Patents by Inventor Madhusudan Challa

Madhusudan Challa has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11082436
    Abstract: According to one embodiment, a system features a network security device and a cloud computing service. The network security device is configured to determine whether an object includes one or more characteristics associated with a malicious attack. The cloud computing service, communicatively coupled to and remotely located from the network security device, includes virtual execution logic that, upon execution by a processing unit deployed as part of the cloud computing service and after the network security device determining that the object includes the one or more characteristics associated with the malicious attack, processes the object and monitors for behaviors of at least the object suggesting the object is associated with a malicious attack.
    Type: Grant
    Filed: October 21, 2019
    Date of Patent: August 3, 2021
    Assignee: FireEye, Inc.
    Inventors: Muhammad Amin, Masood Mehmood, Ramaswamy Ramaswamy, Madhusudan Challa, Shrikrishna Karandikar
  • Patent number: 10454953
    Abstract: According to one embodiment, a system features a network security device and a cloud computing service. The network security device is configured to determine whether an object includes one or more characteristics associated with a malicious attack. The cloud computing service, communicatively coupled to and remotely located from the network security device, includes virtual execution logic that, upon execution by a processing unit deployed as part of the cloud computing service and after the network security device determining that the object includes the one or more characteristics associated with the malicious attack, processes the object and monitors for behaviors of at least the object suggesting the object is associated with a malicious attack.
    Type: Grant
    Filed: October 9, 2017
    Date of Patent: October 22, 2019
    Assignee: FireEye, Inc.
    Inventors: Muhammad Amin, Masood Mehmood, Ramaswamy Ramaswamy, Madhusudan Challa, Shrikrishna Karandikar
  • Patent number: 9787700
    Abstract: According to one embodiment, a system features analysis circuitry and detection circuitry. The analysis circuitry features a first processing unit and a first memory that includes a filtering logic configured to produce a second plurality of objects from a received first plurality of objects. The second plurality of objects is a subset of the first plurality of objects. The detection circuitry is communicatively coupled to and remotely located from the analysis circuitry. The detection circuitry includes a second processing unit and a second memory. The second memory includes a virtual execution logic to process content within at least a first object of the second plurality of objects. The virtual execution logic is configured to monitor for behaviors, during the processing of the first object, and determine whether any or all of the monitored behaviors correspond to activities indicative that the first object is associated with a malicious attack.
    Type: Grant
    Filed: March 6, 2017
    Date of Patent: October 10, 2017
    Assignee: FireEye, Inc.
    Inventors: Muhammad Amin, Masood Mehmood, Ramaswamy Ramaswamy, Madhusudan Challa, Shrikrishna Karandikar
  • Patent number: 9591015
    Abstract: According to one embodiment, a network security device configured to detect malicious content within received network traffic comprises a traffic analysis controller (TAC) is provided. The traffic analysis controller comprises a network processing unit (NPU) and is configured to perform at least packet processing on the NPU with a set of pre-filters. In addition, the network security device further comprises a central processing unit (CPU) and is configured to perform at least virtual machine (VM)-based processing. The set of pre-filters is configured to distribute objects of received network traffic such that either static analysis or dynamic analysis may be performed on an object to determine whether the object contains malicious content. The static analysis may be performed on either the NPU or the CPU while the dynamic analysis is performed on the CPU.
    Type: Grant
    Filed: March 28, 2014
    Date of Patent: March 7, 2017
    Assignee: FireEye, Inc.
    Inventors: Muhammad Amin, Masood Mehmood, Ramaswamy Ramaswamy, Madhusudan Challa, Shrikrishna Karandikar
  • Patent number: 8769091
    Abstract: A system for tracing operations executed by a network device on a packet wherein a network device may capture a packet and determine whether the packet is a candidate for tracing; if the packet is a candidate for tracing the network device may set a trace option identifier within the packet indicating that the packet is to be tagged in association with operations performed on or in association with the packet by the network device. The network device may tag the packet with one or more tags in response to the trace option identifier, export the packet with the trace option identifier, generate a report based on the tags and send the report to a network management station.
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: July 1, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: David C. White, Jr., Iqlas Maheen Ottamalika, Madhusudan Challa
  • Patent number: 8510436
    Abstract: Methods and systems for utilizing captured packets to determine the operations performed on packets by a network device are described. One or more packets are captured and forwarded through the network device. Operations performed on the captured IP packets are logged.
    Type: Grant
    Filed: September 15, 2011
    Date of Patent: August 13, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Iqlas Maheen Ottamalika, David C. White, Jr., Madhusudan Challa
  • Publication number: 20120166637
    Abstract: A system for tracing operations executed by a network device on a packet wherein a network device may capture a packet and determine whether the packet is a candidate for tracing; if the packet is a candidate for tracing the network device may set a trace option identifier within the packet indicating that the packet is to be tagged in association with operations performed on or in association with the packet by the network device. The network device may tag the packet with one or more tags in response to the trace option identifier, export the packet with the trace option identifier, generate a report based on the tags and send the report to a network management station.
    Type: Application
    Filed: February 15, 2012
    Publication date: June 28, 2012
    Applicant: Cisco Technology, Inc.
    Inventors: David C. White, JR., Iqlas Maheen Ottamalika, Madhusudan Challa
  • Publication number: 20120005339
    Abstract: Methods and systems for utilizing captured packets to determine the operations performed on packets by a network device are described. One or more packets are captured and forwarded through the network device. Operations performed on the captured IP packets are logged.
    Type: Application
    Filed: September 15, 2011
    Publication date: January 5, 2012
    Applicant: Cisco Technology, Inc.
    Inventors: Iqlas Maheen Ottamalika, David C. White, JR., Madhusudan Challa
  • Patent number: 8041804
    Abstract: Methods and systems for utilizing captured packets to determine the operations performed on packets by a network device are described. One or more packets are captured and forwarded through the network device. Operations performed on the captured IP packets are logged.
    Type: Grant
    Filed: May 25, 2006
    Date of Patent: October 18, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Iqlas Maheen Ottamalika, David C. White, Jr., Madhusudan Challa
  • Patent number: 7738403
    Abstract: Methods and systems for determining the operations performed on packets by a network device are described. A simulated packet is input into a network device. The path taken by the simulated packet is traced. Also, the operations performed on the simulated packet are logged. Further, the operations performed on the simulated packet and configuration information of the operations are analyzed and displayed.
    Type: Grant
    Filed: January 23, 2006
    Date of Patent: June 15, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Iqlas Maheen Ottamalika, David C. White, Jr., Madhusudan Challa
  • Publication number: 20070276938
    Abstract: Methods and systems for utilizing captured packets to determine the operations performed on packets by a network device are described. One or more packets are captured and forwarded through the network device. Operations performed on the captured IP packets are logged.
    Type: Application
    Filed: May 25, 2006
    Publication date: November 29, 2007
    Inventors: Iqlas Maheen Ottamalika, David C. White, Madhusudan Challa
  • Publication number: 20070189178
    Abstract: Methods and systems for determining the operations performed on packets by a network device are described. A simulated packet is input into a network device. The path taken by the simulated packet is traced. Also, the operations performed on the simulated packet are logged. Further, the operations performed on the simulated packet and configuration information of the operations are analyzed and displayed.
    Type: Application
    Filed: January 23, 2006
    Publication date: August 16, 2007
    Inventors: Iqlas Ottamalika, David White, Madhusudan Challa