Patents by Inventor Edward W. Kohler

Edward W. Kohler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8504879
    Abstract: A system for detecting network intrusions and other conditions in a network is described. The system includes a plurality of collector devices that are disposed to collect data and statistical information on packets that are sent between nodes on a network. An aggregator device is disposed to receive data and statistical information from the plurality of collector devices. The aggregator device produces a connection table that maps each node on the network to a record that stores information about traffic to or from the node. The aggregator runs processes that determine network events from aggregating of anomalies into network events.
    Type: Grant
    Filed: November 3, 2003
    Date of Patent: August 6, 2013
    Assignee: Riverbed Technology, Inc.
    Inventors: Massimiliano Antonio Poletto, Edward W. Kohler, Jr., Andrew Ratin, Andrew Gorelik
  • Patent number: 7929534
    Abstract: A plurality of flow collector devices is disposed to collect flow information on a network. Duplicate flow records received from the flow collectors are eliminated by determining whether a pair of flow records has the same, source and destination flow identifiers and were received within a predefined time-period. Non-duplicated flow records received from the plurality of flow collector devices are stored and used to produces a connection table that maps each node on the network to a record that stores information about traffic to or from the node from non-duplicated flow records. The connection table stores statistical information of packets on the network based on a time-slice basis.
    Type: Grant
    Filed: June 28, 2004
    Date of Patent: April 19, 2011
    Assignee: Riverbed Technology, Inc.
    Inventors: Massimiliano Antonio Poletto, Andrew Ratin, Edward W. Kohler, Jr.
  • Patent number: 7836498
    Abstract: A system architecture for thwarting denial of service attacks on a victim data center is described. The system includes a first plurality of monitors that monitor network traffic flow through the network. The first plurality of monitors is disposed at a second plurality of points in the network. The system includes a central controller that receives data from the plurality of monitors, over a hardened, redundant network. The central controller analyzes network traffic statistics to identify malicious network traffic. In some embodiments of the system, a gateway device is disposed to pass network packets between the network and the victim site. The gateway is disposed to protect the victim site, and is coupled to the control center by the redundant hardened network.
    Type: Grant
    Filed: August 16, 2001
    Date of Patent: November 16, 2010
    Assignee: Riverbed Technology, Inc.
    Inventors: Massimiliano Antonio Poletto, Edward W. Kohler, Jr.
  • Patent number: 7743134
    Abstract: A system architecture for thwarting denial of service attacks on a victim data center is described. The system includes a first plurality of monitors that monitor network traffic flow through the network. The first plurality of monitors is disposed at a second plurality of points in the network. The system includes a central controller that receives data from the plurality of monitors, over a hardened, redundant network. The central controller analyzes network traffic statistics to identify malicious network traffic. In some embodiments of the system, a gateway device is disposed to pass network packets between the network and the victim site. The gateway is disposed to protect the victim site, and is coupled to the control center by the redundant hardened network.
    Type: Grant
    Filed: August 16, 2001
    Date of Patent: June 22, 2010
    Assignee: Riverbed Technology, Inc.
    Inventors: Edward W. Kohler, Jr., Massimiliano Antonio Poletto
  • Patent number: 7702806
    Abstract: A system architecture for thwarting denial of service attacks on a victim data center is described. The system includes a first plurality of monitors that monitor network traffic flow through the network. The first plurality of monitors is disposed at a second plurality of points in the network. The system includes a central controller that receives data from the plurality of monitors, over a hardened, redundant network. The central controller analyzes network traffic statistics to identify malicious network traffic. In some embodiments of the system, a gateway device is disposed to pass network packets between the network and the victim site. The gateway is disposed to protect the victim site, and is coupled to the control center by the redundant hardened network.
    Type: Grant
    Filed: August 16, 2001
    Date of Patent: April 20, 2010
    Assignee: Riverbed Technology, Inc.
    Inventors: Thomer Michael Gil, Massimiliano Antonio Poletto, Edward W. Kohler, Jr.
  • Patent number: 7664963
    Abstract: A system for detecting network intrusions and other conditions in a network is described. The system includes a plurality of collector devices that are disposed to collect data and statistical information on packets that are sent between nodes on a network. An aggregator device is disposed to receive data and statistical information from the plurality of collector devices. The aggregator device produces a connection table that maps each node on the network to a record that stores information about traffic to or from the node. The aggregator runs processes that determine network events from aggregating of anomalies into network events.
    Type: Grant
    Filed: November 3, 2003
    Date of Patent: February 16, 2010
    Assignee: Riverbed Technology, Inc.
    Inventors: Edward W. Kohler, Jr., Massimiliano Antonio Poletto, Andrew Ratin
  • Patent number: 7278159
    Abstract: A system architecture for thwarting denial of service attacks on a victim data center is described. The system includes a first plurality of monitors that monitor network traffic flow through the network. The first plurality of monitors is disposed at a second plurality of points in the network. The system includes a central controller that receives data from the plurality of monitors, over a hardened, redundant network. The central controller analyzes network traffic statistics to identify malicious network traffic. In some embodiments of the system, a gateway device is disposed to pass network packets between the network and the victim site. The gateway is disposed to protect the victim site, and is coupled to the control center by the redundant hardened network.
    Type: Grant
    Filed: August 16, 2001
    Date of Patent: October 2, 2007
    Assignee: Mazu Networks, Inc.
    Inventors: Marinus Frans Kaashoek, Edward W. Kohler, Jr., Massimiliano Antonio Poletto, Robert T. Morris
  • Patent number: 7124440
    Abstract: A system architecture for thwarting denial of service attacks on a victim data center is described. The system includes a first plurality of monitors that monitor network traffic flow through the network. The first plurality of monitors is disposed at a second plurality of points in the network. The system includes a central controller that receives data from the plurality of monitors, over a hardened, redundant network. The central controller analyzes network traffic statistics to identify malicious network traffic. In some embodiments of the system, a gateway device is disposed to pass network packets between the network and the victim site. The gateway is disposed to protect the victim site, and is coupled to the control center by the redundant hardened network.
    Type: Grant
    Filed: August 16, 2001
    Date of Patent: October 17, 2006
    Assignee: Mazu Networks, Inc.
    Inventors: Massimiliano Antonio Poletto, Edward W. Kohler, Jr.
  • Patent number: 7043759
    Abstract: A system architecture for thwarting denial of service attacks on a victim data center is described. The system includes a first plurality of monitors that monitor network traffic flow through the network. The first plurality of monitors is disposed at a second plurality of points in the network. The system includes a central controller that receives data from the plurality of monitors, over a hardened, redundant network. The central controller analyzes network traffic statistics to identify malicious network traffic. In some embodiments of the system, a gateway device is disposed to pass network packets between the network and the victim site. The gateway is disposed to protect the victim site, and is coupled to the control center by the redundant hardened network.
    Type: Grant
    Filed: August 16, 2001
    Date of Patent: May 9, 2006
    Assignee: Mazu Networks, Inc.
    Inventors: Marinus Frans Kaashoek, Edward W. Kohler, Jr., Massimiliano Antonio Poletto
  • Publication number: 20040250134
    Abstract: A system for detecting network intrusions and other conditions in a network is described. The system includes a plurality of collector devices that are disposed to collect data and statistical information on packets that are sent between nodes on a network. An aggregator device is disposed to receive data and statistical information from the plurality of collector devices. The aggregator device produces a connection table that maps each node on the network to a record that stores information about traffic to or from the node. The aggregator runs processes that determine network events from aggregating of anomalies into network events.
    Type: Application
    Filed: November 3, 2003
    Publication date: December 9, 2004
    Inventors: Edward W. Kohler, Massimiliano Antonio Poletto, Andrew Ratin
  • Publication number: 20040205374
    Abstract: A system for detecting network intrusions and other conditions in a network is described. The system includes a plurality of collector devices that are disposed to collect data and statistical information on packets that are sent between nodes on a network. An aggregator device is disposed to receive data and statistical information from the plurality of collector devices. The aggregator device produces a connection table that maps each node on the network to a record that stores information about traffic to or from the node. The aggregator runs processes that determine network events from aggregating of anomalies into network events.
    Type: Application
    Filed: November 3, 2003
    Publication date: October 14, 2004
    Inventors: Massimiliano Antonio Poletto, Edward W. Kohler, Andrew Ratin, Andrew Gorelik
  • Publication number: 20020095492
    Abstract: A system architecture for thwarting denial of service attacks on a victim data center is described. The system includes a first plurality of monitors that monitor network traffic flow through the network. The first plurality of monitors is disposed at a second plurality of points in the network. The system includes a central controller that receives data from the plurality of monitors, over a hardened, redundant network. The central controller analyzes network traffic statistics to identify malicious network traffic. In some embodiments of the system, a gateway device is disposed to pass network packets between the network and the victim site. The gateway is disposed to protect the victim site, and is coupled to the control center by the redundant hardened network.
    Type: Application
    Filed: August 16, 2001
    Publication date: July 18, 2002
    Inventors: Marinus Frans Kaashoek, Edward W. Kohler, Massimiliano Antonio Poletto, Robert T. Morris
  • Publication number: 20020035683
    Abstract: A system architecture for thwarting denial of service attacks on a victim data center is described. The system includes a first plurality of monitors that monitor network traffic flow through the network. The first plurality of monitors is disposed at a second plurality of points in the network. The system includes a central controller that receives data from the plurality of monitors, over a hardened, redundant network. The central controller analyzes network traffic statistics to identify malicious network traffic. In some embodiments of the system, a gateway device is disposed to pass network packets between the network and the victim site. The gateway is disposed to protect the victim site, and is coupled to the control center by the redundant hardened network.
    Type: Application
    Filed: August 16, 2001
    Publication date: March 21, 2002
    Inventors: Marinus Frans Kaashoek, Edward W. Kohler, Massimiliano Antonio Poletto
  • Publication number: 20020035628
    Abstract: A system architecture for thwarting denial of service attacks on a victim data center is described. The system includes a first plurality of monitors that monitor network traffic flow through the network. The first plurality of monitors is disposed at a second plurality of points in the network. The system includes a central controller that receives data from the plurality of monitors, over a hardened, redundant network. The central controller analyzes network traffic statistics to identify malicious network traffic. In some embodiments of the system, a gateway device is disposed to pass network packets between the network and the victim site. The gateway is disposed to protect the victim site, and is coupled to the control center by the redundant hardened network.
    Type: Application
    Filed: August 16, 2001
    Publication date: March 21, 2002
    Inventors: Thomer Michael Gil, Massimiliano Antonio Poletto, Edward W. Kohler
  • Publication number: 20020032774
    Abstract: A system architecture for thwarting denial of service attacks on a victim data center is described. The system includes a first plurality of monitors that monitor network traffic flow through the network. The first plurality of monitors is disposed at a second plurality of points in the network. The system includes a central controller that receives data from the plurality of monitors, over a hardened, redundant network. The central controller analyzes network traffic statistics to identify malicious network traffic. In some embodiments of the system, a gateway device is disposed to pass network packets between the network and the victim site. The gateway is disposed to protect the victim site, and is coupled to the control center by the redundant hardened network.
    Type: Application
    Filed: August 16, 2001
    Publication date: March 14, 2002
    Inventors: Edward W. Kohler, Massimiliano Antonio Poletto
  • Publication number: 20020032880
    Abstract: A system architecture for thwarting denial of service attacks on a victim data center is described. The system includes a first plurality of monitors that monitor network traffic flow through the network. The first plurality of monitors is disposed at a second plurality of points in the network. The system includes a central controller that receives data from the plurality of monitors, over a hardened, redundant network. The central controller analyzes network traffic statistics to identify malicious network traffic. In some embodiments of the system, a gateway device is disposed to pass network packets between the network and the victim site. The gateway is disposed to protect the victim site, and is coupled to the control center by the redundant hardened network.
    Type: Application
    Filed: August 16, 2001
    Publication date: March 14, 2002
    Inventors: Massimiliano Antonio Poletto, Edward W. Kohler
  • Publication number: 20020031134
    Abstract: A system architecture for thwarting denial of service attacks on a victim data center is described. The system includes a first plurality of monitors that monitor network traffic flow through the network. The first plurality of monitors is disposed at a second plurality of points in the network. The system includes a central controller that receives data from the plurality of monitors, over a hardened, redundant network. The central controller analyzes network traffic statistics to identify malicious network traffic. In some embodiments of the system, a gateway device is disposed to pass network packets between the network and the victim site. The gateway is disposed to protect the victim site, and is coupled to the control center by the redundant hardened network.
    Type: Application
    Filed: August 16, 2001
    Publication date: March 14, 2002
    Inventors: Massimiliano Antonio Poletto, Edward W. Kohler