Patents by Inventor Dennis Ramdass
Dennis Ramdass has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230409412Abstract: In one set of embodiments, a computer system can receive one or more application programming interface (API) call traces comprising metadata of API calls made by a microservice-based application and can evaluate the one or more API call traces against a baseline of normal API call behavior for the application. The computer system can then generate, based on the evaluation, a prediction for each of the one or more API call traces indicating whether the API call corresponding to the API call trace is normal or anomalous.Type: ApplicationFiled: June 17, 2022Publication date: December 21, 2023Inventors: Christopher Kruegel, Dennis Ramdass, Amit Garg, Mark James Voll, Yujing Chen
-
Publication number: 20230412629Abstract: In one set of embodiments, a computer system can determine that one or more attacks have been or are in the process of being perpetrated against an anomaly detection system, where the anomaly detection system comprises a set of machine learning (ML) models trained to detect anomalous application programming interface (API) call behavior in a microservice-based application based on API call traces collected from the application. In response to this determination, the computer system can initiate one or more actions for securing the anomaly detection system against the one or more attacks.Type: ApplicationFiled: June 17, 2022Publication date: December 21, 2023Inventors: Daniel Beveridge, Dennis Ramdass, Mark James Voll, Christopher Kruegel, Yujing Chen, Amit Garg
-
Publication number: 20230409714Abstract: In one set of embodiments, a computer system can receive one or more application programming interface (API) call traces comprising metadata of API calls made by an application and can extract features from the one or more API call traces, the extracting resulting in one or more feature vectors. The computer system can then provide the one or more feature vectors as input to one or more machine learning (ML) models, where the one or more ML models are configured to generate a prediction for each of the one or more API call traces indicating whether the API call corresponding to the API call trace is normal or anomalous.Type: ApplicationFiled: June 17, 2022Publication date: December 21, 2023Inventors: Yujing Chen, Amit Garg, Christopher Kruegel, Dennis Ramdass, Mark James Voll
-
Patent number: 10652281Abstract: A technique implements network policy deployed in a tag-based policy architecture of a virtualized computing environment. One or more virtual machine instances (VMIs) may be provided by a virtual data center (VDC) of the environment, wherein each VMI includes an intermediary manager of a computing cell that also includes a guest operating system (OS) and associated applications. The tag-based policy architecture may be configured to enforce the network policy in the virtualized computing environment using cryptographically-verifiable metadata to authenticate compute resources, such as the VMIs, coupled to a computer network and to authorize access to protected resources, such as virtualized network resources of the VDC.Type: GrantFiled: August 31, 2017Date of Patent: May 12, 2020Assignee: VMware, Inc.Inventors: Marcel Moolenaar, Dennis Ramdass, Ramya Olichandran
-
Patent number: 10552606Abstract: In an approach, an intermediary guest manager operates within a virtual machine hosted by a host machine and managed by a hypervisor. The intermediary guest manager manages one or more guest operating systems operating within the virtual machine and implements one or more security services for the guest operating systems. The security services provided to the guest operating systems may include system call filtering, memory protections, secure memory dumps, and others. In some cases, the intermediary guest manager consults a threat defense policy which contains a number of records, where each record has one or more triggers representing suspicious activity and one or more actions to take in response to being triggered. When the intermediary guest manager identifies a request, such as a system call or memory access, that meets the trigger of a particular record, the intermediary guest manager executes the associated actions to remediate the suspicious activity.Type: GrantFiled: January 5, 2018Date of Patent: February 4, 2020Assignee: VMware, Inc.Inventors: Jason A. Lango, Dennis Ramdass, James J. Voll
-
Patent number: 10216531Abstract: Techniques for virtual machine shifting are described. An apparatus may comprise shifting component operative to shift a virtual machine (VM) between a hypervisor having one type of hypervisor platform and a destination hypervisor having an alternative type of hypervisor platform through use of a clone of the VM. The shifting is bi-directional between the host and the destination hypervisor. The apparatus may comprise a universal application programming interface (API) used for reconfiguring one or more network interfaces and one or more disks of the VM onto the destination hypervisor. Other embodiments are described and claimed.Type: GrantFiled: October 31, 2014Date of Patent: February 26, 2019Assignee: NETAPP, INC.Inventors: Barry Shilmover, Akshay Deodhar, Dennis Ramdass, Glenn Sizemore
-
Publication number: 20180293378Abstract: In an approach, an intermediary guest manager operates within a virtual machine hosted by a host machine and managed by a hypervisor. The intermediary guest manager manages one or more guest operating systems operating within the virtual machine and implements one or more security services for the guest operating systems. The security services provided to the guest operating systems may include system call filtering, memory protections, secure memory dumps, and others. In some cases, the intermediary guest manager consults a threat defense policy which contains a number of records, where each record has one or more triggers representing suspicious activity and one or more actions to take in response to being triggered. When the intermediary guest manager identifies a request, such as a system call or memory access, that meets the trigger of a particular record, the intermediary guest manager executes the associated actions to remediate the suspicious activity.Type: ApplicationFiled: January 5, 2018Publication date: October 11, 2018Inventors: JASON A. LANGO, DENNIS RAMDASS, JAMES J. VOLL
-
Patent number: 9892256Abstract: In an approach, an intermediary guest manager operates within a virtual machine hosted by a host machine and managed by a hypervisor. The intermediary guest manager manages one or more guest operating systems operating within the virtual machine and implements one or more security services for the guest operating systems. The security services provided to the guest operating systems may include system call filtering, memory protections, secure memory dumps, and others. In some cases, the intermediary guest manager consults a threat defense policy which contains a number of records, where each record has one or more triggers representing suspicious activity and one or more actions to take in response to being triggered. When the intermediary guest manager identifies a request, such as a system call or memory access, that meets the trigger of a particular record, the intermediary guest manager executes the associated actions to remediate the suspicious activity.Type: GrantFiled: April 10, 2017Date of Patent: February 13, 2018Assignee: Bracket Computing, Inc.Inventors: Jason A. Lango, Dennis Ramdass, James J. Voll
-
Patent number: 9280289Abstract: One or more techniques and/or systems are provided for detecting misalignment between a virtual data format and an underlying data format. A virtual data object, such as a virtual machine, may be stored within a storage device using an underlying data format. The virtual data object may comprise one or more virtual data structures, such as a virtual partition. The virtual partition may be stored within the virtual data object according to a virtual data format. The virtual data format may be compared with the underlying data format to determine whether the virtual data structure is misaligned within the storage device. Such misalignment may lead to virtual data blocks of the virtual data structure overlapping underlying data blocks, which may degrade (e.g., I/O) performance. Accordingly, one or more misaligned virtual data structures may be realigned within the storage device to address misalignment and/or improve performance.Type: GrantFiled: June 30, 2011Date of Patent: March 8, 2016Assignee: NETAPP, INC.Inventors: Dennis Ramdass, Stephanie Zhimao He
-
Patent number: 9231957Abstract: Data identifying server storage devices and logical storage entities is received. A storage object model based on the received data is generated. A first user type is associated with the server storage devices and logical storage entities. A second user type is associated with the logical storage entities. A first user is allowed to access data associated with the sever storage devices and the logical storage entities in response to determining that the first user is identified as the first user type. A second user is allowed to access data associated with the logical storage entities and not allowed to access data associated with the server storage devices in response to determining that the second user is identified as the second user type.Type: GrantFiled: May 2, 2014Date of Patent: January 5, 2016Assignee: NetApp, Inc.Inventors: Dennis Ramdass, Stephanie Zhimao He
-
Publication number: 20150324217Abstract: Techniques for virtual machine shifting are described. An apparatus may comprise shifting component operative to shift a virtual machine (VM) between a hypervisor having one type of hypervisor platform and a destination hypervisor having an alternative type of hypervisor platform through use of a clone of the VM. The shifting is bi-directional between the host and the destination hypervisor. The apparatus may comprise a universal application programming interface (API) used for reconfiguring one or more network interfaces and one or more disks of the VM onto the destination hypervisor. Other embodiments are described and claimed.Type: ApplicationFiled: October 31, 2014Publication date: November 12, 2015Applicant: NETAPP, INC.Inventors: Barry Shilmover, Akshay Deodhar, Dennis Ramdass, Glenn Sizemore
-
Publication number: 20150113619Abstract: A method, non-transitory computer readable medium, and device that monitors and controls a storage environment includes receiving object data corresponding to a storage environment, the object data comprising data corresponding to physical and logical storage entities. A storage object model which associates physical and logical storage entities in a database is generated. An administrator-level user authentication configured to provide an administrator with access to information in the generated object model which corresponds to both physical and logical storage entities is generated. A user authentication configured to provide a user with access to information in the generated object model that corresponds to logical storage entities assigned to the user is generated. A dashboard configured to receive authentication information from either of an administrator-level or the user and to display information in accordance with a received authentication is provided.Type: ApplicationFiled: May 2, 2014Publication date: April 23, 2015Applicant: NetApp, Inc.Inventors: Dennis Ramdass, Stephanie Zhimao He
-
Publication number: 20150032839Abstract: Systems and methods for managing storage entities in a storage network are provided. Embodiments may provide a group of management devices to manage a plurality of storage entities in the storage network. In some instances, a storage entity hierarchy for the plurality of storage entities may be identified. At least one of a load or a health associated with a management device of the group of management devices may, in embodiments, be determined. In some embodiments, the plurality of storage entities may be managed in accordance with the identified storage entity hierarchy and based, at least in part, on the determined at least one of a load or a health.Type: ApplicationFiled: July 26, 2013Publication date: January 29, 2015Applicant: NetApp, Inc.Inventors: Sergey Serokurov, Stephanie He, Dennis Ramdass