Patents by Inventor Dmitry Rovniaguin

Dmitry Rovniaguin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9985976
    Abstract: A method, non-transitory computer readable medium, and device that identifies network traffic characteristics to correlate and manage one or more subsequent flows includes transmitting a monitoring request comprising one or more attributes extracted from an HTTP request received from a client computing device and a timestamp to a monitoring server to correlate one or more subsequent flows associated with the HTTP request. The HTTP request is transmitted to an application server after receiving an acknowledgement response to the monitoring request from the monitoring server. An HTTP response to the HTTP request is received from the application server. An operation with respect to the HTTP response is performed.
    Type: Grant
    Filed: February 1, 2016
    Date of Patent: May 29, 2018
    Assignee: F5 Networks, Inc.
    Inventors: Dmitry Rovniaguin, Ephraim Dan, Ron Talmor
  • Patent number: 9906452
    Abstract: Embodiments are directed towards managing communication over a network assist application classification using predicted subscriber behavior. Subscriber information associated with a network flow may be determined. Prediction information that includes application identifiers may be generated based on the subscriber information. A classification engine may determine the applications associated with the network flow based on the prediction information and the network flow using a plurality of application classifiers that correspond to the applications. If an application identifier included in the prediction information is correspondent to an application classifier, the application may be determined based on the correspondent application classifier; otherwise the application is determined based on the remainder of the application classifiers. A policy for managing the network flow may be determined based on the determined application.
    Type: Grant
    Filed: May 29, 2014
    Date of Patent: February 27, 2018
    Assignee: F5 Networks, Inc.
    Inventors: Gennady Dosovitsky, Dmitry Rovniaguin, Amir Harush, Ron Talmor, Dan Eliezer Karpati, Assaf Jacob Mendelson
  • Patent number: 9866489
    Abstract: Embodiments are directed towards managing communication over a network with a packet traffic management device that performs delayed proxy action. The PTMD includes a buffer for buffering network traffic. Also, the PTMD includes proxy data paths and standard data paths. Network policies associated with the network flows may be determined using the buffered data. If a determined network policy includes proxy policy rules it is a proxy network policy. Then the network flows are associated with a proxy data path. If the buffer is exhausted, the network flow is associated with a standard data path before a policy is determined. Otherwise, if the network policy includes only standard policy rules, the network flows are moved to a standard data path. After the network flow is associated with a data path, the network traffic may be communicated until it is closed or otherwise terminated.
    Type: Grant
    Filed: July 11, 2014
    Date of Patent: January 9, 2018
    Assignee: F5 Networks, Inc.
    Inventors: Gennady Dosovitsky, Dmitry Rovniaguin, Sumandra Majee, Ron Talmor
  • Patent number: 9485158
    Abstract: A method, non-transitory computer readable medium and an multi-blade network traffic manager device that assists with aggregating per-session statistics on a clustered system includes receiving a request for a HTTP transaction. Presence of a cookie within the received request is determined. One or more actions is performed based on the determination of the presence of the cookie to prepare for aggregating session statistics within a clustered system. Session statistics information is aggregated upon performing the one or more actions and completing the request for the HTTP transaction.
    Type: Grant
    Filed: November 6, 2014
    Date of Patent: November 1, 2016
    Assignee: F5 Networks, Inc.
    Inventors: Peter Finkelshtein, Dmitry Rovniaguin
  • Publication number: 20160234230
    Abstract: A method and network traffic management device to protect a network from network based attacks is disclosed. The method comprises receiving, at a network traffic management device, a plurality of requests from a plurality of client devices for one or more resources from one or more servers. The method comprises monitoring a number of server responses including an invalid transaction message for a particular client device or a particular requested resource. The method comprises comparing a ratio of invalid transactions to valid transactions for the particular client device or requested resource to a preestablished ratio threshold value. The method comprises marking the particular client device or requested resource as suspicious when the ratio exceeds the ratio threshold value. The method comprises preventing the suspicious particular client device or requested resource from being transmitted to the one or more servers when the network traffic management device detects a network attack.
    Type: Application
    Filed: October 5, 2015
    Publication date: August 11, 2016
    Inventor: Dmitry Rovniaguin
  • Patent number: 9282116
    Abstract: A method and network traffic management device to protect a network from network based attacks is disclosed. The method comprises receiving, at a network traffic management device, a plurality of requests from a plurality of client devices for one or more resources from one or more servers. The method comprises monitoring a number of server responses including an invalid transaction message for a particular client device or a particular requested resource. The method comprises comparing a ratio of invalid transactions to valid transactions for the particular client device or requested resource to a preestablished ratio threshold value. The method comprises marking the particular client device or requested resource as suspicious when the ratio exceeds the ratio threshold value. The method comprises preventing the suspicious particular client device or requested resource from being transmitted to the one or more servers when the network traffic management device detects a network attack.
    Type: Grant
    Filed: September 18, 2013
    Date of Patent: March 8, 2016
    Assignee: F5 Networks, Inc.
    Inventor: Dmitry Rovniaguin
  • Patent number: 9270766
    Abstract: A method, non-transitory computer readable medium, and device that identifies network traffic characteristics to correlate and manage one or more subsequent flows includes transmitting a monitoring request comprising one or more attributes extracted from an HTTP request received from a client computing device and a timestamp to a monitoring server to correlate one or more subsequent flows associated with the HTTP request. The HTTP request is transmitted to an application server after receiving an acknowledgement response to the monitoring request from the monitoring server. An HTTP response to the HTTP request is received from the application server. An operation with respect to the HTTP response is performed.
    Type: Grant
    Filed: December 30, 2011
    Date of Patent: February 23, 2016
    Assignee: F5 Networks, Inc.
    Inventors: Dmitry Rovniaguin, Ephraim Dan, Ron Talmor
  • Publication number: 20160014033
    Abstract: Embodiments are directed towards managing communication over a network with a packet traffic management device that performs delayed proxy action. The PTMD includes a buffer for buffering network traffic. Also, the PTMD includes proxy data paths and standard data paths. Network policies associated with the network flows may be determined using the buffered data. If a determined network policy includes proxy policy rules it is a proxy network, policy. Then the network flows are associated with a proxy data path. If the buffer is exhausted, the network flow is associated with a standard data path before a policy is determined. Otherwise, if the network policy includes only standard policy rules, the network flows are moved to a standard data path. After the network flow is associated with a data path, the network traffic may be communicated until it is closed or otherwise terminated.
    Type: Application
    Filed: July 11, 2014
    Publication date: January 14, 2016
    Applicant: F5 Networks, Inc.
    Inventors: Gennady Dosovitsky, Dmitry Rovniaguin, Sumandra Majee, Ron Talmor
  • Publication number: 20130173779
    Abstract: A method, non-transitory computer readable medium, and device that identifies network traffic characteristics to correlate and manage one or more subsequent flows includes transmitting a monitoring request comprising one or more attributes extracted from an HTTP request received from a client computing device and a timestamp to a monitoring server to correlate one or more subsequent flows associated with the HTTP request. The HTTP request is transmitted to an application server after receiving an acknowledgement response to the monitoring request from the monitoring server. An HTTP response to the HTTP request is received from the application server. An operation with respect to the HTTP response is performed.
    Type: Application
    Filed: December 30, 2011
    Publication date: July 4, 2013
    Applicant: F5 NETWORKS, INC.
    Inventors: Dmitry Rovniaguin, Ephraim Dan, Ron Talmor