Patents by Inventor Fabien Flacher
Fabien Flacher has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11240259Abstract: In one embodiment, a networking device at an edge of a network generates a first set of feature vectors using information regarding one or more characteristics of host devices in the network. The networking device forms the host devices into device clusters dynamically based on the first set of feature vectors. The networking device generates a second set of feature vectors using information regarding traffic associated with the device clusters. The networking device models interactions between the device clusters using a plurality of anomaly detection models that are based on the second set of feature vectors.Type: GrantFiled: July 11, 2019Date of Patent: February 1, 2022Assignee: Cisco Technology, Inc.Inventors: Jean-Philippe Vasseur, Sébastien Gay, Grégory Mermoud, Pierre-André Savalle, Alexandre Honoré, Fabien Flacher
-
Publication number: 20190334941Abstract: In one embodiment, a networking device at an edge of a network generates a first set of feature vectors using information regarding one or more characteristics of host devices in the network. The networking device forms the host devices into device clusters dynamically based on the first set of feature vectors. The networking device generates a second set of feature vectors using information regarding traffic associated with the device clusters. The networking device models interactions between the device clusters using a plurality of anomaly detection models that are based on the second set of feature vectors.Type: ApplicationFiled: July 11, 2019Publication date: October 31, 2019Inventors: Jean-Philippe Vasseur, Sébastien Gay, Grégory Mermoud, Pierre-André Savalle, Alexandre Honoré, Fabien Flacher
-
Patent number: 10404727Abstract: In one embodiment, a networking device at an edge of a network generates a first set of feature vectors using information regarding one or more characteristics of host devices in the network. The networking device forms the host devices into device clusters dynamically based on the first set of feature vectors. The networking device generates a second set of feature vectors using information regarding traffic associated with the device clusters. The networking device models interactions between the device clusters using a plurality of anomaly detection models that are based on the second set of feature vectors.Type: GrantFiled: June 8, 2016Date of Patent: September 3, 2019Assignee: Cisco Technology, Inc.Inventors: Jean-Philippe Vasseur, Sébastien Gay, Grégory Mermoud, Pierre-André Savalle, Alexandre Honoré, Fabien Flacher
-
Patent number: 10187413Abstract: In one embodiment, a supervisory device in a network receives traffic data from a security device that uses traffic signatures to assess traffic in the network. The supervisory device receives traffic data from one or more distributed learning agents that use machine learning-based anomaly detection to assess traffic in the network. The supervisory device trains a traffic classifier using the received traffic data from the security device and from the one or more distributed learning agents. The supervisory device deploys the traffic classifier to a selected one of the one or more distributed learning agents.Type: GrantFiled: July 18, 2016Date of Patent: January 22, 2019Assignee: Cisco Technology, Inc.Inventors: Jean-Philippe Vasseur, Andrea Di Pietro, Grégory Mermoud, Fabien Flacher
-
Patent number: 10182066Abstract: In one embodiment, a device in a network analyzes data indicative of a behavior of a network using a supervised anomaly detection model. The device determines whether the supervised anomaly detection model detected an anomaly in the network from the analyzed data. The device trains an unsupervised anomaly detection model, based on a determination that no anomalies were detected by the supervised anomaly detection model.Type: GrantFiled: November 2, 2017Date of Patent: January 15, 2019Assignee: Cisco Technology, Inc.Inventors: Fabien Flacher, Grégory Mermoud, Jean-Philippe Vasseur, Sukrit Dasgupta
-
Patent number: 10063575Abstract: In one embodiment, a device in a network receives an output of an anomaly detection model. The device receives state information surrounding the output of the anomaly detection model. The device determines whether the state information supports the output of the anomaly detection model. The device causes the anomaly detection model to be adjusted based on a determination that the state information does not support the output of the anomaly detection model.Type: GrantFiled: October 8, 2015Date of Patent: August 28, 2018Assignee: Cisco Technology, Inc.Inventors: Jean-Philippe Vasseur, Fabien Flacher, Grégory Mermoud
-
Patent number: 10063578Abstract: In one embodiment, a device in a network analyzes local network data regarding a portion of the network that is local to the device using a first anomaly detection model. The device analyzes the local network data using a second anomaly detection model that was trained in part using remote network data regarding a portion of the network that is remote to the device. The device compares outputs of the first and second anomaly detection models. The device identifies the local network data as peculiar, in response to the first anomaly detection model determining the local network data to be normal and the second anomaly detection model determining the local network data to be anomalous.Type: GrantFiled: April 7, 2016Date of Patent: August 28, 2018Assignee: Cisco Technology, Inc.Inventors: Fabien Flacher, Jean-Philippe Vasseur, Grégory Mermoud
-
Publication number: 20180124086Abstract: In one embodiment, a device in a network analyzes data indicative of a behavior of a network using a supervised anomaly detection model. The device determines whether the supervised anomaly detection model detected an anomaly in the network from the analyzed data. The device trains an unsupervised anomaly detection model, based on a determination that no anomalies were detected by the supervised anomaly detection model.Type: ApplicationFiled: November 2, 2017Publication date: May 3, 2018Inventors: Fabien Flacher, Grégory Mermoud, Jean-Philippe Vasseur, Sukrit Dasgupta
-
Patent number: 9838409Abstract: In one embodiment, a device in a network analyzes data indicative of a behavior of a network using a supervised anomaly detection model. The device determines whether the supervised anomaly detection model detected an anomaly in the network from the analyzed data. The device trains an unsupervised anomaly detection model, based on a determination that no anomalies were detected by the supervised anomaly detection model.Type: GrantFiled: October 8, 2015Date of Patent: December 5, 2017Assignee: Cisco Technology, Inc.Inventors: Fabien Flacher, Grégory Mermoud, Jean-Philippe Vasseur, Sukrit Dasgupta
-
Publication number: 20170310691Abstract: In one embodiment, a networking device at an edge of a network generates a first set of feature vectors using information regarding one or more characteristics of host devices in the network. The networking device forms the host devices into device clusters dynamically based on the first set of feature vectors. The networking device generates a second set of feature vectors using information regarding traffic associated with the device clusters. The networking device models interactions between the device clusters using a plurality of anomaly detection models that are based on the second set of feature vectors.Type: ApplicationFiled: June 8, 2016Publication date: October 26, 2017Inventors: Jean-Philippe Vasseur, Sébastien Gay, Grégory Mermoud, Pierre-André Savalle, Alexandre Honoré, Fabien Flacher
-
Publication number: 20170279839Abstract: In one embodiment, a supervisory device in a network receives traffic data from a security device that uses traffic signatures to assess traffic in the network. The supervisory device receives traffic data from one or more distributed learning agents that use machine learning-based anomaly detection to assess traffic in the network. The supervisory device trains a traffic classifier using the received traffic data from the security device and from the one or more distributed learning agents. The supervisory device deploys the traffic classifier to a selected one of the one or more distributed learning agents.Type: ApplicationFiled: July 18, 2016Publication date: September 28, 2017Inventors: Jean-Philippe Vasseur, Andrea Di Pietro, Grégory Mermoud, Fabien Flacher
-
Publication number: 20170279685Abstract: In one embodiment, a device in a network monitors a selective anomaly forwarding mechanism deployed in the network. The selective anomaly forwarding mechanism causes a participating node in the mechanism to selectively forward detected network anomalies to the device. The device monitors one or more resources of the network. The device determines an adjustment to the selective anomaly forwarding mechanism based on the one or more monitored resources of the network. The device implements the determined adjustment to the selective anomaly forwarding mechanism.Type: ApplicationFiled: July 18, 2016Publication date: September 28, 2017Inventors: Javier Cruz Mota, Grégory Mermoud, Jean-Philippe Vasseur, Fabien Flacher
-
Publication number: 20170104773Abstract: In one embodiment, a device in a network analyzes data indicative of a behavior of a network using a supervised anomaly detection model. The device determines whether the supervised anomaly detection model detected an anomaly in the network from the analyzed data. The device trains an unsupervised anomaly detection model, based on a determination that no anomalies were detected by the supervised anomaly detection model.Type: ApplicationFiled: October 8, 2015Publication date: April 13, 2017Inventors: Fabien Flacher, Grégory Mermoud, Jean-Philippe Vasseur, Sukrit Dasgupta
-
Publication number: 20170104774Abstract: In one embodiment, a device in a network receives an output of an anomaly detection model. The device receives state information surrounding the output of the anomaly detection model. The device determines whether the state information supports the output of the anomaly detection model. The device causes the anomaly detection model to be adjusted based on a determination that the state information does not support the output of the anomaly detection model.Type: ApplicationFiled: October 8, 2015Publication date: April 13, 2017Inventors: Jean-Philippe Vasseur, Fabien Flacher, Grégory Mermoud
-
Publication number: 20160352766Abstract: In one embodiment, a device in a network analyzes local network data regarding a portion of the network that is local to the device using a first anomaly detection model. The device analyzes the local network data using a second anomaly detection model that was trained in part using remote network data regarding a portion of the network that is remote to the device. The device compares outputs of the first and second anomaly detection models. The device identifies the local network data as peculiar, in response to the first anomaly detection model determining the local network data to be normal and the second anomaly detection model determining the local network data to be anomalous.Type: ApplicationFiled: April 7, 2016Publication date: December 1, 2016Inventors: Fabien Flacher, Jean-Philippe Vasseur, Grégory Mermoud
-
Publication number: 20120265505Abstract: A technique for simulating behaviors in a reconfigurable infrastructure represented in three dimensions and including interactive objects. Characteristics of an interactive object are described in an object profile, users in the infrastructure simulated by intelligent agents, an agent described in an agent profile including information indicating a main objective of said agent, executing a trajectory calculation process associated with a given agent including at least three steps: (1) profiles of the interactive objects are analyzed; (2) a trajectory is calculated or recalculated with the help of a path-search algorithm; (3) a check is performed to verify whether the trajectory is valid; if the trajectory is valid, the trajectory is taken into account for the movements of the intelligent agent; if the trajectory is not valid, at least one constraint included in an interactive object profile invalidating the trajectory is identified and the process is executed again from the first step.Type: ApplicationFiled: July 2, 2010Publication date: October 18, 2012Applicant: ThalesInventors: Christophe Meyer, Fabien Flacher, Nicolas Pays