Frederick Douglis - Basking Ridge NJ, US Michael Rabinovich - Gillette NJ, US Aviel D. Rubin - West Caldwell NJ, US Oliver Spatscheck - Randolph NJ, US
Assignee:
AT&T Corp. - New York NY
International Classification:
G06F 15/16 G06F 3/00 H04L 12/28 H04L 9/00
US Classification:
709228, 709229, 709230, 37039532, 713201, 719330
Abstract:
The present invention is directed to a method of providing content distribution services while minimizing the processing time required for security protocols such as the Secure Sockets Layer.
Method And Apparatus For Packet Analysis In A Network
Charles D. Cranor - Morristown NJ, US Theodore Johnson - New York NY, US Oliver Spatscheck - Randolph NJ, US Divesh Srivastava - Summit NJ, US
Assignee:
AT&T Corp. - New York NY
International Classification:
G06F 15/173
US Classification:
709223, 709227, 709250
Abstract:
A method and system for monitoring traffic in a data communication network and for extracting useful statistics and information is disclosed. In accordance with an embodiment of the invention, a network interface card has a run-time system and one or more processing blocks executing on the network interface. The run-time system module feeds information derived from a network packet to the processing modules which process the information and generate output such as condensed statistics about the packets traveling through the network.
Method And Apparatus For Limiting Reuse Of Domain Name System Response Information
Frederick Douglis - Basking Ridge NJ, US Michael Rabinovich - Gillette NJ, US Oliver Spatscheck - Randolph NJ, US
Assignee:
AT&T Intellectual Property II, L.P. - Reno NV
International Classification:
G06F 15/16 G06F 15/173
US Classification:
709203, 709223, 709225, 709245
Abstract:
A method of limiting reuse of domain name information includes the steps of requesting the information by a local domain name server from an authoritative domain name server, and providing this information to a requestor, such as a client or server. The domain name information includes an allowable usage limit that represents a maximum number of times that the information can be provided to the requestor before revalidating the information. A system for limiting reuse of domain name information includes an authoritative domain name server, a local domain name server, and a requestor. The authoritative server provides the information, which includes the allowable usage limit, in response to a request by the local server. The request from the local server may include the number of times that the local server provided the information to one or more requestors as an observed usage.
Method And Apparatus For Packet Analysis In A Network
Charles D. Cranor - Morristown NJ, US Theodore Johnson - New York NY, US Oliver Spatscheck - Randolph NJ, US Divesh Srivastava - Summit NJ, US
International Classification:
G06F 15/173
US Classification:
709224, 709223, 709227, 709250
Abstract:
A method and system for monitoring traffic in a data communication network and for extracting useful statistics and information is disclosed. In accordance with an embodiment of the invention, a network interface card has a run-time system and one or more processing blocks executing on the network interface. The run-time system module feeds information derived from a network packet to the processing modules which process the information and generate output such as condensed statistics about the packets traveling through the network.
Theodore Johnson - New York NY, US Oliver Spatscheck - Randolph NJ, US Vladislav Shkapenyuk - Brooklyn NY, US
Assignee:
AT&T Intellectual Property II, L.P. - New York NY
International Classification:
G06F 7/00 G06F 17/00
US Classification:
707100, 707102
Abstract:
A system, method and computer-readable medium provide for assigning sampling methods to each input stream for arbitrary query sets in a data stream management system. The method embodiment comprises splitting all query nodes in a query directed acyclic graph (DAG) having multiple parent nodes into sets of independent nodes having a single parent, computing a grouping set for every node in each set of independent nodes, reconciling each parent node with each child node in each set of independent node, reconciling between multiple child nodes that share a parent node and generating a final grouping set for at least one node describing how to sample an input stream for that node.
Method And Apparatus For Content Distribution Network Brokering And Peering
Alexandros Biliris - Chatham NJ, US Charles D. Cranor - Morristown NJ, US Frederick Douglis - Basking Ridge NJ, US Cooper Nelson - San Diego CA, US Michael Rabinovich - Gillette NJ, US Sandeep Sibal - Scotch Plains NJ, US Oliver Spatscheck - Randolph NJ, US Walter Sturm - Chester NJ, US
Assignee:
AT&T Intellectual Property II, L. P. - New York NY
The present invention provides an architecture that advantageously leverages multiple content distribution networks to provide enhanced services. In accordance with an embodiment of the present invention, a share of content requests are served by each of a plurality of content distribution networks. The fraction of content requests served by a particular content distribution network can be determined dynamically, depending on the offered load or other traffic characteristics.
Method And Apparatus For Automatically Constructing Application Signatures
Oliver Spatscheck - Randolph NJ, US Subhabrata Sen - New Providence NJ, US Dongmei Wang - Kearny NJ, US
Assignee:
AT&T Corp. - New York NY
International Classification:
H04L 29/06
US Classification:
713152, 370400
Abstract:
The present invention relates to a method and system for the automated construction of application signatures. In one example, an approach for automatically constructing accurate signatures for individual applications, with minimal human involvement or application domain knowledge, is provided. Given a training data set containing the application traffic, the Automated Construction of Application Signatures (ACAS) system uses a combination of statistical, information theoretic and combinatorial optimization techniques, to derive application-layer signatures from the payload of packets, e. g. , IP packets. Evaluations with a range of applications demonstrate that the derived signatures are very accurate and scale to identifying a large number of flows in real time on high-speed links.
Statistical, Signature-Based Approach To Ip Traffic Classification
Nicholas G. Duffield - New York NY, US Matthew Roughan - Morristown NJ, US Subhabrata Sen - Chatham NJ, US Oliver Spatscheck - Randolph NJ, US
International Classification:
H04L 12/26
US Classification:
3702301, 370229, 370232, 370235, 370238, 370252
Abstract:
A signature-based traffic classification method maps traffic into preselected classes of service (CoS). By analyzing a known corpus of data that clearly belongs to identified ones of the preselected classes of service, in a training session the method develops statistics about a chosen set of traffic features. In an analysis session, relative to traffic of the network where QoS treatments are desired (target network), the method obtains statistical information relative to the same chosen set of features for values of one or more predetermined traffic attributes that are associated with connections that are analyzed in the analysis session, yielding a statistical features signature of each of the values of the one or more attributes. A classification process then establishes a mapping between values of the one or more predetermined traffic attributes and the preselected classes of service, leading to the establishment of QoS treatment rules.