Abstract:
In one embodiment, a network device routes traffic along a network path and receives a performance threshold crossing alert regarding performance of the network path. The network device detects that the performance threshold crossing alert is part of a potential network attack by analyzing, by the device, the performance threshold crossing alert. The network device also provides a notification of the detected network attack.
Abstract:
In one embodiment, a plurality of paths in a network from a source device to a destination device is identified. A predicted performance for packet delivery along a primary path from the plurality of paths is determined. The predicted performance for packet delivery along the primary path is then compared to a performance threshold. Traffic sent along the primary path may be duplicated onto a backup path selected from the plurality of paths based on a determination that the predicted performance along the primary path is below the performance threshold.
Abstract:
In one embodiment, a network device receives metrics regarding a path in the network. A predictive model is generated using the received metrics and is operable to predict available bandwidth along the path for a particular type of traffic. A determination is made as to whether a confidence score for the predictive model is below a confidence threshold associated with the particular type of traffic. The device obtains additional data regarding the path based on a determination that the confidence score is below the confidence threshold. The predictive model is updated using the additional data regarding the path.
Abstract:
In one embodiment, periodic round-trip probes are executed in a network, whereby a packet is transmitted along a particular communication path from a source to a destination and back to the source. Statistical information relating to the round-trip probes is gathered, and a transmission delay of the round-trip probes is calculated based on the gathered statistical information. Also, an end-to-end transmission delay along an arbitrary communication path in the network is estimated based on the calculated transmission delay of the round-trip probes.
Abstract:
In one embodiment, a predictive model is constructed by mapping multiple network characteristics to multiple network performance metrics. Then, a network performance metric pertaining to a node in a network is predicted based on the constructed predictive model and one or more network characteristics relevant to the node. Also, a local parameter of the node is optimized based on the predicted network performance metric.
Abstract:
In one embodiment, techniques are shown and described relating to a point-to-multipoint communication infrastructure for expert-based knowledge feed-back using learning machines. A learning machine may communicate an expert discovery request into a network to discover one or more experts, and then receive from the one or more experts, one or more expert discovery responses. Based on the one or more received expert discovery responses, the learning machine may then build a dynamic multicast tree of experts to assist the learning machine in a computer network.
Abstract:
In one embodiment, a learning data processor determines a plurality of machine learning features in a computer network to collect. Upon receiving data corresponding to the plurality of features, the learning data processor may aggregate the data, and pushes the aggregated data for select features to interested learning machines associated with the computer network.
Abstract:
In one embodiment, a plurality of communication paths in a second direction in a communication network is determined, based on reversing communication paths established in a first direction in the communication network. Then, a path quality of the communication paths in the second direction is monitored. Based on the monitored path quality, it is then determined whether the communication paths in the second direction satisfy a communication requirement. Finally, a particular communication path of unacceptable quality in the second direction is detected when the particular communication path in the second direction fails to satisfy the communication requirement.
Abstract:
In one embodiment, a capable node in a low power and lossy network (LLN) may monitor the authentication time for one or more nodes in the LLN. The capable node may dynamically correlate the authentication time with the location of the one or more nodes in the LLN in order to identify one or more authentication-delayed nodes. The node may then select, based on the location of the one or more authentication-delayed nodes, one or more key-delegation nodes to receive one or more network keys so that the key-delegation nodes may perform localized authentication of one or more of the authentication-delayed nodes. The capable node may then distribute the one or more network keys to the one or more key-delegation nodes.
Abstract:
In one embodiment, techniques are shown and described relating to a Hidden Markov Model based architecture to monitor network node activities and predict relevant periods. In particular, in one embodiment, a device determines a statistical model for each of one or more singular-node traffic profiles (e.g., based on one or more Hidden Markov Models (HMMs) each corresponding to a respective one of the one or more traffic profiles). By analyzing respective traffic from individual nodes in a computer network, and matching the respective traffic against the statistical model for the one or more traffic profiles, the device may detecting a matching traffic profile for the individual nodes in a computer network. In addition, the device may predict relevant periods of traffic for the individual nodes by extrapolating a most-likely future sequence based on prior respective traffic of the individual nodes and the corresponding matching traffic profile.