Patents by Inventor Andrew Gorelik
Andrew Gorelik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160042477Abstract: A method for profiling entities or individuals includes automatically generating, by a profile generator executing on a first computing device, a profile of at least one of a professional and an entity. The method includes automatically analyzing, by an analysis engine executing on the first computing device, the generated profile. The method includes determining, by the analysis engine, responsive to the analysis, at least one of a level of expertise and a level of influence in an industry of the at least one of the professional and the entity. The method includes transmitting, by the analysis engine, to a second computing device, an identification of the determined level of expertise. In one embodiment, the method includes generating, by a prediction engine executing on the first computing device a prediction of a future modification to the profile.Type: ApplicationFiled: October 26, 2015Publication date: February 11, 2016Inventors: Graham Stewart Gardner, Julie Keunhee Yoo, Vinay Mohta, Puneet Batra, Vineeta Agarwala, Andrew Gorelik, Anton Shevchenko
-
Patent number: 8504879Abstract: A system for detecting network intrusions and other conditions in a network is described. The system includes a plurality of collector devices that are disposed to collect data and statistical information on packets that are sent between nodes on a network. An aggregator device is disposed to receive data and statistical information from the plurality of collector devices. The aggregator device produces a connection table that maps each node on the network to a record that stores information about traffic to or from the node. The aggregator runs processes that determine network events from aggregating of anomalies into network events.Type: GrantFiled: November 3, 2003Date of Patent: August 6, 2013Assignee: Riverbed Technology, Inc.Inventors: Massimiliano Antonio Poletto, Edward W. Kohler, Jr., Andrew Ratin, Andrew Gorelik
-
Patent number: 8479057Abstract: A system for detecting network intrusions and other conditions in a network is described. The system includes a plurality of collector devices that are disposed to collect data and statistical information on packets that are sent between nodes on a network. An aggregator device is disposed to receive data and statistical information from the plurality of collector devices. The aggregator device produces a connection table that maps each node on the network to a record that stores information about traffic to or from the node. The aggregator runs processes that determine network events from aggregating of anomalies into network events.Type: GrantFiled: November 3, 2003Date of Patent: July 2, 2013Assignee: Riverbed Technology, Inc.Inventors: Massimiliano Antonio Poletto, Andrew Ratin, Andrew Gorelik
-
Patent number: 7743415Abstract: A system architecture for thwarting denial of service attacks on a victim data center is described. The system includes a first plurality of data monitors that monitor network traffic flow through the network. The first plurality of monitors is disposed at a second plurality of points in the network. The system includes a central controller that receives data from the plurality of monitors, over a hardened, redundant network. The central controller analyzes network traffic statistics to identify malicious network traffic. In one embodiment, a gateway device is disposed to pass network packets between the network and the victim site. The gateway includes a computing device executing a process to build a histogram for any attribute or function of an attribute of network packets and a process to determine if the values of the attribute exceed normal, threshold values expected for the attribute to indicate an attack on the site.Type: GrantFiled: January 31, 2002Date of Patent: June 22, 2010Assignee: Riverbed Technology, Inc.Inventors: Massimiliano Antonio Poletto, Andrew Ratin, Andrew Gorelik
-
Patent number: 7706273Abstract: Techniques for tracking dynamically negotiated port connections in a network include collecting statistical information on packets that are sent between nodes on a network, inspecting packets of control connections to detect payload fragments that denote ephemeral port negotiation and producing a mapping from a ephemeral connection flow_id to a control connection flow_id. The techniques also include checking the flow_id to see whether a flow record maps to a control connection.Type: GrantFiled: September 30, 2004Date of Patent: April 27, 2010Assignee: Riverbed Technology, Inc.Inventors: Massimiliano Antonio Poletto, Andrew Gorelik
-
Publication number: 20060067220Abstract: Techniques for tracking dynamically negotiated port connections in a network include collecting statistical information on packets that are sent between nodes on a network, inspecting packets of control connections to detect payload fragments that denote ephemeral port negotiation and producing a mapping from a ephemeral connection flow_id to a control connection flow_id. The techniques also include checking the flow_id to see whether a flow record maps to a control connection.Type: ApplicationFiled: September 30, 2004Publication date: March 30, 2006Applicant: Mazu Networks, Inc.Inventors: Massimiliano Poletto, Andrew Gorelik
-
Publication number: 20040221190Abstract: A system for detecting network intrusions and other conditions in a network is described. The system includes a plurality of collector devices that are disposed to collect data and statistical information on packets that are sent between nodes on a network. An aggregator device is disposed to receive data and statistical information from the plurality of collector devices. The aggregator device produces a connection table that maps each node on the network to a record that stores information about traffic to or from the node. The aggregator runs processes that determine network events from aggregating of anomalies into network events.Type: ApplicationFiled: November 3, 2003Publication date: November 4, 2004Inventors: Massimiliano Antonio Roletto, Andrew Retin, Andrew Gorelik
-
Publication number: 20040205374Abstract: A system for detecting network intrusions and other conditions in a network is described. The system includes a plurality of collector devices that are disposed to collect data and statistical information on packets that are sent between nodes on a network. An aggregator device is disposed to receive data and statistical information from the plurality of collector devices. The aggregator device produces a connection table that maps each node on the network to a record that stores information about traffic to or from the node. The aggregator runs processes that determine network events from aggregating of anomalies into network events.Type: ApplicationFiled: November 3, 2003Publication date: October 14, 2004Inventors: Massimiliano Antonio Poletto, Edward W. Kohler, Andrew Ratin, Andrew Gorelik
-
Publication number: 20030145232Abstract: A system architecture for thwarting denial of service attacks on a victim data center is described. The system includes a first plurality of data monitors that monitor network traffic flow through the network. The first plurality of monitors is disposed at a second plurality of points in the network. The system includes a central controller that receives data from the plurality of monitors, over a hardened, redundant network. The central controller analyzes network traffic statistics to identify malicious network traffic. In one embodiment, a gateway device is disposed to pass network packets between the network and the victim site. The gateway includes a computing device executing a process to build a histogram for any attribute or function of an attribute of network packets and a process to determine if the values of the attribute exceed normal, threshold values expected for the attribute to indicate an attack on the site.Type: ApplicationFiled: January 31, 2002Publication date: July 31, 2003Inventors: Massimiliano Antonio Poletto, Andrew Ratin, Andrew Gorelik