Patents by Inventor Kulesh Shanmugasundaram

Kulesh Shanmugasundaram has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8224989
    Abstract: Flexible network policies might be enforced by (a) obtaining a flow of network packets, (b) determining a content characteristic by characterizing content of the flow using bit-stream level statistics, (c) determining content-independent flow characteristics, port-independent flow characteristics, and/or application header-independent flow characteristics, and (d) enforcing a policy on the flow using both (1) the determined content characteristic and the (2) determined content-independent flow characteristics, port-independent flow characteristics, and/or application header-independent flow characteristics.
    Type: Grant
    Filed: June 7, 2010
    Date of Patent: July 17, 2012
    Assignee: Polytechnic Institute of New York University
    Inventors: Nasir Memon, Kulesh Shanmugasundaram
  • Patent number: 8166544
    Abstract: Host malware (or change) may be detected by (1) receiving baseline set of response time information for each of one or more transactions involving (A) the host and (B) at least one peer of the host, (2) determining or receiving a later set of response time information for each of the one or more transactions involving the host and the at least one peer of the host, and (3) determining whether or not host slowdown has occurred using the baseline set of response time information and the later set of response time information. The execution of a host malware (or change) protection policy may be controlled using at least the determination of whether or not host slowdown has occurred.
    Type: Grant
    Filed: February 26, 2008
    Date of Patent: April 24, 2012
    Assignee: Polytechnic Institute of New York University
    Inventors: Nasir Memon, Husrev Taha Sencar, Kulesh Shanmugasundaram
  • Patent number: 7941464
    Abstract: Files can be reassembled from fragments by (a) accepting (or determining) adjacency scores for each pair of fragments from a set of fragments, (b) identifying header fragments from among the fragments of the set of fragments, and (c) for each of the header fragments identified, reconstructing a corresponding one of two or more files from the fragments of the set of fragments such that the sum of the adjacency scores are optimized. Any of the fragments, other than the identified header fragments, are permitted to belong, at least provisionally, to more than one of the at least two files when reconstructing the file(s).
    Type: Grant
    Filed: September 19, 2006
    Date of Patent: May 10, 2011
    Assignee: Polytechnic Institute of New York University
    Inventors: Nasir Memon, Anandabrata Pal, Kulesh Shanmugasundaram
  • Patent number: 7933208
    Abstract: A hierarchical data structure of digested payload information (e.g., information within a payload, or information spanning two or more payloads) allows a payload excerpt to be attributed to earlier network flow information. These compact data structures permit data storage reduction, while permitting efficient query processing with a low level of false positives. One example of such a compact data structure is a hierarchical Bloom filter. Different layers of the hierarchy may correspond to different block sizes.
    Type: Grant
    Filed: September 27, 2005
    Date of Patent: April 26, 2011
    Assignee: Polytechnic Institute of New York University
    Inventors: Herve Bronnimann, Nasir Memon, Kulesh Shanmugasundaram
  • Patent number: 7895237
    Abstract: Files can be reassembled from fragments by (a) accepting adjacency scores for each pair of fragments from the set of fragments, (b) identifying header fragments from among the fragments of the set of fragments, and (c) for each of the header fragments identified, reconstructing a corresponding one of the two or more files from the fragments of the set of fragments such that the sum of the adjacency scores are optimized, wherein each of the fragments is permitted to belong to only one of the at least two files, and wherein at least two files are reconstructed such that the results are independent of the order in which the files are reconstructed.
    Type: Grant
    Filed: September 19, 2006
    Date of Patent: February 22, 2011
    Assignee: Polytechnic Institute of New York University
    Inventors: Nasir Memon, Anandabrata Pal, Kulesh Shanmugasundaram
  • Publication number: 20100332641
    Abstract: Host reboots may be detected passively by tracking and analyzing host initialization events and/or by tracking and analyzing temporal skews in periodic events. Detected host reboots may then be used to determine or help determine whether or not the host has a possible malware infection.
    Type: Application
    Filed: November 10, 2008
    Publication date: December 30, 2010
    Inventors: Kulesh Shanmugasundaram, Nasir Memon
  • Publication number: 20100250743
    Abstract: Flexible network policies might be enforced by (a) obtaining a flow of network packets, (b) determining a content characteristic by characterizing content of the flow using bit-stream level statistics, (c) determining content-independent flow characteristics, port-independent flow characteristics, and/or application header-independent flow characteristics, and (d) enforcing a policy on the flow using both (1) the determined content characteristic and the (2) determined content-independent flow characteristics, port-independent flow characteristics, and/or application header-independent flow characteristics.
    Type: Application
    Filed: June 7, 2010
    Publication date: September 30, 2010
    Inventors: Nasir Memon, Kulesh SHANMUGASUNDARAM
  • Publication number: 20100235915
    Abstract: Detecting and mitigating threats to a computer network is important to the health of the network. Currently firewalls, intrusion detection systems, and intrusion prevention systems are used to detect and mitigate attacks. As the attackers get smarter and attack sophistication increases, it becomes difficult to detect attacks in real-time at the perimeter. Failure of perimeter defenses leaves networks with infected hosts. At least two of symptoms, roles, and reputations of hosts in (and even outside) a network are used to identify infected hosts. Virus or malware signatures are not required.
    Type: Application
    Filed: March 12, 2010
    Publication date: September 16, 2010
    Inventors: Nasir Memon, Kulesh Shanmugasundaram
  • Patent number: 7756899
    Abstract: Files can be reassembled from fragments by (a) accepting adjacency scores for each pair of fragments from a set of fragments, (b) identifying header fragments from the set of fragments, and (c) for each of the header fragments, (i) setting a current fragment to the identified header fragment, (ii) selecting, from any of the fragments not identified as a header fragment, a fragment with a best adjacency score with the current fragment, (iii) determining if the selected fragment has a better adjacency score with any of the other fragments not identified as a header than with the current fragment, (iv) if so, then (A) selecting another fragment, from any of the fragments not identified as a header fragment, a fragment with a next best adjacency score with the current fragment, and continuing, and otherwise (A) adding the selected fragment to a reassembly path started with the identified header fragment, and (B) setting the current fragment to the selected fragment, and continuing until the file is reconstructed.
    Type: Grant
    Filed: September 19, 2006
    Date of Patent: July 13, 2010
    Assignee: Polytechnic Institute of New York University
    Inventors: Nasir Memon, Anandabrata Pal, Kulesh Shanmugasundaram
  • Patent number: 7756997
    Abstract: Flexible network policies might be enforced by (a) obtaining a flow of network packets, (b) determining a content characteristic by characterizing content of the flow using bit-stream level statistics, (c) determining content-independent flow characteristics, port-independent flow characteristics, and/or application header-independent flow characteristics, and (d) enforcing a policy on the flow using both (1) the determined content characteristic and the (2) determined content-independent flow characteristics, port-independent flow characteristics, and/or application header-independent flow characteristics.
    Type: Grant
    Filed: September 19, 2006
    Date of Patent: July 13, 2010
    Assignee: Polytechnic Institute of New York University
    Inventors: Nasir Memon, Kulesh Shanmugasundaram
  • Publication number: 20100030820
    Abstract: Files can be reassembled from fragments by (a) accepting adjacency scores for each pair of fragments from the set of fragments, (b) identifying header fragments from among the fragments of the set of fragments, and (c) for each of the header fragments identified, reconstructing a corresponding one of the two or more files from the fragments of the set of fragments such that the sum of the adjacency scores are optimized, wherein each of the fragments is permitted to belong to only one of the at least two files, and wherein at least two files are reconstructed such that the results are independent of the order in which the files are reconstructed.
    Type: Application
    Filed: September 19, 2006
    Publication date: February 4, 2010
    Inventors: Nasir Memon, Anandabrata Pal, Kulesh Shanmugasundaram
  • Publication number: 20090126019
    Abstract: Host malware (or change) may be detected by (1) receiving baseline set of response time information for each of one or more transactions involving (A) the host and (B) at least one peer of the host, (2) determining or receiving a later set of response time information for each of the one or more transactions involving the host and the at least one peer of the host, and (3) determining whether or not host slowdown has occurred using the baseline set of response time information and the later set of response time information. The execution of a host malware (or change) protection policy may be controlled using at least the determination of whether or not host slowdown has occurred.
    Type: Application
    Filed: February 26, 2008
    Publication date: May 14, 2009
    Inventors: Nasir MEMON, Husrev Taha Sencar, Kulesh Shanmugasundaram
  • Publication number: 20070198606
    Abstract: Files can be reassembled from fragments by (a) accepting adjacency scores for each pair of fragments from the set of fragments, (b) identifying header fragments from among the fragments of the set of fragments, and (c) for each of the header fragments identified, (i) setting a current fragment to the identified header fragment, (ii) selecting, from among any one of the fragments of the set not identified as a header fragment, a fragment with a best adjacency score with the current fragment, (iii) checking to determine if the selected fragment has a better adjacency score with any of the other fragments not identified as a header than with the current fragment, (iv) if it is determined that the selected fragment has a better adjacency score with any of the other fragments not identified as a header than with the current fragment, then (A) selecting another fragment, from among any one of the fragments of the set not identified as a header fragment, a fragment with a next best adjacency score with the current f
    Type: Application
    Filed: September 19, 2006
    Publication date: August 23, 2007
    Inventors: Nasir Memon, Anandabrata Pal, Kulesh Shanmugasundaram
  • Publication number: 20070198607
    Abstract: Files can be reassembled from fragments by (a) accepting (or determining) adjacency scores for each pair of fragments from the set of fragments, (b) identifying header fragments from among the fragments of the set of fragments, and (c) for each of the header fragments identified, reconstructing a corresponding one of the two or more files from the fragments of the set of fragments such that the sum of the adjacency scores are optimized, wherein any of the fragments, other than the identified header fragments, are permitted to belong, at least provisionally, to more than one of the at least two files during the act of reconstructing.
    Type: Application
    Filed: September 19, 2006
    Publication date: August 23, 2007
    Inventors: Nasir Memon, Anandabrata Pal, Kulesh Shanmugasundaram
  • Publication number: 20070088845
    Abstract: Flexible network policies might be enforced by (a) obtaining a flow of network packets, (b) determining a content characteristic by characterizing content of the flow using bit-stream level statistics, (c) determining content-independent flow characteristics, port-independent flow characteristics, and/or application header-independent flow characteristics, and (d) enforcing a policy on the flow using both (1) the determined content characteristic and the (2) determined content-independent flow characteristics, port-independent flow characteristics, and/or application header-independent flow characteristics.
    Type: Application
    Filed: September 19, 2006
    Publication date: April 19, 2007
    Inventors: Nasir Memon, Kulesh Shanmugasundaram
  • Publication number: 20060072582
    Abstract: A hierarchical data structure of digested payload information (e.g., information within a payload, or information spanning two or more payloads) allows a payload excerpt to be attributed to earlier network flow information. These compact data structures permit data storage reduction, while permitting efficient query processing with a low level of false positives. One example of such a compact data structure is a hierarchical Bloom filter. Different layers of the hierarchy may correspond to different block sizes.
    Type: Application
    Filed: September 27, 2005
    Publication date: April 6, 2006
    Inventors: Herve Bronnimann, Nasir Memon, Kulesh Shanmugasundaram