burst sequence
US11799879B2 (en) 2021-05-18 2023-10-24 Bank Of America Corporation Real-time anomaly detection for network security
US11804988B2 (en) 2013-07-10 2023-10-31 Nicira, Inc. Method and system of overlay flow control
US11831414B2 (en) 2019-08-27 2023-11-28 Vmware, Inc. Providing recommendations for implementing virtual networks
US11855805B2 (en) 2017-10-02 2023-12-26 Vmware, Inc. Deploying firewall for virtual network defined over public cloud infrastructure
US11895194B2 (en) 2017-10-02 2024-02-06 VMware LLC Layer four optimization for a virtual network defined over public cloud
US11894949B2 (en) 2017-10-02 2024-02-06 VMware LLC Identifying multiple nodes in a virtual network defined over a set of public clouds to connect to an external SaaS provider
US11902086B2 (en) 2017-11-09 2024-02-13 Nicira, Inc. Method and system of a dynamic high-availability mode based on current wide area network connectivity
US11909815B2 (en) 2022-06-06 2024-02-20 VMware LLC Routing based on geolocation costs
US11929903B2 (en) 2020-12-29 2024-03-12 VMware LLC Emulating packet flows to assess network links for SD-WAN
US11943146B2 (en) 2021-10-01 2024-03-26 VMware LLC Traffic prioritization in SD-WAN
US11949570B2 (en) * 2021-07-30 2024-04-02 Keysight Technologies, Inc. Methods, systems, and computer readable media for utilizing machine learning to automatically configure filters at a network packet broker
US11960610B2 (en) 2018-12-03 2024-04-16 British Telecommunications Public Limited Company Detecting vulnerability change in software systems
US11989307B2 (en) 2018-12-03 2024-05-21 British Telecommunications Public Company Limited Detecting vulnerable software systems
US11989289B2 (en) 2018-12-03 2024-05-21 British Telecommunications Public Limited Company Remediating software vulnerabilities
US12009987B2 (en) 2021-05-03 2024-06-11 VMware LLC Methods to support dynamic transit paths through hub clustering across branches in SD-WAN
US12015536B2 (en) 2021-06-18 2024-06-18 VMware LLC Method and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics of types of resource elements in the public clouds
US12034587B1 (en) 2023-03-27 2024-07-09 VMware LLC Identifying and remediating anomalies in a self-healing network
US12034630B2 (en) 2017-01-31 2024-07-09 VMware LLC Method and apparatus for distributed data network traffic optimization
US12041479B2 (en) 2020-01-24 2024-07-16 VMware LLC Accurate traffic steering between links through sub-path path quality metrics
US12047244B2 (en) 2017-02-11 2024-07-23 Nicira, Inc. Method and system of connecting to a multipath hub in a cluster
US12047282B2 (en) 2021-07-22 2024-07-23 VMware LLC Methods for smart bandwidth aggregation based dynamic overlay selection among preferred exits in SD-WAN
US12058030B2 (en) 2017-01-31 2024-08-06 VMware LLC High performance software-defined core network
US12057993B1 (en) 2023-03-27 2024-08-06 VMware LLC Identifying and remediating anomalies in a self-healing network
WO2024228021A1 (en) * 2023-05-02 2024-11-07 Net Ai Tech Ltd Methods of training an artificial intelligence model for operational anomaly prediction in a communications network, and systems
US12160408B2 (en) 2015-04-13 2024-12-03 Nicira, Inc. Method and system of establishing a virtual private network in a cloud service for branch networking
US12166661B2 (en) 2022-07-18 2024-12-10 VMware LLC DNS-based GSLB-aware SD-WAN for low latency SaaS applications
US12177130B2 (en) 2019-12-12 2024-12-24 VMware LLC Performing deep packet inspection in a software defined wide area network
US12184557B2 (en) 2022-01-04 2024-12-31 VMware LLC Explicit congestion notification in a virtual environment
US12218800B2 (en) 2021-05-06 2025-02-04 VMware LLC Methods for application defined virtual network service among multiple transport in sd-wan
US12218845B2 (en) 2021-01-18 2025-02-04 VMware LLC Network-aware load balancing
US12237990B2 (en) 2022-07-20 2025-02-25 VMware LLC Method for modifying an SD-WAN using metric-based heat maps
US12250114B2 (en) 2021-06-18 2025-03-11 VMware LLC Method and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics of sub-types of resource elements in the public clouds
US12255794B2 (en) 2022-03-15 2025-03-18 Keysight Technologies, Inc. Methods, systems, and computer readable media for selectively processing a packet flow using a flow inspection engine
US12261777B2 (en) 2023-08-16 2025-03-25 VMware LLC Forwarding packets in multi-regional large scale deployments with distributed gateways
US12267364B2 (en) 2021-07-24 2025-04-01 VMware LLC Network management services in a virtual network

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113994641B (en) * 2019-06-25 2024-11-01 马维尔亚洲私人有限公司 Automobile network switch with anomaly detection
CN110601916A (en) * 2019-08-14 2019-12-20 天津大学 Flow sampling and application sensing system based on machine learning

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140351414A1 (en) * 2013-05-24 2014-11-27 Alcatel Lucent Systems And Methods For Providing Prediction-Based Dynamic Monitoring
US20150113132A1 (en) * 2013-10-21 2015-04-23 Nyansa, Inc. System and method for observing and controlling a programmable network using a remote network manager

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101188531B (en) * 2007-12-27 2010-04-07 东软集团股份有限公司 A method and system for monitoring network traffic exception
FI20096394A0 (en) * 2009-12-23 2009-12-23 Valtion Teknillinen DETECTING DETECTION IN COMMUNICATIONS NETWORKS
US9774522B2 (en) * 2014-01-06 2017-09-26 Cisco Technology, Inc. Triggering reroutes using early learning machine-based prediction of failures
US9503467B2 (en) * 2014-05-22 2016-11-22 Accenture Global Services Limited Network anomaly detection
US9497215B2 (en) * 2014-07-23 2016-11-15 Cisco Technology, Inc. Stealth mitigation for simulating the success of an attack

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140351414A1 (en) * 2013-05-24 2014-11-27 Alcatel Lucent Systems And Methods For Providing Prediction-Based Dynamic Monitoring
US20150113132A1 (en) * 2013-10-21 2015-04-23 Nyansa, Inc. System and method for observing and controlling a programmable network using a remote network manager

Cited By (214)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11804988B2 (en) 2013-07-10 2023-10-31 Nicira, Inc. Method and system of overlay flow control
US10750387B2 (en) 2015-03-23 2020-08-18 Extreme Networks, Inc. Configuration of rules in a network visibility system
US10771475B2 (en) 2015-03-23 2020-09-08 Extreme Networks, Inc. Techniques for exchanging control and configuration information in a network visibility system
US12160408B2 (en) 2015-04-13 2024-12-03 Nicira, Inc. Method and system of establishing a virtual private network in a cloud service for branch networking
US10911353B2 (en) 2015-06-17 2021-02-02 Extreme Networks, Inc. Architecture for a network visibility system
US11366455B2 (en) 2016-05-09 2022-06-21 Strong Force Iot Portfolio 2016, Llc Methods and systems for optimization of data collection and storage using 3rd party data from a data marketplace in an industrial internet of things environment
US11334063B2 (en) 2016-05-09 2022-05-17 Strong Force Iot Portfolio 2016, Llc Systems and methods for policy automation for a data collection system
US11372394B2 (en) 2016-05-09 2022-06-28 Strong Force Iot Portfolio 2016, Llc Methods and systems for detection in an industrial internet of things data collection environment with self-organizing expert system detection for complex industrial, chemical process
US12282837B2 (en) 2016-05-09 2025-04-22 Strong Force Iot Portfolio 2016, Llc Systems and methods for processing data collected in an industrial environment using neural networks
US12259711B2 (en) 2016-05-09 2025-03-25 Strong Force Iot Portfolio 2016, Llc Methods and systems for the industrial internet of things
US12244359B2 (en) 2016-05-09 2025-03-04 Strong Force Iot Portfolio 2016, Llc Systems and methods for monitoring pumps and fans
US12237873B2 (en) 2016-05-09 2025-02-25 Strong Force Iot Portfolio 2016, Llc Systems and methods for balancing remote oil and gas equipment
US12191926B2 (en) 2016-05-09 2025-01-07 Strong Force Iot Portfolio 2016, Llc Methods and systems for detection in an industrial internet of things data collection environment with noise detection and system response for vibrating components
US12140930B2 (en) 2016-05-09 2024-11-12 Strong Force Iot Portfolio 2016, Llc Method for determining service event of machine from sensor data
US12099911B2 (en) 2016-05-09 2024-09-24 Strong Force loT Portfolio 2016, LLC Systems and methods for learning data patterns predictive of an outcome
US10754334B2 (en) 2016-05-09 2020-08-25 Strong Force Iot Portfolio 2016, Llc Methods and systems for industrial internet of things data collection for process adjustment in an upstream oil and gas environment
US12079701B2 (en) 2016-05-09 2024-09-03 Strong Force Iot Portfolio 2016, Llc System, methods and apparatus for modifying a data collection trajectory for conveyors
US12039426B2 (en) 2016-05-09 2024-07-16 Strong Force Iot Portfolio 2016, Llc Methods for self-organizing data collection, distribution and storage in a distribution environment
US11996900B2 (en) 2016-05-09 2024-05-28 Strong Force Iot Portfolio 2016, Llc Systems and methods for processing data collected in an industrial environment using neural networks
US11836571B2 (en) 2016-05-09 2023-12-05 Strong Force Iot Portfolio 2016, Llc Systems and methods for enabling user selection of components for data collection in an industrial environment
US11838036B2 (en) 2016-05-09 2023-12-05 Strong Force Iot Portfolio 2016, Llc Methods and systems for detection in an industrial internet of things data collection environment
US11797821B2 (en) 2016-05-09 2023-10-24 Strong Force Iot Portfolio 2016, Llc System, methods and apparatus for modifying a data collection trajectory for centrifuges
US11791914B2 (en) 2016-05-09 2023-10-17 Strong Force Iot Portfolio 2016, Llc Methods and systems for detection in an industrial Internet of Things data collection environment with a self-organizing data marketplace and notifications for industrial processes
US11774944B2 (en) 2016-05-09 2023-10-03 Strong Force Iot Portfolio 2016, Llc Methods and systems for the industrial internet of things
US10866584B2 (en) 2016-05-09 2020-12-15 Strong Force Iot Portfolio 2016, Llc Methods and systems for data processing in an industrial internet of things data collection environment with large data sets
US11770196B2 (en) 2016-05-09 2023-09-26 Strong Force TX Portfolio 2018, LLC Systems and methods for removing background noise in an industrial pump environment
US11755878B2 (en) 2016-05-09 2023-09-12 Strong Force Iot Portfolio 2016, Llc Methods and systems of diagnosing machine components using analog sensor data and neural network
US11728910B2 (en) 2016-05-09 2023-08-15 Strong Force Iot Portfolio 2016, Llc Methods and systems for detection in an industrial internet of things data collection environment with expert systems to predict failures and system state for slow rotating components
US11663442B2 (en) 2016-05-09 2023-05-30 Strong Force Iot Portfolio 2016, Llc Methods and systems for detection in an industrial Internet of Things data collection environment with intelligent data management for industrial processes including sensors
US11646808B2 (en) 2016-05-09 2023-05-09 Strong Force Iot Portfolio 2016, Llc Methods and systems for adaption of data storage and communication in an internet of things downstream oil and gas environment
US11609553B2 (en) 2016-05-09 2023-03-21 Strong Force Iot Portfolio 2016, Llc Systems and methods for data collection and frequency evaluation for pumps and fans
US11609552B2 (en) 2016-05-09 2023-03-21 Strong Force Iot Portfolio 2016, Llc Method and system for adjusting an operating parameter on a production line
US11586188B2 (en) 2016-05-09 2023-02-21 Strong Force Iot Portfolio 2016, Llc Methods and systems for a data marketplace for high volume industrial processes
US11586181B2 (en) 2016-05-09 2023-02-21 Strong Force Iot Portfolio 2016, Llc Systems and methods for adjusting process parameters in a production environment
US11573557B2 (en) 2016-05-09 2023-02-07 Strong Force Iot Portfolio 2016, Llc Methods and systems of industrial processes with self organizing data collectors and neural networks
US10983514B2 (en) 2016-05-09 2021-04-20 Strong Force Iot Portfolio 2016, Llc Methods and systems for equipment monitoring in an Internet of Things mining environment
US10983507B2 (en) 2016-05-09 2021-04-20 Strong Force Iot Portfolio 2016, Llc Method for data collection and frequency analysis with self-organization functionality
US11573558B2 (en) 2016-05-09 2023-02-07 Strong Force Iot Portfolio 2016, Llc Methods and systems for sensor fusion in a production line environment
US11507075B2 (en) 2016-05-09 2022-11-22 Strong Force Iot Portfolio 2016, Llc Method and system of a noise pattern data marketplace for a power station
US11003179B2 (en) 2016-05-09 2021-05-11 Strong Force Iot Portfolio 2016, Llc Methods and systems for a data marketplace in an industrial internet of things environment
US11009865B2 (en) 2016-05-09 2021-05-18 Strong Force Iot Portfolio 2016, Llc Methods and systems for a noise pattern data marketplace in an industrial internet of things environment
US11029680B2 (en) 2016-05-09 2021-06-08 Strong Force Iot Portfolio 2016, Llc Methods and systems for detection in an industrial internet of things data collection environment with frequency band adjustments for diagnosing oil and gas production equipment
US11507064B2 (en) 2016-05-09 2022-11-22 Strong Force Iot Portfolio 2016, Llc Methods and systems for industrial internet of things data collection in downstream oil and gas environment
US11048248B2 (en) 2016-05-09 2021-06-29 Strong Force Iot Portfolio 2016, Llc Methods and systems for industrial internet of things data collection in a network sensitive mining environment
US11493903B2 (en) 2016-05-09 2022-11-08 Strong Force Iot Portfolio 2016, Llc Methods and systems for a data marketplace in a conveyor environment
US11415978B2 (en) 2016-05-09 2022-08-16 Strong Force Iot Portfolio 2016, Llc Systems and methods for enabling user selection of components for data collection in an industrial environment
US11378938B2 (en) 2016-05-09 2022-07-05 Strong Force Iot Portfolio 2016, Llc System, method, and apparatus for changing a sensed parameter group for a pump or fan
US11409266B2 (en) 2016-05-09 2022-08-09 Strong Force Iot Portfolio 2016, Llc System, method, and apparatus for changing a sensed parameter group for a motor
US11073826B2 (en) 2016-05-09 2021-07-27 Strong Force Iot Portfolio 2016, Llc Systems and methods for data collection providing a haptic user interface
US11086311B2 (en) 2016-05-09 2021-08-10 Strong Force Iot Portfolio 2016, Llc Systems and methods for data collection having intelligent data collection bands
US11092955B2 (en) 2016-05-09 2021-08-17 Strong Force Iot Portfolio 2016, Llc Systems and methods for data collection utilizing relative phase detection
US11106199B2 (en) 2016-05-09 2021-08-31 Strong Force Iot Portfolio 2016, Llc Systems, methods and apparatus for providing a reduced dimensionality view of data collected on a self-organizing network
US11112784B2 (en) 2016-05-09 2021-09-07 Strong Force Iot Portfolio 2016, Llc Methods and systems for communications in an industrial internet of things data collection environment with large data sets
US11112785B2 (en) 2016-05-09 2021-09-07 Strong Force Iot Portfolio 2016, Llc Systems and methods for data collection and signal conditioning in an industrial environment
US11119473B2 (en) 2016-05-09 2021-09-14 Strong Force Iot Portfolio 2016, Llc Systems and methods for data collection and processing with IP front-end signal conditioning
US11402826B2 (en) 2016-05-09 2022-08-02 Strong Force Iot Portfolio 2016, Llc Methods and systems of industrial production line with self organizing data collectors and neural networks
US11397421B2 (en) 2016-05-09 2022-07-26 Strong Force Iot Portfolio 2016, Llc Systems, devices and methods for bearing analysis in an industrial environment
US11126171B2 (en) 2016-05-09 2021-09-21 Strong Force Iot Portfolio 2016, Llc Methods and systems of diagnosing machine components using neural networks and having bandwidth allocation
US11397422B2 (en) 2016-05-09 2022-07-26 Strong Force Iot Portfolio 2016, Llc System, method, and apparatus for changing a sensed parameter group for a mixer or agitator
US11137752B2 (en) 2016-05-09 2021-10-05 Strong Force loT Portfolio 2016, LLC Systems, methods and apparatus for data collection and storage according to a data storage profile
US11392116B2 (en) 2016-05-09 2022-07-19 Strong Force Iot Portfolio 2016, Llc Systems and methods for self-organizing data collection based on production environment parameter
US11392111B2 (en) 2016-05-09 2022-07-19 Strong Force Iot Portfolio 2016, Llc Methods and systems for intelligent data collection for a production line
US11156998B2 (en) 2016-05-09 2021-10-26 Strong Force Iot Portfolio 2016, Llc Methods and systems for process adjustments in an internet of things chemical production process
US11169511B2 (en) 2016-05-09 2021-11-09 Strong Force Iot Portfolio 2016, Llc Methods and systems for network-sensitive data collection and intelligent process adjustment in an industrial environment
US11392109B2 (en) 2016-05-09 2022-07-19 Strong Force Iot Portfolio 2016, Llc Methods and systems for data collection in an industrial refining environment with haptic feedback and data storage control
US11181893B2 (en) 2016-05-09 2021-11-23 Strong Force Iot Portfolio 2016, Llc Systems and methods for data communication over a plurality of data paths
US11385623B2 (en) 2016-05-09 2022-07-12 Strong Force Iot Portfolio 2016, Llc Systems and methods of data collection and analysis of data from a plurality of monitoring devices
US11194319B2 (en) 2016-05-09 2021-12-07 Strong Force Iot Portfolio 2016, Llc Systems and methods for data collection in a vehicle steering system utilizing relative phase detection
US11194318B2 (en) 2016-05-09 2021-12-07 Strong Force Iot Portfolio 2016, Llc Systems and methods utilizing noise analysis to determine conveyor performance
US11054817B2 (en) 2016-05-09 2021-07-06 Strong Force Iot Portfolio 2016, Llc Methods and systems for data collection and intelligent process adjustment in an industrial environment
US11199835B2 (en) 2016-05-09 2021-12-14 Strong Force Iot Portfolio 2016, Llc Method and system of a noise pattern data marketplace in an industrial environment
US11372395B2 (en) 2016-05-09 2022-06-28 Strong Force Iot Portfolio 2016, Llc Methods and systems for detection in an industrial Internet of Things data collection environment with expert systems diagnostics for vibrating components
US11366456B2 (en) 2016-05-09 2022-06-21 Strong Force Iot Portfolio 2016, Llc Methods and systems for detection in an industrial internet of things data collection environment with intelligent data management for industrial processes including analog sensors
US11360459B2 (en) 2016-05-09 2022-06-14 Strong Force Iot Portfolio 2016, Llc Method and system for adjusting an operating parameter in a marginal network
US11353852B2 (en) 2016-05-09 2022-06-07 Strong Force Iot Portfolio 2016, Llc Method and system of modifying a data collection trajectory for pumps and fans
US11353851B2 (en) 2016-05-09 2022-06-07 Strong Force Iot Portfolio 2016, Llc Systems and methods of data collection monitoring utilizing a peak detection circuit
US11353850B2 (en) 2016-05-09 2022-06-07 Strong Force Iot Portfolio 2016, Llc Systems and methods for data collection and signal evaluation to determine sensor status
US11215980B2 (en) 2016-05-09 2022-01-04 Strong Force Iot Portfolio 2016, Llc Systems and methods utilizing routing schemes to optimize data collection
US11221613B2 (en) 2016-05-09 2022-01-11 Strong Force Iot Portfolio 2016, Llc Methods and systems for noise detection and removal in a motor
US11347206B2 (en) 2016-05-09 2022-05-31 Strong Force Iot Portfolio 2016, Llc Methods and systems for data collection in a chemical or pharmaceutical production process with haptic feedback and control of data communication
US11347205B2 (en) 2016-05-09 2022-05-31 Strong Force Iot Portfolio 2016, Llc Methods and systems for network-sensitive data collection and process assessment in an industrial environment
US11243522B2 (en) 2016-05-09 2022-02-08 Strong Force Iot Portfolio 2016, Llc Methods and systems for detection in an industrial Internet of Things data collection environment with intelligent data collection and equipment package adjustment for a production line
US11243528B2 (en) 2016-05-09 2022-02-08 Strong Force Iot Portfolio 2016, Llc Systems and methods for data collection utilizing adaptive scheduling of a multiplexer
US11243521B2 (en) 2016-05-09 2022-02-08 Strong Force Iot Portfolio 2016, Llc Methods and systems for data collection in an industrial environment with haptic feedback and data communication and bandwidth control
US11256242B2 (en) 2016-05-09 2022-02-22 Strong Force Iot Portfolio 2016, Llc Methods and systems of chemical or pharmaceutical production line with self organizing data collectors and neural networks
US11256243B2 (en) 2016-05-09 2022-02-22 Strong Force loT Portfolio 2016, LLC Methods and systems for detection in an industrial Internet of Things data collection environment with intelligent data collection and equipment package adjustment for fluid conveyance equipment
US11347215B2 (en) 2016-05-09 2022-05-31 Strong Force Iot Portfolio 2016, Llc Methods and systems for detection in an industrial internet of things data collection environment with intelligent management of data selection in high data volume data streams
US11262737B2 (en) 2016-05-09 2022-03-01 Strong Force Iot Portfolio 2016, Llc Systems and methods for monitoring a vehicle steering system
US11269318B2 (en) 2016-05-09 2022-03-08 Strong Force Iot Portfolio 2016, Llc Systems, apparatus and methods for data collection utilizing an adaptively controlled analog crosspoint switch
US11269319B2 (en) 2016-05-09 2022-03-08 Strong Force Iot Portfolio 2016, Llc Methods for determining candidate sources of data collection
US11281202B2 (en) 2016-05-09 2022-03-22 Strong Force Iot Portfolio 2016, Llc Method and system of modifying a data collection trajectory for bearings
US11340589B2 (en) 2016-05-09 2022-05-24 Strong Force Iot Portfolio 2016, Llc Methods and systems for detection in an industrial Internet of Things data collection environment with expert systems diagnostics and process adjustments for vibrating components
US11385622B2 (en) 2016-05-09 2022-07-12 Strong Force Iot Portfolio 2016, Llc Systems and methods for characterizing an industrial system
US11307565B2 (en) 2016-05-09 2022-04-19 Strong Force Iot Portfolio 2016, Llc Method and system of a noise pattern data marketplace for motors
US11327475B2 (en) 2016-05-09 2022-05-10 Strong Force Iot Portfolio 2016, Llc Methods and systems for intelligent collection and analysis of vehicle data
US11237546B2 (en) 2016-06-15 2022-02-01 Strong Force loT Portfolio 2016, LLC Method and system of modifying a data collection trajectory for vehicles
US12058030B2 (en) 2017-01-31 2024-08-06 VMware LLC High performance software-defined core network
US12034630B2 (en) 2017-01-31 2024-07-09 VMware LLC Method and apparatus for distributed data network traffic optimization
US12047244B2 (en) 2017-02-11 2024-07-23 Nicira, Inc. Method and system of connecting to a multipath hub in a cluster
US10977574B2 (en) * 2017-02-14 2021-04-13 Cisco Technology, Inc. Prediction of network device control plane instabilities
US10795350B2 (en) 2017-08-02 2020-10-06 Strong Force Iot Portfolio 2016, Llc Systems and methods for data collection including pattern recognition
US20190324431A1 (en) * 2017-08-02 2019-10-24 Strong Force Iot Portfolio 2016, Llc Data collection systems and methods with alternate routing of input channels
US10824140B2 (en) 2017-08-02 2020-11-03 Strong Force Iot Portfolio 2016, Llc Systems and methods for network-sensitive data collection
US11067976B2 (en) 2017-08-02 2021-07-20 Strong Force Iot Portfolio 2016, Llc Data collection systems having a self-sufficient data acquisition box
US10908602B2 (en) 2017-08-02 2021-02-02 Strong Force Iot Portfolio 2016, Llc Systems and methods for network-sensitive data collection
US11209813B2 (en) 2017-08-02 2021-12-28 Strong Force Iot Portfolio 2016, Llc Data monitoring systems and methods to update input channel routing in response to an alarm state
US11199837B2 (en) 2017-08-02 2021-12-14 Strong Force Iot Portfolio 2016, Llc Data monitoring systems and methods to update input channel routing in response to an alarm state
US11126173B2 (en) 2017-08-02 2021-09-21 Strong Force Iot Portfolio 2016, Llc Data collection systems having a self-sufficient data acquisition box
US11036215B2 (en) 2017-08-02 2021-06-15 Strong Force Iot Portfolio 2016, Llc Data collection systems with pattern analysis for an industrial environment
US11231705B2 (en) 2017-08-02 2022-01-25 Strong Force Iot Portfolio 2016, Llc Methods for data monitoring with changeable routing of input channels
US10921801B2 (en) 2017-08-02 2021-02-16 Strong Force loT Portfolio 2016, LLC Data collection systems and methods for updating sensed parameter groups based on pattern recognition
US11397428B2 (en) 2017-08-02 2022-07-26 Strong Force Iot Portfolio 2016, Llc Self-organizing systems and methods for data collection
US11442445B2 (en) * 2017-08-02 2022-09-13 Strong Force Iot Portfolio 2016, Llc Data collection systems and methods with alternate routing of input channels
US11175653B2 (en) 2017-08-02 2021-11-16 Strong Force Iot Portfolio 2016, Llc Systems for data collection and storage including network evaluation and data storage profiles
US11131989B2 (en) 2017-08-02 2021-09-28 Strong Force Iot Portfolio 2016, Llc Systems and methods for data collection including pattern recognition
US11144047B2 (en) 2017-08-02 2021-10-12 Strong Force Iot Portfolio 2016, Llc Systems for data collection and self-organizing storage including enhancing resolution
US10903985B2 (en) 2017-08-25 2021-01-26 Keysight Technologies Singapore (Sales) Pte. Ltd. Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques
US11489666B2 (en) 2017-08-25 2022-11-01 Keysight Technologies Singapore (Sales) Pte. Ltd. Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques
US10992652B2 (en) 2017-08-25 2021-04-27 Keysight Technologies Singapore (Sales) Pte. Ltd. Methods, systems, and computer readable media for monitoring encrypted network traffic flows
US11128551B2 (en) * 2017-09-28 2021-09-21 Siemens Mobility GmbH Method and apparatus for immediate and reaction-free transmission of log messages
US11894949B2 (en) 2017-10-02 2024-02-06 VMware LLC Identifying multiple nodes in a virtual network defined over a set of public clouds to connect to an external SaaS provider
US11855805B2 (en) 2017-10-02 2023-12-26 Vmware, Inc. Deploying firewall for virtual network defined over public cloud infrastructure
US11895194B2 (en) 2017-10-02 2024-02-06 VMware LLC Layer four optimization for a virtual network defined over public cloud
US11153175B2 (en) * 2017-10-16 2021-10-19 International Business Machines Corporation Latency management by edge analytics in industrial production environments
US11902086B2 (en) 2017-11-09 2024-02-13 Nicira, Inc. Method and system of a dynamic high-availability mode based on current wide area network connectivity
US10693740B2 (en) 2017-12-07 2020-06-23 Accenture Global Solutions Limited Data transformation of performance statistics and ticket information for network devices for use in machine learning models
EP3496015A1 (en) * 2017-12-07 2019-06-12 Accenture Global Solutions Limited Data transformation of performance statistics and ticket information for network devices for use in machine learning models
CN108234496A (en) * 2018-01-05 2018-06-29 宝牧科技(天津)有限公司 A kind of method for predicting based on neural network
US10846485B2 (en) * 2018-01-10 2020-11-24 International Business Machines Corporation Machine learning model modification and natural language processing
US10606958B2 (en) * 2018-01-10 2020-03-31 International Business Machines Corporation Machine learning modification and natural language processing
US20200019613A1 (en) * 2018-01-10 2020-01-16 International Business Machines Corporation Machine Learning Model Modification and Natural Language Processing
US20190281078A1 (en) * 2018-03-08 2019-09-12 Cisco Technology, Inc. Predicting and mitigating layer-2 anomalies and instabilities
US10862910B2 (en) * 2018-03-08 2020-12-08 Cisco Technology, Inc. Predicting and mitigating layer-2 anomalies and instabilities
EP3541016A1 (en) * 2018-03-12 2019-09-18 Adtran, Inc. Telecommunications network troubleshooting systems
US10716017B2 (en) 2018-03-12 2020-07-14 Adtran, Inc. Telecommunications network troubleshooting systems
US11201807B2 (en) * 2018-04-24 2021-12-14 Nippon Telegraph And Telephone Corporation Traffic estimation apparatus, traffic estimation method and program
US20190349287A1 (en) * 2018-05-10 2019-11-14 Dell Products L. P. System and method to learn and prescribe optimal network path for sdn
US11050656B2 (en) * 2018-05-10 2021-06-29 Dell Products L.P. System and method to learn and prescribe network path for SDN
CN108510741A (en) * 2018-05-24 2018-09-07 浙江工业大学 A kind of traffic flow forecasting method based on Conv1D-LSTM neural network structures
CN108768750A (en) * 2018-06-22 2018-11-06 广东电网有限责任公司 communication network fault positioning method and device
JP2020017952A (en) * 2018-07-24 2020-01-30 バイドゥ オンライン ネットワーク テクノロジー (ベイジン) カンパニー リミテッド Method and device for warning
US10951500B2 (en) 2018-07-24 2021-03-16 Baidu Online Network Technology (Beijing) Co., Ltd. Method and apparatus for warning
US11716313B2 (en) 2018-08-10 2023-08-01 Keysight Technologies, Inc. Methods, systems, and computer readable media for implementing bandwidth limitations on specific application traffic at a proxy element
CN112585926A (en) * 2018-08-23 2021-03-30 摩根士丹利服务集团有限公司 Distributed system component failure identification
JP7200359B2 (en) 2018-08-23 2023-01-06 モルガン スタンレー サービシーズ グループ,インコーポレイテッド Identifying fault distribution system components
JP2021534690A (en) * 2018-08-23 2021-12-09 モルガン スタンレー サービシーズ グループ, インコーポレイテッドMorgan Stanley Services Group, Inc. Disability distribution system component identification
US11425232B2 (en) 2018-08-23 2022-08-23 Morgan Stanley Services Group Inc. Faulty distributed system component identification
EP3841724A4 (en) * 2018-08-23 2022-05-18 Morgan Stanley Services Group Inc. IDENTIFICATION OF FAULTY COMPONENTS OF A DISTRIBUTED SYSTEM
US10868829B2 (en) 2018-10-10 2020-12-15 Northrop Grumman Systems Corporation Predicted network traffic
US10949542B2 (en) * 2018-11-25 2021-03-16 International Business Machines Corporation Self-evolved adjustment framework for cloud-based large system based on machine learning
US11989289B2 (en) 2018-12-03 2024-05-21 British Telecommunications Public Limited Company Remediating software vulnerabilities
US11989307B2 (en) 2018-12-03 2024-05-21 British Telecommunications Public Company Limited Detecting vulnerable software systems
US11960610B2 (en) 2018-12-03 2024-04-16 British Telecommunications Public Limited Company Detecting vulnerability change in software systems
US11973778B2 (en) * 2018-12-03 2024-04-30 British Telecommunications Public Limited Company Detecting anomalies in computer networks
US20220060492A1 (en) * 2018-12-03 2022-02-24 British Telecommunications Public Limited Company Detecting anomalies in computer networks
US11218879B2 (en) 2018-12-05 2022-01-04 At&T Intellectual Property I, L.P. Providing security through characterizing internet protocol traffic to detect outliers
US10951461B2 (en) 2019-01-31 2021-03-16 Hewlett Packard Enterprise Development Lp Anomaly-driven packet capture and spectrum capture in an access point
CN109948471A (en) * 2019-03-04 2019-06-28 南京邮电大学 Traffic haze visibility detection method based on improved InceptionV4 network
WO2020202857A1 (en) * 2019-03-29 2020-10-08 Mitsubishi Electric Corporation Predictive classification of future operations
US12067489B2 (en) 2019-04-23 2024-08-20 Sciencelogic, Inc. Distributed learning anomaly detector
US11210587B2 (en) * 2019-04-23 2021-12-28 Sciencelogic, Inc. Distributed learning anomaly detector
WO2020219685A1 (en) * 2019-04-23 2020-10-29 Sciencelogic, Inc. Distributed learning anomaly detector
US20220095164A1 (en) * 2019-06-06 2022-03-24 Huawei Technologies Co., Ltd. Traffic volume prediction method and apparatus
US11831414B2 (en) 2019-08-27 2023-11-28 Vmware, Inc. Providing recommendations for implementing virtual networks
US12132671B2 (en) 2019-08-27 2024-10-29 VMware LLC Providing recommendations for implementing virtual networks
US11212229B2 (en) 2019-10-11 2021-12-28 Juniper Networks, Inc. Employing machine learning to predict and dynamically tune static configuration parameters
EP3806396A1 (en) * 2019-10-11 2021-04-14 Juniper Networks, Inc. Employing machine learning to predict and dynamically tune static configuration parameters
US11496495B2 (en) * 2019-10-25 2022-11-08 Cognizant Technology Solutions India Pvt. Ltd. System and a method for detecting anomalous patterns in a network
US20210126931A1 (en) * 2019-10-25 2021-04-29 Cognizant Technology Solutions India Pvt. Ltd System and a method for detecting anomalous patterns in a network
US12177130B2 (en) 2019-12-12 2024-12-24 VMware LLC Performing deep packet inspection in a software defined wide area network
US20210203606A1 (en) * 2019-12-31 2021-07-01 Opanga Networks, Inc. Data transport network protocol based on real time transport network congestion conditions
US11785442B2 (en) * 2019-12-31 2023-10-10 Opanga Networks, Inc. Data transport network protocol based on real time transport network congestion conditions
US20230029794A1 (en) * 2020-01-07 2023-02-02 Microsoft Technology Licensing, Llc Customized anomaly detection
US12238129B2 (en) * 2020-01-07 2025-02-25 Microsoft Technology Licensing, Llc Customized anomaly detection
US12041479B2 (en) 2020-01-24 2024-07-16 VMware LLC Accurate traffic steering between links through sub-path path quality metrics
US11190417B2 (en) * 2020-02-04 2021-11-30 Keysight Technologies, Inc. Methods, systems, and computer readable media for processing network flow metadata at a network packet broker
US11310117B2 (en) * 2020-06-24 2022-04-19 Red Hat, Inc. Pairing of a probe entity with another entity in a cloud computing environment
US12113695B2 (en) 2020-11-23 2024-10-08 Verizon Patent And Licensing Inc. Systems and methods for automated remote network performance monitoring
US11552872B2 (en) * 2020-11-23 2023-01-10 Verizon Patent And Licensing Inc. Systems and methods for automated remote network performance monitoring
KR20220071843A (en) * 2020-11-24 2022-05-31 고려대학교 산학협력단 Generative adversarial network model and training method to generate message id sequence on unmanned moving objects
KR102691125B1 (en) 2020-11-24 2024-08-02 고려대학교 산학협력단 Generative adversarial network model and training method to generate message id sequence on unmanned moving objects
US11929903B2 (en) 2020-12-29 2024-03-12 VMware LLC Emulating packet flows to assess network links for SD-WAN
US20220417770A1 (en) * 2021-01-08 2022-12-29 Verizon Patent And Licensing Inc. Systems and methods for determining baselines for network parameters used to configure base stations
US11956650B2 (en) * 2021-01-08 2024-04-09 Verizon Patent And Licensing Inc. Systems and methods for determining baselines for network parameters used to configure base stations
US11792127B2 (en) 2021-01-18 2023-10-17 Vmware, Inc. Network-aware load balancing
US12218845B2 (en) 2021-01-18 2025-02-04 VMware LLC Network-aware load balancing
US11979325B2 (en) * 2021-01-28 2024-05-07 VMware LLC Dynamic SD-WAN hub cluster scaling with machine learning
US20220239596A1 (en) * 2021-01-28 2022-07-28 Vmware, Inc. Dynamic sd-wan hub cluster scaling with machine learning
US12009987B2 (en) 2021-05-03 2024-06-11 VMware LLC Methods to support dynamic transit paths through hub clustering across branches in SD-WAN
US12218800B2 (en) 2021-05-06 2025-02-04 VMware LLC Methods for application defined virtual network service among multiple transport in sd-wan
US11799879B2 (en) 2021-05-18 2023-10-24 Bank Of America Corporation Real-time anomaly detection for network security
US11792213B2 (en) 2021-05-18 2023-10-17 Bank Of America Corporation Temporal-based anomaly detection for network security
US11588835B2 (en) 2021-05-18 2023-02-21 Bank Of America Corporation Dynamic network security monitoring system
US12015536B2 (en) 2021-06-18 2024-06-18 VMware LLC Method and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics of types of resource elements in the public clouds
US12250114B2 (en) 2021-06-18 2025-03-11 VMware LLC Method and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics of sub-types of resource elements in the public clouds
US12007759B2 (en) * 2021-06-28 2024-06-11 Oracle International Corporation Geometric aging data reduction for machine learning applications
US20220413481A1 (en) * 2021-06-28 2022-12-29 Oracle International Corporation Geometric aging data reduction for machine learning applications
US12047282B2 (en) 2021-07-22 2024-07-23 VMware LLC Methods for smart bandwidth aggregation based dynamic overlay selection among preferred exits in SD-WAN
US12267364B2 (en) 2021-07-24 2025-04-01 VMware LLC Network management services in a virtual network
US11949570B2 (en) * 2021-07-30 2024-04-02 Keysight Technologies, Inc. Methods, systems, and computer readable media for utilizing machine learning to automatically configure filters at a network packet broker
US11943146B2 (en) 2021-10-01 2024-03-26 VMware LLC Traffic prioritization in SD-WAN
US20230107011A1 (en) * 2021-10-04 2023-04-06 Mellanox Technologies, Ltd. Digital simulator of data communication apparatus
US12184557B2 (en) 2022-01-04 2024-12-31 VMware LLC Explicit congestion notification in a virtual environment
US20230269143A1 (en) * 2022-02-22 2023-08-24 Ciena Corporation Switching among multiple machine learning models during training and inference
US11956129B2 (en) * 2022-02-22 2024-04-09 Ciena Corporation Switching among multiple machine learning models during training and inference
US12255794B2 (en) 2022-03-15 2025-03-18 Keysight Technologies, Inc. Methods, systems, and computer readable media for selectively processing a packet flow using a flow inspection engine
US11909815B2 (en) 2022-06-06 2024-02-20 VMware LLC Routing based on geolocation costs
US12166661B2 (en) 2022-07-18 2024-12-10 VMware LLC DNS-based GSLB-aware SD-WAN for low latency SaaS applications
US12237990B2 (en) 2022-07-20 2025-02-25 VMware LLC Method for modifying an SD-WAN using metric-based heat maps
US12034587B1 (en) 2023-03-27 2024-07-09 VMware LLC Identifying and remediating anomalies in a self-healing network
US12057993B1 (en) 2023-03-27 2024-08-06 VMware LLC Identifying and remediating anomalies in a self-healing network
WO2024228021A1 (en) * 2023-05-02 2024-11-07 Net Ai Tech Ltd Methods of training an artificial intelligence model for operational anomaly prediction in a communications network, and systems
CN116896469A (en) * 2023-07-18 2023-10-17 哈尔滨工业大学 Encryption agent application identification method based on Burst sequence
US12261777B2 (en) 2023-08-16 2025-03-25 VMware LLC Forwarding packets in multi-regional large scale deployments with distributed gateways

Also Published As

Publication number Publication date
EP3459209A4 (en) 2019-10-30
EP3459209A1 (en) 2019-03-27
CN109417495A (en) 2019-03-01

Similar Documents

Publication Publication Date Title
US20170339022A1 (en) Anomaly detection and prediction in a packet broker
US11050770B2 (en) Network defense system and method thereof
US10887786B2 (en) Near-uniform load balancing in a visibility network via usage prediction
CN108370370B (en) System and method for passive assessment of industrial perimeter security
US12175364B2 (en) Reinforcement-learning modeling interfaces
JP6419967B2 (en) System and method for network management
US8677485B2 (en) Detecting network anomaly
WO2017200651A1 (en) Anomaly detection and prediction in a packet broker
CN108259194B (en) Network fault early warning method and device
US11283683B2 (en) Network modification impact prediction
US10404577B2 (en) Network compatibility determination based on flow requirements of an application and stored flow capabilities of a software-defined network
WO2022165143A1 (en) Systems and methods for artificial intelligence-defined networking
US20160065428A1 (en) Scalable framework for monitoring and managing network devices
US12199812B2 (en) Enhanced analysis and remediation of network performance
US20220247630A1 (en) Identification of network device configuration changes
US11909522B2 (en) System and method to measure and score application health via correctable errors
CN117768347A (en) Cloud computing platform service monitoring method and device, computer equipment and storage medium
WO2016122659A1 (en) Performance monitoring at edge of communication networks
CN117294587A (en) Network configuration fault analysis method, server and medium
US8000337B2 (en) Runtime flow debugging a network device by examining packet counters at internal points
US20250150325A1 (en) Enhanced analysis and remediation of network performance
US10031788B2 (en) Request profile in multi-threaded service systems with kernel events
CN119094371A (en) Road network performance prediction method, device, electronic device, storage medium and computer program product
TW202308353A (en) Self-healing system and self-healing method for telecommunication network
WO2025079103A1 (en) Method and system for anomaly detection in a network

Legal Events

Date Code Title Description
AS Assignment

Owner name: BROCADE COMMUNICATIONS SYSTEMS, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HEGDE, DEEPAK;SHARMA, SHAILENDER;VEDAM, JUDE PRAGASH;AND OTHERS;REEL/FRAME:041689/0139

Effective date: 20170322

AS Assignment

Owner name: SILICON VALLEY BANK, CALIFORNIA

Free format text: THIRD AMENDED AND RESTATED PATENT AND TRADEMARK SECURITY AGREEMENT;ASSIGNOR:EXTREME NETWORKS, INC.;REEL/FRAME:044639/0300

Effective date: 20171027

AS Assignment

Owner name: EXTREME NETWORKS, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BROCADE COMMUNICATIONS SYSTEMS, INC.;FOUNDRY NETWORKS, LLC;REEL/FRAME:044125/0547

Effective date: 20171107

AS Assignment

Owner name: BANK OF MONTREAL, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNOR:EXTREME NETWORKS, INC.;REEL/FRAME:046050/0546

Effective date: 20180501

Owner name: EXTREME NETWORKS, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:046051/0775

Effective date: 20180501

AS Assignment

Owner name: KEYBANK NATIONAL ASSOCIATION, OHIO

Free format text: THIRD AMENDMENT AND CONFIRMATION OF INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNOR:ALABAMA METAL INDUSTRIES CORPORATION;REEL/FRAME:048285/0480

Effective date: 20190124

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

AS Assignment

Owner name: ALABAMA METAL INDUSTRIES CORPORATION, NEW YORK

Free format text: RELEASE OF SECURITY INTEREST IN UNITED STATES PATENTS;ASSIGNOR:KEYBANK NATIONAL ASSOCIATION;REEL/FRAME:055401/0051

Effective date: 20210223

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCV Information on status: appeal procedure

Free format text: NOTICE OF APPEAL FILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

OSZAR »