-
公开(公告)号:US12050979B2
公开(公告)日:2024-07-30
申请号:US16357603
申请日:2019-03-19
Applicant: Cisco Technology, Inc.
Inventor: Abhishek Singh , Debojyoti Dutta
Abstract: A neural network architecture search may be conducted by a controller to generate a neural network. The controller may perform the search by generating a directed acyclic graph across nodes in a search space, the nodes representing compute operations for a neural network. As the search is performed, the controller may retrieve resource availability information to modify the likelihood of a generated neural network architecture including previously unused nodes.
-
公开(公告)号:US10972388B2
公开(公告)日:2021-04-06
申请号:US15359511
申请日:2016-11-22
Applicant: Cisco Technology, Inc.
Inventor: Navindra Yadav , Mohammadreza Alizadeh Attar , Shashi Gandham , Abhishek Singh , Shih-Chun Chang
IPC: H04L12/721 , H04L12/26 , H04L12/24
Abstract: An example method includes a sensor detecting multiple packets of a flow during a specified total time period (e.g., a reporting time period). The total time period can be subdivided into multiple time periods. The sensor can analyze the detected packets to determine an amount of network utilization for each of the time periods. The sensor can then generate a flow summary based on the network utilization and the flow and send the flow summary to an analytics engine. Multiple other sensors can do similarly for their respective packets and flows. The analytics engine can receive the flow summaries from the various sensors and determine a correspondence between flow with high network utilization at a specific time period and a node or nodes. These nodes that experienced multiple flows with high network utilization for a certain period of time can be identified as experiencing a microburst.
-
公开(公告)号:US20250106246A1
公开(公告)日:2025-03-27
申请号:US18474555
申请日:2023-09-26
Applicant: Cisco Technology, Inc.
Inventor: Abhishek Singh , Shray Kapoor
IPC: H04L9/40 , H04L51/212
Abstract: Techniques are described herein for detecting an invalid (e.g., spoof) email before it is received by an intended recipient. In some embodiments, the techniques may involve, upon receiving an electronic communication directed to an intended recipient, determining, based on information included in the electronic communication, a claimed source entity, and determining a domain associated with the email communication. The techniques may further involve determining an owner entity associated with the domain and then determining that the electronic communication is valid based on a comparison between the owner entity and the claimed source entity. Upon determining that the electronic communication is not valid, the techniques may further comprise performing one or more mitigation techniques.
-
公开(公告)号:US20230283520A1
公开(公告)日:2023-09-07
申请号:US18314025
申请日:2023-05-08
Applicant: Cisco Technology, Inc.
Inventor: Rohit Prasad , Shashi Gandham , Hoang Nguyen , Abhishek Singh , Shih-Chun Chang , Navindra Yadav , Ali Parandehgheibi , Paul Mach , Rachita Agasthy , Ravi Prasad , Varun Malhotra , Michael Watts , Sunil Gupta
IPC: H04L41/0893 , H04L41/0853
CPC classification number: H04L41/0893 , H04L41/0856
Abstract: The disclosed technology relates to intent driven network management. A system is configured to maintain an inventory store comprising records for a set of network entities in a network, wherein each network entity in the set of network entities is associated with a record in the inventory store. The system receives a user intent statement comprising an action and a flow filter representing network data flows on which the action is to be applied and queries, based on the flow filter, the inventory store to identify a plurality of network entities in the set of network entities to which the user intent statement applies. The system generates a plurality of network policies that implement the user intent statement based on the plurality of network entities and the action and enforces the plurality network policies.
-
公开(公告)号:US10902293B2
公开(公告)日:2021-01-26
申请号:US16177581
申请日:2018-11-01
Applicant: Cisco Technology, Inc.
Inventor: Purushotham Kamath , Abhishek Singh , Debojyoti Dutta
Abstract: In one embodiment, a device forms a neural network envelope cell that comprises a plurality of convolution-based filters in series or parallel. The device constructs a convolutional neural network by stacking copies of the envelope cell in series. The device trains, using a training dataset of images, the convolutional neural network to perform image classification by iteratively collecting variance metrics for each filter in each envelope cell, pruning filters with low variance metrics from the convolutional neural network, and appending a new copy of the envelope cell into the convolutional neural network.
-
公开(公告)号:US20200302272A1
公开(公告)日:2020-09-24
申请号:US16358554
申请日:2019-03-19
Applicant: Cisco Technology, Inc.
Inventor: Abhishek Singh , Debojyoti Dutta
Abstract: The present disclosure provides systems, methods and computer-readable media for optimizing the neural architecture search for the automated machine learning process. In one aspect, neural architecture search method including selecting a neural architecture for training as part of an automated machine learning process; collecting statistical parameters on individual nodes of the neural architecture during the training; determining, based on the statistical parameters, active nodes of the neural architecture to form a candidate neural architecture; and validating the candidate neural architecture to produce a trained neural architecture to be used in implemented an application or a service.
-
公开(公告)号:US10594560B2
公开(公告)日:2020-03-17
申请号:US15470410
申请日:2017-03-27
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Rohit Prasad , Shashi Gandham , Hoang Nguyen , Abhishek Singh , Shih-Chun Chang , Navindra Yadav , Ali Parandehgheibi , Paul Mach , Rachita Agasthy , Ravi Prasad , Varun Malhotra , Michael Watts , Sunil Gupta
IPC: H04L12/24
Abstract: The disclosed technology relates to intent driven network management. A system is configured to maintain an inventory store comprising records for a set of network entities in a network, wherein each network entity in the set of network entities is associated with a record in the inventory store. The system receives a user intent statement comprising an action and a flow filter representing network data flows on which the action is to be applied and queries, based on the flow filter, the inventory store to identify a plurality of network entities in the set of network entities to which the user intent statement applies. The system generates a plurality of network policies that implement the user intent statement based on the plurality of network entities and the action and enforces the plurality network policies.
-
公开(公告)号:US20180278480A1
公开(公告)日:2018-09-27
申请号:US15470410
申请日:2017-03-27
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Rohit Prasad , Shashi Gandham , Hoang Nguyen , Abhishek Singh , Shih-Chun Chang , Navindra Yadav , Ali Parandehgheibi , Paul Mach , Rachita Agasthy , Ravi Prasad , Varun Malhotra , Michael Watts , Sunil Gupta
IPC: H04L12/24
Abstract: The disclosed technology relates to intent driven network management. A system is configured to maintain an inventory store comprising records for a set of network entities in a network, wherein each network entity in the set of network entities is associated with a record in the inventory store. The system receives a user intent statement comprising an action and a flow filter representing network data flows on which the action is to be applied and queries, based on the flow filter, the inventory store to identify a plurality of network entities in the set of network entities to which the user intent statement applies. The system generates a plurality of network policies that implement the user intent statement based on the plurality of network entities and the action and enforces the plurality network policies.
-
公开(公告)号:US12238054B2
公开(公告)日:2025-02-25
申请号:US17699579
申请日:2022-03-21
Applicant: Cisco Technology, Inc.
Inventor: Fahim Abbasi , Abhishek Singh , Muhammad Sachedina
IPC: H04L51/212 , G06N20/00 , H04L9/40 , H04L51/42
Abstract: Techniques for an email-security system to detect multi-stage email scam attacks, and engage an attacker to obtain additional information. The system may analyze emails for users and identify scam emails by analyzing metadata of the emails. The system may then classify the scam emails into particular classes from among a group of scam-email classes. The system may then engage the attacker that sent the scam email. In some instances, the scam emails may be multi-stage attacks, and the system may automatically engage the attacker to move to the next stage of the scam attack. For instance, the system may send a lure email that is responsive to the particular scam class to prompt or provoke the attacker to send more sensitive information, such as a phone number, a bank account, etc. The system may then harvest this sensitive information of the attacker, and use that information for various remedial actions.
-
公开(公告)号:US20230171213A1
公开(公告)日:2023-06-01
申请号:US17699579
申请日:2022-03-21
Applicant: Cisco Technology, Inc.
Inventor: Fahim Abbasi , Abhishek Singh , Muhammad Sachedina
CPC classification number: H04L51/12 , H04L51/22 , H04L63/1433 , G06N20/00
Abstract: Techniques for an email-security system to detect multi-stage email scam attacks, and engage an attacker to obtain additional information. The system may analyze emails for users and identify scam emails by analyzing metadata of the emails. The system may then classify the scam emails into particular classes from among a group of scam-email classes. The system may then engage the attacker that sent the scam email. In some instances, the scam emails may be multi-stage attacks, and the system may automatically engage the attacker to move to the next stage of the scam attack. For instance, the system may send a lure email that is responsive to the particular scam class to prompt or provoke the attacker to send more sensitive information, such as a phone number, a bank account, etc. The system may then harvest this sensitive information of the attacker, and use that information for various remedial actions.
-
-
-
-
-
-
-
-
-