Patents by Inventor Alexander Poylisher

Alexander Poylisher has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9654499
    Abstract: A computer system, method, and computer program product for mitigating TOCTOU attacks, which includes: as processor requesting measurements representing operation of a first process on a host that is untrusted and based on the requesting, obtaining the measurements, which include a checksum that is a result of a second process executing checksum code to verify at least one last branch record on the host. A processor also determined, based on the measurements, whether the first process was compromised.
    Type: Grant
    Filed: June 18, 2015
    Date of Patent: May 16, 2017
    Assignee: Vencore Labs, Inc.
    Inventors: Angelo Sapello, Abhrajit Ghosh, Alexander Poylisher, C. Jason Chiang, Ayumu Kubota, Takashi Matsunaka
  • Patent number: 9386030
    Abstract: An apparatus and method predict and detect network attacks by using a diverse set of indicators to measure aspects of the traffic and by encoding traffic characteristics using these indicators of potential attacks or anomalous behavior. The set of indicators is analyzed by supervised learning to automatically learn a decision rule which examines the temporal patterns in the coded values of the set of indicators to accurately detect and predict network attacks. The rules automatically evolve in response to new attacks as the system updates its rules periodically by analyzing new data and feedback signals about attacks associated with that data. To assist human operators, the system also provides human interpretable explanations of detection and prediction rules by pointing to indicators whose values contribute to a decision that there is an existing network attack or an imminent network attack. When such indictors are detected, an operator can take remediation actions.
    Type: Grant
    Filed: September 17, 2013
    Date of Patent: July 5, 2016
    Assignee: VENCORE LABS, INC.
    Inventors: Akshay Vashist, Ritu Chadha, Abhrajit Ghosh, Alexander Poylisher, Yukiko Sawaya, Akira Yamada, Ayumu Kubota
  • Publication number: 20150373046
    Abstract: A computer system, method, and computer program product for mitigating TOCTOU attacks, which includes: as processor requesting measurements representing operation of a first process on a host that is untrusted and based on the requesting, obtaining the measurements, which include a checksum that is a result of a second process executing checksum code to verify at least one last branch record on the host. A processor also determined, based on the measurements, whether the first process was compromised.
    Type: Application
    Filed: June 18, 2015
    Publication date: December 24, 2015
    Inventors: Angelo Sapello, Abhrajit Ghosh, Alexander Poylisher, C. Jason Chiang, Ayumu Kubota, Takashi Matsunaka
  • Patent number: 8874776
    Abstract: A virtual ad hoc network testbed provides the capability to instrument a testbed in order to support the execution of network-aware applications “as is.” Network aware applications are a special class of applications that interact with a network not only by using the network for communication purposes, but also configure or read the status of network devices. Local stack management provides the means to automatically construct standard APIs for accessing the information residing in a simulated or emulated network, and instantiate these APIs. The testbed is designed to bridge a standard management module (such as SNMP) and a simulation or emulation model, starting from a MIB module. The testbed uses CORBA as a communication means. The process is divided into two parts, agent side and model side.
    Type: Grant
    Filed: March 8, 2011
    Date of Patent: October 28, 2014
    Assignee: Telcordia Technologies, Inc.
    Inventors: Constantin Serban, Alexander Poylisher, Cho-Yu Jason Chiang
  • Patent number: 8769068
    Abstract: A system and method for policy based management for a high security MANET comprises policy managers, each performing policy decision-making and policy enforcement using multiple policies, containers, each related to an application and each container having one policy manager, nodes, each having an infrastructure and at least one container, and dynamic community building blocks associating the containers having a same application, the containers being in different nodes, the associated containers maintained by the dynamic community building blocks on a secure network. Each container can define a security boundary around the node. Each container can be a lightweight virtual machine. The system can also have a special container having a policy manager only evaluating policies for conflicts. In one embodiment, a node can consist of multiple network devices and each network device is a container of its own.
    Type: Grant
    Filed: February 24, 2010
    Date of Patent: July 1, 2014
    Assignee: Telcordia Technologies, Inc.
    Inventors: D. Scott Alexander, Yuu-Heng Cheng, Alexander Poylisher
  • Publication number: 20140082730
    Abstract: An apparatus and method predict and detect network attacks by using a diverse set of indicators to measure aspects of the traffic and by encoding traffic characteristics using these indicators of potential attacks or anomalous behavior. The set of indicators is analyzed by supervised learning to automatically learn a decision rule which examines the temporal patterns in the coded values of the set of indicators to accurately detect and predict network attacks. The rules automatically evolve in response to new attacks as the system updates its rules periodically by analyzing new data and feedback signals about attacks associated with that data. To assist human operators, the system also provides human interpretable explanations of detection and prediction rules by pointing to indicators whose values contribute to a decision that there is an existing network attack or an imminent network attack. When such indictors are detected, an operator can take remediation actions.
    Type: Application
    Filed: September 17, 2013
    Publication date: March 20, 2014
    Inventors: Akshay VASHIST, Ritu CHADHA, Abhrajit GHOSH, Alexander POYLISHER, Yukiko SAWAYA, Akira YAMADA, Ayumu KUBOTA
  • Patent number: 8665715
    Abstract: Network management for providing and managing Quality of Service (QoS) in converged networks, and particularly management of bursty, short-lived data loads, in an opaque network where knowledge of or control over network elements is not required. Preferential treatment is provided to some subset of the network users that require better QoS assurances from the underlying network by applying probabilistic admission control decisions in conjunction with estimated network state provides improved performance for high priority data with bursty data loads.
    Type: Grant
    Filed: May 20, 2011
    Date of Patent: March 4, 2014
    Assignee: Telcordia Technologies, Inc.
    Inventors: Abhrajit Ghosh, Alexander Poylisher, Ricardo Martija, Ritu Chadha, Latha Kant
  • Patent number: 8315186
    Abstract: The inventive system and method for improving network security, availability, and regulatory compliance, and maximizing a network comprises a network configuration component, a network inventory component, a network monitoring component, and a network assessment component, wherein information is extracted from each of the configuration, inventory, and monitoring components, the extracted information is combined and assessed in the assessment component, and the maximized network is produced using the combined information. In one embodiment, the combined information is stored in a database. In one embodiment, an XML is produced from the extracted inventory information, and this XML is converted to a canonical form.
    Type: Grant
    Filed: January 29, 2009
    Date of Patent: November 20, 2012
    Assignee: Telcordia Technologies, Inc.
    Inventors: Rajesh R. Talpade, Lisa Bahler, Alice Cheng, Alexander Poylisher, Shrirang Gadgil
  • Publication number: 20120257498
    Abstract: Network management for providing and managing Quality of Service (QoS) in converged networks, and particularly management of bursty, short-lived data loads, in an opaque network where knowledge of or control over network elements is not required. Preferential treatment is provided to some subset of the network users that require better QoS assurances from the underlying network by applying probabilistic admission control decisions in conjunction with estimated network state provides improved performance for high priority data with bursty data loads.
    Type: Application
    Filed: May 20, 2011
    Publication date: October 11, 2012
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventors: Abhrajit Ghosh, Alexander Poylisher, Ricardo Martija, Ritu Chadha, Latha Kant
  • Publication number: 20120059921
    Abstract: A virtual ad hoc network testbed provides the capability to instrument a testbed in order to support the execution of network-aware applications “as is.” Network aware applications are a special class of applications that interact with a network not only by using the network for communication purposes, but also configure or read the status of network devices. Local stack management provides the means to automatically construct standard APIs for accessing the information residing in a simulated or emulated network, and instantiate these APIs. The testbed is designed to bridge a standard management module (such as SNMP) and a simulation or emulation model, starting from a MIB module. The testbed uses CORBA as a communication means. The process is divided into two parts, agent side and model side.
    Type: Application
    Filed: March 8, 2011
    Publication date: March 8, 2012
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventors: Constantin Serban, Alexander Poylisher, Cho-Yu Jason Chiang
  • Publication number: 20120020216
    Abstract: Loads for a wireless network having a plurality of end nodes are predicted by constructing a computer data set of end-to-end pairs of the end nodes included in the network using a computer model of the network; constructing a computerized set of observables from social information about users of the network; developing a computerized learned model of predicted traffic using at least the data set and the observables; and using the computerized learned model to predict future end-to-end network traffic.
    Type: Application
    Filed: January 11, 2011
    Publication date: January 26, 2012
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventors: Akshay Vashist, Alexander Poylisher, Siun-Chuon Mau, Abhrajit Ghosh, Ritu Chadha
  • Publication number: 20110299389
    Abstract: Systems and methods for managing network congestion through detecting the closeness to network congestion. The network includes a plurality of network nodes, where each node has at least one neighboring node and each node has a buffer for a queue of packets from other nodes. The system measures queue length at a node and the node's neighboring nodes, processes the measured queue lengths to obtain patterns of fluctuations for the measured queue length. The system determines if one or more of the measured nodes are in a transition-onset status toward a phase transition point based on the obtained patterns of fluctuation and generates congestion control signals based on the determination to route network traffic away. The phase transition point corresponds to a change from a non-congestive phase of the measured nodes to a congestive phase of the measured nodes.
    Type: Application
    Filed: December 1, 2010
    Publication date: December 8, 2011
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventors: Siun-Chuon Mau, Alexander Poylisher, Akshaya Vashist, Ritu Chadha, Cho-yu Jason Chiang
  • Patent number: 7933237
    Abstract: A method and apparatus for controlling ingress to a communications network to control quality of service is described. A request to admit a new communications flow is received. A polynomial and its coefficients representing a state of the network is determined and applied to the network state plus the new communications flow to determine whether admission of the new communications flow would cause the network to operate in a stable or unstable state. In response to determining that the network would operate in the unstable state, a communications flow for the ingress device is downgraded in its quality of service. By another approach, it is determined whether the new communications flow exceeds an allocated quota of bandwidth. Admission or rejection of the communications flow can be determined.
    Type: Grant
    Filed: December 26, 2006
    Date of Patent: April 26, 2011
    Assignee: Telcordia Licensing Company, LLC
    Inventors: Farooq Anjum, Latha Kant, Alexander Poylisher, Ritu Chadha
  • Publication number: 20100217853
    Abstract: A system and method for policy based management for a high security MANET comprises policy managers, each performing policy decision-making and policy enforcement using multiple policies, containers, each related to an application and each container having one policy manager, nodes, each having an infrastructure and at least one container, and dynamic community building blocks associating the containers having a same application, the containers being in different nodes, the associated containers maintained by the dynamic community building blocks on a secure network. Each container can define a security boundary around the node. Each container can be a lightweight virtual machine. The system can also have a special container having a policy manager only evaluating policies for conflicts. In one embodiment, a node can consist of multiple network devices and each network device is a container of its own.
    Type: Application
    Filed: February 24, 2010
    Publication date: August 26, 2010
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventors: D. Scott Alexander, Yuu-Heng Cheng, Alexander Poylisher
  • Publication number: 20100042605
    Abstract: An inventive system and method for versioning relational database disjoint records comprises a relational database, configuration files translated into query files, and a version control system, wherein each query file is stored and checked into the version control system, updating a version number of the query file. Each query file comprises a set of query statements. Query files are retrieved from the version control system based on the version number or an independent data item, and put into the database for analysis. In one embodiment, one of the configuration files comprises a configuration of a device, such as a router, a switch, a firewall, or a medical record. The method comprises acquiring configuration files, changing the configuration files into query files and storing the query files, and checking each query file into a version control system, wherein the checking in updates a version number of the query file.
    Type: Application
    Filed: July 31, 2009
    Publication date: February 18, 2010
    Applicant: Telcordia Technologies, Inc.
    Inventors: Yuu-heng Cheng, Alexander Poylisher, Aditya Naidu, Rajesh Talpade, Shrirang Gadgil
  • Publication number: 20100034138
    Abstract: Our invention is a method and system for a method of providing Quality of Service (QoS) over networks that do not provide any information and only serve to carry packets. Specifically, as Traffic traverses between various user networks via an opaque network, gateways at the edge of the user networks keep a record of the packets traversing into the opaque networks and packets traversing out of the opaque network. These gateways also know about the traffic classes that each of these packets belong to. The gateways at the ingress points (the user network where the packets originate) and the gateways at the egress points (the user network where the packets terminate) coordinate amongst themselves to exchange information about the number and latency of packets exchanged between the two. This information is used by the gateway at the ingress to estimate the state of the opaque network using dynamic throughput graphs.
    Type: Application
    Filed: December 26, 2006
    Publication date: February 11, 2010
    Inventors: Farooq Anjum, Latha Kant, Alexander Poylisher, Ritu Chandha
  • Publication number: 20090190499
    Abstract: The inventive system and method for improving network security, availability, and regulatory compliance, and maximizing a network comprises a network configuration component, a network inventory component, a network monitoring component, and a network assessment component, wherein information is extracted from each of the configuration, inventory, and monitoring components, the extracted information is combined and assessed in the assessment component, and the maximized network is produced using the combined information. In one embodiment, the combined information is stored in a database. In one embodiment, an XML is produced from the extracted inventory information, and this XML is converted to a canonical form.
    Type: Application
    Filed: January 29, 2009
    Publication date: July 30, 2009
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventors: Rajesh R. Talpade, Lisa Bahler, Alice Cheng, Alexander Poylisher, Shrirang Gadgil
  • Publication number: 20080172716
    Abstract: Customizable software provides assurances about the ability of an IP network to satisfy security, regulatory and availability requirements by comprehensive vulnerability and compliance assessment of IP networks through automated analysis of configurations of devices such as routers, switches, and firewalls. The solution comprises three main approaches for testing of IP device configurations to eliminate errors that result in vulnerabilities or requirements compliance issues. The first two fall in to the “static constraint validation” category since they do not change significantly for each IP network, while the last approach involves incorporation of each specific IP network's policies/requirements. These approaches are complementary, and may be used together to satisfy all the properties described above. The first approach involves checking the configurations of devices for conformance to Best-Current-Practices provided by vendors (e.g.
    Type: Application
    Filed: September 12, 2007
    Publication date: July 17, 2008
    Inventors: Rajesh Talpade, Sanjai Narain, Yuu-Heng Cheng, Alexander Poylisher