Patents by Inventor Dennis Ramdass

Dennis Ramdass has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230409412
    Abstract: In one set of embodiments, a computer system can receive one or more application programming interface (API) call traces comprising metadata of API calls made by a microservice-based application and can evaluate the one or more API call traces against a baseline of normal API call behavior for the application. The computer system can then generate, based on the evaluation, a prediction for each of the one or more API call traces indicating whether the API call corresponding to the API call trace is normal or anomalous.
    Type: Application
    Filed: June 17, 2022
    Publication date: December 21, 2023
    Inventors: Christopher Kruegel, Dennis Ramdass, Amit Garg, Mark James Voll, Yujing Chen
  • Publication number: 20230412629
    Abstract: In one set of embodiments, a computer system can determine that one or more attacks have been or are in the process of being perpetrated against an anomaly detection system, where the anomaly detection system comprises a set of machine learning (ML) models trained to detect anomalous application programming interface (API) call behavior in a microservice-based application based on API call traces collected from the application. In response to this determination, the computer system can initiate one or more actions for securing the anomaly detection system against the one or more attacks.
    Type: Application
    Filed: June 17, 2022
    Publication date: December 21, 2023
    Inventors: Daniel Beveridge, Dennis Ramdass, Mark James Voll, Christopher Kruegel, Yujing Chen, Amit Garg
  • Publication number: 20230409714
    Abstract: In one set of embodiments, a computer system can receive one or more application programming interface (API) call traces comprising metadata of API calls made by an application and can extract features from the one or more API call traces, the extracting resulting in one or more feature vectors. The computer system can then provide the one or more feature vectors as input to one or more machine learning (ML) models, where the one or more ML models are configured to generate a prediction for each of the one or more API call traces indicating whether the API call corresponding to the API call trace is normal or anomalous.
    Type: Application
    Filed: June 17, 2022
    Publication date: December 21, 2023
    Inventors: Yujing Chen, Amit Garg, Christopher Kruegel, Dennis Ramdass, Mark James Voll
  • Patent number: 10652281
    Abstract: A technique implements network policy deployed in a tag-based policy architecture of a virtualized computing environment. One or more virtual machine instances (VMIs) may be provided by a virtual data center (VDC) of the environment, wherein each VMI includes an intermediary manager of a computing cell that also includes a guest operating system (OS) and associated applications. The tag-based policy architecture may be configured to enforce the network policy in the virtualized computing environment using cryptographically-verifiable metadata to authenticate compute resources, such as the VMIs, coupled to a computer network and to authorize access to protected resources, such as virtualized network resources of the VDC.
    Type: Grant
    Filed: August 31, 2017
    Date of Patent: May 12, 2020
    Assignee: VMware, Inc.
    Inventors: Marcel Moolenaar, Dennis Ramdass, Ramya Olichandran
  • Patent number: 10552606
    Abstract: In an approach, an intermediary guest manager operates within a virtual machine hosted by a host machine and managed by a hypervisor. The intermediary guest manager manages one or more guest operating systems operating within the virtual machine and implements one or more security services for the guest operating systems. The security services provided to the guest operating systems may include system call filtering, memory protections, secure memory dumps, and others. In some cases, the intermediary guest manager consults a threat defense policy which contains a number of records, where each record has one or more triggers representing suspicious activity and one or more actions to take in response to being triggered. When the intermediary guest manager identifies a request, such as a system call or memory access, that meets the trigger of a particular record, the intermediary guest manager executes the associated actions to remediate the suspicious activity.
    Type: Grant
    Filed: January 5, 2018
    Date of Patent: February 4, 2020
    Assignee: VMware, Inc.
    Inventors: Jason A. Lango, Dennis Ramdass, James J. Voll
  • Patent number: 10216531
    Abstract: Techniques for virtual machine shifting are described. An apparatus may comprise shifting component operative to shift a virtual machine (VM) between a hypervisor having one type of hypervisor platform and a destination hypervisor having an alternative type of hypervisor platform through use of a clone of the VM. The shifting is bi-directional between the host and the destination hypervisor. The apparatus may comprise a universal application programming interface (API) used for reconfiguring one or more network interfaces and one or more disks of the VM onto the destination hypervisor. Other embodiments are described and claimed.
    Type: Grant
    Filed: October 31, 2014
    Date of Patent: February 26, 2019
    Assignee: NETAPP, INC.
    Inventors: Barry Shilmover, Akshay Deodhar, Dennis Ramdass, Glenn Sizemore
  • Publication number: 20180293378
    Abstract: In an approach, an intermediary guest manager operates within a virtual machine hosted by a host machine and managed by a hypervisor. The intermediary guest manager manages one or more guest operating systems operating within the virtual machine and implements one or more security services for the guest operating systems. The security services provided to the guest operating systems may include system call filtering, memory protections, secure memory dumps, and others. In some cases, the intermediary guest manager consults a threat defense policy which contains a number of records, where each record has one or more triggers representing suspicious activity and one or more actions to take in response to being triggered. When the intermediary guest manager identifies a request, such as a system call or memory access, that meets the trigger of a particular record, the intermediary guest manager executes the associated actions to remediate the suspicious activity.
    Type: Application
    Filed: January 5, 2018
    Publication date: October 11, 2018
    Inventors: JASON A. LANGO, DENNIS RAMDASS, JAMES J. VOLL
  • Patent number: 9892256
    Abstract: In an approach, an intermediary guest manager operates within a virtual machine hosted by a host machine and managed by a hypervisor. The intermediary guest manager manages one or more guest operating systems operating within the virtual machine and implements one or more security services for the guest operating systems. The security services provided to the guest operating systems may include system call filtering, memory protections, secure memory dumps, and others. In some cases, the intermediary guest manager consults a threat defense policy which contains a number of records, where each record has one or more triggers representing suspicious activity and one or more actions to take in response to being triggered. When the intermediary guest manager identifies a request, such as a system call or memory access, that meets the trigger of a particular record, the intermediary guest manager executes the associated actions to remediate the suspicious activity.
    Type: Grant
    Filed: April 10, 2017
    Date of Patent: February 13, 2018
    Assignee: Bracket Computing, Inc.
    Inventors: Jason A. Lango, Dennis Ramdass, James J. Voll
  • Patent number: 9280289
    Abstract: One or more techniques and/or systems are provided for detecting misalignment between a virtual data format and an underlying data format. A virtual data object, such as a virtual machine, may be stored within a storage device using an underlying data format. The virtual data object may comprise one or more virtual data structures, such as a virtual partition. The virtual partition may be stored within the virtual data object according to a virtual data format. The virtual data format may be compared with the underlying data format to determine whether the virtual data structure is misaligned within the storage device. Such misalignment may lead to virtual data blocks of the virtual data structure overlapping underlying data blocks, which may degrade (e.g., I/O) performance. Accordingly, one or more misaligned virtual data structures may be realigned within the storage device to address misalignment and/or improve performance.
    Type: Grant
    Filed: June 30, 2011
    Date of Patent: March 8, 2016
    Assignee: NETAPP, INC.
    Inventors: Dennis Ramdass, Stephanie Zhimao He
  • Patent number: 9231957
    Abstract: Data identifying server storage devices and logical storage entities is received. A storage object model based on the received data is generated. A first user type is associated with the server storage devices and logical storage entities. A second user type is associated with the logical storage entities. A first user is allowed to access data associated with the sever storage devices and the logical storage entities in response to determining that the first user is identified as the first user type. A second user is allowed to access data associated with the logical storage entities and not allowed to access data associated with the server storage devices in response to determining that the second user is identified as the second user type.
    Type: Grant
    Filed: May 2, 2014
    Date of Patent: January 5, 2016
    Assignee: NetApp, Inc.
    Inventors: Dennis Ramdass, Stephanie Zhimao He
  • Publication number: 20150324217
    Abstract: Techniques for virtual machine shifting are described. An apparatus may comprise shifting component operative to shift a virtual machine (VM) between a hypervisor having one type of hypervisor platform and a destination hypervisor having an alternative type of hypervisor platform through use of a clone of the VM. The shifting is bi-directional between the host and the destination hypervisor. The apparatus may comprise a universal application programming interface (API) used for reconfiguring one or more network interfaces and one or more disks of the VM onto the destination hypervisor. Other embodiments are described and claimed.
    Type: Application
    Filed: October 31, 2014
    Publication date: November 12, 2015
    Applicant: NETAPP, INC.
    Inventors: Barry Shilmover, Akshay Deodhar, Dennis Ramdass, Glenn Sizemore
  • Publication number: 20150113619
    Abstract: A method, non-transitory computer readable medium, and device that monitors and controls a storage environment includes receiving object data corresponding to a storage environment, the object data comprising data corresponding to physical and logical storage entities. A storage object model which associates physical and logical storage entities in a database is generated. An administrator-level user authentication configured to provide an administrator with access to information in the generated object model which corresponds to both physical and logical storage entities is generated. A user authentication configured to provide a user with access to information in the generated object model that corresponds to logical storage entities assigned to the user is generated. A dashboard configured to receive authentication information from either of an administrator-level or the user and to display information in accordance with a received authentication is provided.
    Type: Application
    Filed: May 2, 2014
    Publication date: April 23, 2015
    Applicant: NetApp, Inc.
    Inventors: Dennis Ramdass, Stephanie Zhimao He
  • Publication number: 20150032839
    Abstract: Systems and methods for managing storage entities in a storage network are provided. Embodiments may provide a group of management devices to manage a plurality of storage entities in the storage network. In some instances, a storage entity hierarchy for the plurality of storage entities may be identified. At least one of a load or a health associated with a management device of the group of management devices may, in embodiments, be determined. In some embodiments, the plurality of storage entities may be managed in accordance with the identified storage entity hierarchy and based, at least in part, on the determined at least one of a load or a health.
    Type: Application
    Filed: July 26, 2013
    Publication date: January 29, 2015
    Applicant: NetApp, Inc.
    Inventors: Sergey Serokurov, Stephanie He, Dennis Ramdass