Patents by Inventor Kowsik Guruswamy

Kowsik Guruswamy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7797411
    Abstract: A network device is capable of recognizing and blocking network attacks associated with packet flows regardless of whether the packet flows are encapsulated within network tunnels. For example, the network device includes a filter module that receives packets associated with a network tunnel from an ingress device to an egress device. The filter module applies heuristics to determine whether the packets encapsulate encrypted data units. If the data units are not encrypted, the filter module extracts the data units and generates temporary packets for use within the network device. An attack detection engine within the device analyzes the temporary packets to detect any network attacks carried by the encapsulated data units. A forwarding component selectively forwards the packets to the egress device based on whether any network attacks are detected.
    Type: Grant
    Filed: February 2, 2005
    Date of Patent: September 14, 2010
    Assignee: Juniper Networks, Inc.
    Inventors: Kowsik Guruswamy, Siyang Yang
  • Patent number: 7769851
    Abstract: An intrusion detection and prevention (IDP) device includes a flow analysis module, an analysis engine, a plurality of protocol-specific decoders and a profiler. The flow analysis module processes packet flows in a network to identify network elements associated with the packet flows. The analysis engine forms application-layer communications from the packet flows. The plurality of protocol-specific decoders processes the application-layer communications to generate application-layer elements. The profiler correlates the application-layer elements of the application-layer communications with the network elements of the packet flows of the computer network.
    Type: Grant
    Filed: January 27, 2005
    Date of Patent: August 3, 2010
    Assignee: Juniper Networks, Inc.
    Inventors: Kowsik Guruswamy, Siu-Wang Leung
  • Patent number: 7734752
    Abstract: Methods and apparatuses for inspecting packets are provided. A primary security system may be configured for processing packets. The primary security system may be operable to maintain flow information for a group of devices to facilitate processing of the packets. A secondary security system may be designated for processing packets upon a failover event. Flow records may be shared from the primary security system with the secondary security system.
    Type: Grant
    Filed: October 12, 2004
    Date of Patent: June 8, 2010
    Assignee: Juniper Networks, Inc.
    Inventors: Nir Zuk, Yu Ming Mao, Kowsik Guruswamy
  • Patent number: 7733956
    Abstract: The present invention provides an apparatus and method for encoding, storing, transmitting and decoding multimedia information in the form of scalable, streamed digital data. A base stream containing basic informational content and subsequent streams containing additive informational content are initially created from standard digital multimedia data by a transcoder. Client computers, each of which may have different configurations and capabilities are capable of accessing a stream server that contains the scalable streamed digital data. Each different client computer, therefore, may access different stream combinations according to a profile associated with each different client computer. Thus, the streams accessed from the server are tailored to match the profile of each client computer so that the best combination of streams can be provided to maximize the resolution of the 3D, audio and video components.
    Type: Grant
    Filed: April 25, 2002
    Date of Patent: June 8, 2010
    Assignee: Oracle International Corporation
    Inventors: Devendra Kalra, Karnamadakala Krishnamohan, Venkatasubbarao Ramamoorthy, Jeyendran Balakrishnan, Timothy J. Burr, Kowsik Guruswamy
  • Publication number: 20100106742
    Abstract: A discovery system (and corresponding method and computer program product) for automatically discovering assets and their roles and functional relationships in a network system is described. In one aspect, the discovery system interrogates known assets through protocol messages, normalizes response messages, and contextually analyzes the normalized response message to identify additional assets and their roles and functional relationships with the interrogated assets. The discovery system can recursively interrogate newly discovered assets to discover additional assets. In another aspect of the present invention, the discovery system is scheduled to periodically interrogate known assets for up-to-date information of the assets and their roles and functional relationships. Such information can be used to provide various services.
    Type: Application
    Filed: October 29, 2008
    Publication date: April 29, 2010
    Applicant: Mu Dynamics, Inc.
    Inventor: Kowsik Guruswamy
  • Publication number: 20100077072
    Abstract: A test system (and corresponding method and computer program product) for generating unit tests for a heterogeneous network system and validating test results to ensure that the network system functions properly is described. In one embodiment, the test system is an appliance that is capable of normalizing communication protocols supported by component systems of the network system. The test system creates objects and methods corresponding to component systems and their supported protocol commands in the network system, and generates unit test cases based on the objects, the methods, and the normalized protocols. The test system transmits the unit test cases to the component systems, receives test results, and validates the test results to ensure that the network system functions properly.
    Type: Application
    Filed: September 19, 2008
    Publication date: March 25, 2010
    Applicant: MU DYNAMICS, INC.
    Inventors: Kowsik Guruswamy, James Maze
  • Publication number: 20090083854
    Abstract: A security analysis methodology is used to analyze the security of a device-under-analysis (DUA) with respect to a particular protocol message exchange. First, the mutation points that exist in the message exchange are determined. Then, the message exchange is executed multiple times—once for each mutation point. Each execution applies the mutation associated with that particular mutation point (e.g., a particular message during the exchange is modified in a particular way) to create a mutated message exchange. In other words, each message exchange with an applied mutation point corresponds to a test case.
    Type: Application
    Filed: September 20, 2007
    Publication date: March 26, 2009
    Applicant: MU SECURITY, INC.
    Inventors: Adam Bozanich, Kowsik Guruswamy, Marshall A. Beddoe
  • Publication number: 20080282352
    Abstract: A system is used to analyze the implementation of a protocol by a device-under-analysis (DUA). The system includes a source endpoint, a destination endpoint (the DUA), and a message generator. The source endpoint generates an original message and attempts to send it to the DUA. The original message is intercepted by the message generator, which generates a replacement message. The replacement message is then sent to the DUA instead of the original message. The replacement message is deliberately improper so as to analyze the DUA's implementation of the protocol. The message generator includes a structure recognition system and a mutation system. The structure recognition system determines the underlying structure and/or semantics of a message. After the structure recognition system has determined the structure, it creates a description of the structure (a structure description). The mutation system modifies the message based on the structure description to generate a replacement message.
    Type: Application
    Filed: May 7, 2007
    Publication date: November 13, 2008
    Applicant: MU SECURITY, INC.
    Inventors: Marshall A. Beddoe, Kowsik Guruswamy
  • Publication number: 20080072322
    Abstract: A security analyzer analyzes a security of a device-under-analysis (DUA). In one embodiment, the security analyzer identifies two or more valid message-delivery preconditions for a communication protocol supported by the DUA. One of the identified valid message-delivery preconditions is selected and the security analyzer delivers an attack to the DUA according to the selected message-delivery precondition. The same or similar attacks can also be delivered to the DUA via other message-delivery preconditions. Based on the DUA's response, the security analyzer determines whether a vulnerability has been found.
    Type: Application
    Filed: November 8, 2006
    Publication date: March 20, 2008
    Inventor: Kowsik Guruswamy
  • Publication number: 20070174917
    Abstract: A security analyzer tests the security of a device by attacking the device and observing the device's response. Attacking the device includes sending one or more messages to the device. A message can be generated by the security analyzer or generated independently of the security analyzer. The security analyzer uses various methods to identify a particular attack that causes a device to fail or otherwise alter its behavior. Monitoring includes analyzing data (other than messages) output from the device in response to an attack. Packet processing analysis includes analyzing one or more messages generated by the device in response to an attack. Instrumentation includes establishing a baseline snapshot of the device's state when it is operating normally and then attacking the device in multiple ways while obtaining snapshots periodically during the attacks.
    Type: Application
    Filed: February 10, 2006
    Publication date: July 26, 2007
    Inventor: Kowsik Guruswamy
  • Publication number: 20060005231
    Abstract: Methods and apparatuses for inspecting packets are provided. A primary security system may be configured for processing packets. The primary security system may be operable to maintain flow information for a group of devices to facilitate processing of the packets. A secondary security system may be designated for processing packets upon a failover event. Flow records may be shared from the primary security system with the secondary security system.
    Type: Application
    Filed: October 12, 2004
    Publication date: January 5, 2006
    Inventors: Nir Zuk, Yu Mao, Kowsik Guruswamy
  • Publication number: 20030154399
    Abstract: Systems and methods for detecting and preventing network security breaches are described. The systems and methods present a gateway-based packet-forwarding network security solution to not only detect security breaches but also prevent them by directly dropping suspicious packets and connections. The systems and methods employ multiple techniques to detect and prevent network security breaches, including stateful signature detection, traffic signature detection, and protocol anomaly detection.
    Type: Application
    Filed: February 8, 2002
    Publication date: August 14, 2003
    Inventors: Nir Zuk, Kowsik Guruswamy
  • Patent number: 6490627
    Abstract: The present invention provides an apparatus and method for encoding, storing, transmitting and decoding multimedia information in the form of scalable, streamed digital data. A base stream containing basic informational content and subsequent streams containing additive informational content are initially created from standard digital multimedia data by a transcoder. Client computers, each of which may have different configurations and capabilities are capable of accessing a stream server that contains the scalable streamed digital data. Each different client computer, therefore, may access different stream combinations according to a profile associated with each different client computer. Thus, the streams accessed from the server are tailored to match the profile of each client computer so that the best combination of streams can be provided to maximize the resolution of the 3D, audio and video components.
    Type: Grant
    Filed: June 28, 1999
    Date of Patent: December 3, 2002
    Assignee: Oracle Corporation
    Inventors: Devendra Kalra, Karnamadakala Krishnamohan, Venkatasubbarao Ramamoorthy, Jeyendran Balakrishnan, Timothy J. Burr, Kowsik Guruswamy
  • Patent number: 5953506
    Abstract: The present invention provides an apparatus and method for encoding, storing, transmitting and decoding multimedia information in the form of scalable, streamed digital data. A base stream containing basic informational content and subsequent streams containing additive informational content are initially created from standard digital multimedia data by a transcoder. Client computers, each of which may have different configurations and capabilities are capable of accessing a stream server that contains the scalable streamed digital data. Each different client computer, therefore, may access different stream combinations according to a profile associated with each different client computer. Thus, the streams accessed from the server are tailored to match the profile of each client computer so that the best combination of streams can be provided to maximize the resolution of the 3D, audio and video components.
    Type: Grant
    Filed: December 17, 1996
    Date of Patent: September 14, 1999
    Assignee: Adaptive Media Technologies
    Inventors: Devendra Kalra, Karnamadakala Krishnamohan, Venkatasubbarao Ramamoorthy, Jeyendran Balakrishnan, Timothy J. Burr, Kowsik Guruswamy