System for monitoring and managing datacenters
N Yadav, AR Singh, S Gandham, EC Scheib… - US Patent …, 2018 - Google Patents
An example method includes detecting, using sensors, packets throughout a datacenter.
The sensors can then send packet logs to various collectors which can then identify and …
The sensors can then send packet logs to various collectors which can then identify and …
Sage: practical and scalable ML-driven performance debugging in microservices
Cloud applications are increasingly shifting from large monolithic services to complex
graphs of loosely-coupled microservices. Despite the advantages of modularity and …
graphs of loosely-coupled microservices. Despite the advantages of modularity and …
Network flow watermarking: A survey
A Iacovazzi, Y Elovici - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Traffic analysis (TA) is a useful tool aimed at understanding network traffic behavior. Basic
network administration often takes advantage of TA for purposes such as security, intrusion …
network administration often takes advantage of TA for purposes such as security, intrusion …
MDL-based clustering for application dependency mapping
EC Scheib, A Parandehgheibi, O Madani… - US Patent …, 2019 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can
determine an optimum number of clusters for the network using the minimum description …
determine an optimum number of clusters for the network using the minimum description …
The mystery machine: End-to-end performance analysis of large-scale internet services
Current debugging and optimization methods scale poorly to deal with the complexity of
modern Internet services, in which a single request triggers parallel execution of numerous …
modern Internet services, in which a single request triggers parallel execution of numerous …
Augmenting flow data for improved network monitoring and management
A Parandehgheibi, MA Attar, O Madani… - US Patent …, 2019 - Google Patents
Flow data can be augmented with features or attributes from other domains, such as
attributes from a source host and/or destination host of a flow, a process initiating the flow …
attributes from a source host and/or destination host of a flow, a process initiating the flow …
Cluster discovery via multi-domain fusion for application dependency mapping
A Parandehgheibi, O Madani, V Jeyakumar… - US Patent …, 2020 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can
determine whether certain nodes form a cluster of a tier of an application. The network can …
determine whether certain nodes form a cluster of a tier of an application. The network can …
A spatiotemporal deep learning approach for unsupervised anomaly detection in cloud systems
Anomaly detection is a critical task for maintaining the performance of a cloud system. Using
data-driven methods to address this issue is the mainstream in recent years. However, due …
data-driven methods to address this issue is the mainstream in recent years. However, due …
Techniques for determining network anomalies in data center networks
A Kulshreshtha, N Yadav, HT Vu, MS Watts… - US Patent …, 2021 - Google Patents
(57) ABSTRACT A monitoring device/module monitors a plurality of nodes in a data center
network, and determines one or more latency distributions of response times for messages …
network, and determines one or more latency distributions of response times for messages …