-
公开(公告)号:US11646940B2
公开(公告)日:2023-05-09
申请号:US17482411
申请日:2021-09-22
Applicant: Cisco Technology, Inc.
Inventor: Rohit Prasad , Shashi Gandham , Hoang Nguyen , Abhishek Singh , Shih-Chun Chang , Navindra Yadav , Ali Parandehgheibi , Paul Mach , Rachita Agasthy , Ravi Prasad , Varun Malhotra , Michael Watts , Sunil Gupta
IPC: H04L41/0893 , H04L41/0853
CPC classification number: H04L41/0893 , H04L41/0856
Abstract: The disclosed technology relates to intent driven network management. A system is configured to maintain an inventory store comprising records for a set of network entities in a network, wherein each network entity in the set of network entities is associated with a record in the inventory store. The system receives a user intent statement comprising an action and a flow filter representing network data flows on which the action is to be applied and queries, based on the flow filter, the inventory store to identify a plurality of network entities in the set of network entities to which the user intent statement applies. The system generates a plurality of network policies that implement the user intent statement based on the plurality of network entities and the action and enforces the plurality network policies.
-
公开(公告)号:US11630990B2
公开(公告)日:2023-04-18
申请号:US16358554
申请日:2019-03-19
Applicant: Cisco Technology, Inc.
Inventor: Abhishek Singh , Debojyoti Dutta
Abstract: The present disclosure provides systems, methods and computer-readable media for optimizing the neural architecture search for the automated machine learning process. In one aspect, neural architecture search method including selecting a neural architecture for training as part of an automated machine learning process; collecting statistical parameters on individual nodes of the neural architecture during the training; determining, based on the statistical parameters, active nodes of the neural architecture to form a candidate neural architecture; and validating the candidate neural architecture to produce a trained neural architecture to be used in implemented an application or a service.
-
公开(公告)号:US11146454B2
公开(公告)日:2021-10-12
申请号:US16820404
申请日:2020-03-16
Applicant: Cisco Technology, Inc.
Inventor: Rohit Prasad , Shashi Gandham , Hoang Nguyen , Abhishek Singh , Shih-Chun Chang , Navindra Yadav , Ali Parandehgheibi , Paul Mach , Rachita Agasthy , Ravi Prasad , Varun Malhotra , Michael Watts , Sunil Gupta
IPC: H04L12/24
Abstract: The disclosed technology relates to intent driven network management. A system is configured to maintain an inventory store comprising records for a set of network entities in a network, wherein each network entity in the set of network entities is associated with a record in the inventory store. The system receives a user intent statement comprising an action and a flow filter representing network data flows on which the action is to be applied and queries, based on the flow filter, the inventory store to identify a plurality of network entities in the set of network entities to which the user intent statement applies. The system generates a plurality of network policies that implement the user intent statement based on the plurality of network entities and the action and enforces the plurality network policies.
-
公开(公告)号:US20200302270A1
公开(公告)日:2020-09-24
申请号:US16357603
申请日:2019-03-19
Applicant: Cisco Technology, Inc.
Inventor: Abhishek Singh , Debojyoti Dutta
Abstract: A neural network architecture search may be conducted by a controller to generate a neural network. The controller may perform the search by generating a directed acyclic graph across nodes in a search space, the nodes representing compute operations for a neural network. As the search is performed, the controller may retrieve resource availability information to modify the likelihood of a generated neural network architecture including previously unused nodes.
-
公开(公告)号:US20190294792A1
公开(公告)日:2019-09-26
申请号:US16102571
申请日:2018-08-13
Applicant: Cisco Technology, Inc.
Inventor: Abhishek Singh , Debojyoti Dutta
Abstract: Systems, methods, computer-readable media, and devices are disclosed for creating a malware inference architecture. An instruction set is received at an endpoint in a network. At the endpoint, the instruction set is classified as potentially malicious or benign according to a first machine learning model based on a first parameter set. If the instruction set is determined by the first machine learning model to be potentially malicious, the instruction set is sent to a cloud system and is analyzed at the cloud system using a second machine learning model to determine if the instruction set comprises malicious code. The second machine learning model is configured to classify a type of security risk associated with the instruction set based on a second parameter set that is different from the first parameter set.
-
公开(公告)号:US10250446B2
公开(公告)日:2019-04-02
申请号:US15470499
申请日:2017-03-27
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Rohit Prasad , Shashi Gandham , Hai Vu , Varun Malhotra , Sunil Gupta , Abhishek Singh , Navindra Yadav , Ali Parandehgheibi , Ravi Prasad , Praneeth Vallem , Paul Lesiak , Hoang Nguyen
Abstract: The disclosed technology relates to a distributed policy store. A system is configured to locate, in an index, an entry for a network entity, determine, based on the entry, a file identifier for a file containing a record for the network entity and an offset indicating a location of the record in the file. The system is further configured to locate the file in a distributed file system using the file identifier, locate the record in the file using the offset, and retrieve the record.
-
公开(公告)号:US20250080577A1
公开(公告)日:2025-03-06
申请号:US18475896
申请日:2023-09-27
Applicant: Cisco Technology, Inc.
Inventor: Abhishek Singh , Omid Mirzaei
IPC: H04L9/40
Abstract: This disclosure describes techniques and mechanisms to retroactively identifying, classifying, categorizing, and/or remediating campaigns by an email threat defense system. The described techniques may perform a time-series analysis on record data associated with emails and identify campaigns that have bypassed threat detection mechanisms. The described techniques may extract and correlate features of the record data in order to label and determine whether a campaign is malicious. Where the email campaign is malicious, remedial action(s) can occur. Accordingly, the described techniques may remediate false negatives in a network and improve network security.
-
公开(公告)号:US12244562B2
公开(公告)日:2025-03-04
申请号:US17867464
申请日:2022-07-18
Applicant: Cisco Technology, Inc.
Inventor: Durgamadhav Behera , Abhishek Singh , Muhammad Sachedina
IPC: H04L9/40
Abstract: Techniques for an email-security system to screen emails, extract information from the emails, analyze the information, assign probability scores to the emails, and classify the emails as likely fraudulent or not. The system may analyze emails for users and identify fraudulent emails by analyzing the contents of the emails. The system may evaluate the contents of the emails to determine probability score(s) which may further determine an overall probability score. The system may then classify the email as fraudulent, or not, and may perform actions including blocking the email, allowing the email, flagging the email, etc. In some instances, the screened emails may include legitimate brand domain addresses, names, images, URL(s), and the like. However, the screened emails may contain a reply-to domain address that matches a free email service provider domain. In such instances, the email-security system may assign a probability score indicative that the screened email is fraudulent.
-
公开(公告)号:US20200220780A1
公开(公告)日:2020-07-09
申请号:US16820404
申请日:2020-03-16
Applicant: Cisco Technology, Inc.
Inventor: Rohit Prasad , Shashi Gandham , Hoang Nguyen , Abhishek Singh , Shih-Chun Chang , Navindra Yadav , Ali Parandehgheibi , Paul Mach , Rachita Agasthy , Ravi Prasad , Varun Malhotra , Michael Watts , Sunil Gupta
IPC: H04L12/24
Abstract: The disclosed technology relates to intent driven network management. A system is configured to maintain an inventory store comprising records for a set of network entities in a network, wherein each network entity in the set of network entities is associated with a record in the inventory store. The system receives a user intent statement comprising an action and a flow filter representing network data flows on which the action is to be applied and queries, based on the flow filter, the inventory store to identify a plurality of network entities in the set of network entities to which the user intent statement applies. The system generates a plurality of network policies that implement the user intent statement based on the plurality of network entities and the action and enforces the plurality network policies.
-
公开(公告)号:US20190286945A1
公开(公告)日:2019-09-19
申请号:US16177581
申请日:2018-11-01
Applicant: Cisco Technology, Inc.
Inventor: Purushotham Kamath , Abhishek Singh , Debojyoti Dutta
Abstract: In one embodiment, a device forms a neural network envelope cell that comprises a plurality of convolution-based filters in series or parallel. The device constructs a convolutional neural network by stacking copies of the envelope cell in series. The device trains, using a training dataset of images, the convolutional neural network to perform image classification by iteratively collecting variance metrics for each filter in each envelope cell, pruning filters with low variance metrics from the convolutional neural network, and appending a new copy of the envelope cell into the convolutional neural network.
-
-
-
-
-
-
-
-
-