Patents by Inventor Prasad Sharad Dabak

Prasad Sharad Dabak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230379260
    Abstract: Some embodiments provide a system that detects whether a data flow is an elephant flow; and if so, the system treats it differently than a mouse flow. The system of some embodiments detects an elephant flow by examining, among other items, the operations of a machine. In detecting, the system identifies an initiation of a new data flow associated with the machine. The new data flow can be an outbound data flow or an inbound data flow. The system then determines, based on the amount of data being sent or received, if the data flow is an elephant flow. The system of some embodiments identifies the initiation of a new data flow by intercepting a socket call or request to transfer a file.
    Type: Application
    Filed: July 27, 2023
    Publication date: November 23, 2023
    Applicant: Nicira, Inc.
    Inventors: W. Andrew Lambeth, Amit Vasant Patil, Prasad Sharad Dabak, Laxmikant Vithal Gunda, Vasantha Kumar Dhanasekar, Justin Pettit
  • Patent number: 11822951
    Abstract: Example methods are provided to use a guest monitoring mode (GMM) module in a hypervisor to authenticate hypercalls sent by a guest agent to the GMM module. The GMM module uses reference information, including thread information associated with a thread, to determine whether a hypercall associated with the thread was issued by the trusted guest agent or by potentially malicious code.
    Type: Grant
    Filed: July 27, 2020
    Date of Patent: November 21, 2023
    Assignee: VMWARE, INC.
    Inventors: Prasad Sharad Dabak, Leena Shuklendu Soman
  • Patent number: 11816218
    Abstract: Example methods are provided to use a guest monitoring mode (GMM) module in a hypervisor to monitor for attempts to maliciously modify operating system (OS) kernel objects in a virtualized computing environment. A created OS kernel object is migrated to a memory space where the GMM module can detect an attempt to modify the OS kernel object. The GMM module uses reference information to determine whether the modification is authorized by trusted OS kernel code or is being attempted by malicious code.
    Type: Grant
    Filed: July 26, 2020
    Date of Patent: November 14, 2023
    Assignee: VMWARE, INC.
    Inventors: Prasad Sharad Dabak, Leena Shuklendu Soman
  • Patent number: 11811669
    Abstract: Some embodiments provide a system that detects whether a data flow is an elephant flow; and if so, the system treats it differently than a mouse flow. The system of some embodiments detects an elephant flow by examining, among other items, the operations of a machine. In detecting, the system identifies an initiation of a new data flow associated with the machine. The new data flow can be an outbound data flow or an inbound data flow. The system then determines, based on the amount of data being sent or received, if the data flow is an elephant flow. The system of some embodiments identifies the initiation of a new data flow by intercepting a socket call or request to transfer a file.
    Type: Grant
    Filed: December 25, 2022
    Date of Patent: November 7, 2023
    Assignee: NICIRA, INC.
    Inventors: W. Andrew Lambeth, Amit Vasant Patil, Prasad Sharad Dabak, Laxmikant Vithal Gunda, Vasantha Kumar Dhanasekar, Justin Pettit
  • Publication number: 20230128660
    Abstract: Some embodiments provide a system that detects whether a data flow is an elephant flow; and if so, the system treats it differently than a mouse flow. The system of some embodiments detects an elephant flow by examining, among other items, the operations of a machine. In detecting, the system identifies an initiation of a new data flow associated with the machine. The new data flow can be an outbound data flow or an inbound data flow. The system then determines, based on the amount of data being sent or received, if the data flow is an elephant flow. The system of some embodiments identifies the initiation of a new data flow by intercepting a socket call or request to transfer a file.
    Type: Application
    Filed: December 25, 2022
    Publication date: April 27, 2023
    Inventors: W. Andrew Lambeth, Amit Vasant Patil, Prasad Sharad Dabak, Laxmikant Vithal Gunda, Vasantha Kumar Dhanasekar, Justin Pettit
  • Patent number: 11539630
    Abstract: Some embodiments provide a system that detects whether a data flow is an elephant flow; and if so, the system treats it differently than a mouse flow. The system of some embodiments detects an elephant flow by examining, among other items, the operations of a machine. In detecting, the system identifies an initiation of a new data flow associated with the machine. The new data flow can be an outbound data flow or an inbound data flow. The system then determines, based on the amount of data being sent or received, if the data flow is an elephant flow. The system of some embodiments identifies the initiation of a new data flow by intercepting a socket call or request to transfer a file.
    Type: Grant
    Filed: May 7, 2018
    Date of Patent: December 27, 2022
    Assignee: NICIRA, INC.
    Inventors: W. Andrew Lambeth, Amit Vasant Patil, Prasad Sharad Dabak, Laxmikant Vithal Gunda, Vasantha Kumar Dhanasekar, Justin Pettit
  • Patent number: 11281485
    Abstract: Some embodiments provide a novel method for authorizing network requests for a machine in a network. In some embodiments, the method is performed by security agents that execute on virtual machines operating on a host machine. In some embodiments, the method captures a network request (e.g., network control packets, socket connection request, etc.) from a primary application executing on the machine. The method identifies an extended context for the network request and determines whether the network request is authorized based on the extended context. The method then processes the network request according to the determination. The extended context of some embodiments includes identifications for primary and secondary applications associated with the network request. Alternatively, or conjunctively, some embodiments include identifications for primary and secondary users associated with the network request.
    Type: Grant
    Filed: May 3, 2019
    Date of Patent: March 22, 2022
    Assignee: NICIRA, INC.
    Inventors: Vasantha Kumar, Prasad Sharad Dabak, Azeem Feroz, Amit Vasant Patil
  • Publication number: 20210389965
    Abstract: Example methods are provided to use a guest monitoring mode (GMM) module in a hypervisor to authenticate hypercalls sent by a guest agent to the GMM module. The GMM module uses reference information, including thread information associated with a thread, to determine whether a hypercall associated with the thread was issued by the trusted guest agent or by potentially malicious code.
    Type: Application
    Filed: July 27, 2020
    Publication date: December 16, 2021
    Inventors: PRASAD SHARAD DABAK, LEENA SHUKLENDU SOMAN
  • Publication number: 20210374242
    Abstract: Example methods are provided to use a guest monitoring mode (GMM) module in a hypervisor to monitor for attempts to maliciously modify operating system (OS) kernel objects in a virtualized computing environment. A created OS kernel object is migrated to a memory space where the GMM module can detect an attempt to modify the OS kernel object. The GMM module uses reference information to determine whether the modification is authorized by trusted OS kernel code or is being attempted by malicious code.
    Type: Application
    Filed: July 26, 2020
    Publication date: December 2, 2021
    Inventors: PRASAD SHARAD DABAK, LEENA SHUKLENDU SOMAN
  • Publication number: 20190266004
    Abstract: Some embodiments provide a novel method for authorizing network requests for a machine in a network. In some embodiments, the method is performed by security agents that execute on virtual machines operating on a host machine. In some embodiments, the method captures a network request (e.g., network control packets, socket connection request, etc.) from a primary application executing on the machine. The method identifies an extended context for the network request and determines whether the network request is authorized based on the extended context. The method then processes the network request according to the determination. The extended context of some embodiments includes identifications for primary and secondary applications associated with the network request. Alternatively, or conjunctively, some embodiments include identifications for primary and secondary users associated with the network request.
    Type: Application
    Filed: May 3, 2019
    Publication date: August 29, 2019
    Inventors: Vasantha Kumar, Prasad Sharad Dabak, Azeem Feroz, Amit Vasant Patil
  • Patent number: 10324746
    Abstract: Some embodiments provide a novel method for authorizing network requests for a machine in a network. In some embodiments, the method is performed by security agents that execute on virtual machines operating on a host machine. In some embodiments, the method captures a network request (e.g., network control packets, socket connection request, etc.) from a primary application executing on the machine. The method identifies an extended context for the network request and determines whether the network request is authorized based on the extended context. The method then processes the network request according to the determination. The extended context of some embodiments includes identifications for primary and secondary applications associated with the network request. Alternatively, or conjunctively, some embodiments include identifications for primary and secondary users associated with the network request.
    Type: Grant
    Filed: February 4, 2016
    Date of Patent: June 18, 2019
    Assignee: NICIRA, INC.
    Inventors: Vasantha Kumar, Prasad Sharad Dabak, Azeem Feroz, Amit Vasant Patil
  • Publication number: 20180331961
    Abstract: Some embodiments provide a system that detects whether a data flow is an elephant flow; and if so, the system treats it differently than a mouse flow. The system of some embodiments detects an elephant flow by examining, among other items, the operations of a machine. In detecting, the system identifies an initiation of a new data flow associated with the machine. The new data flow can be an outbound data flow or an inbound data flow. The system then determines, based on the amount of data being sent or received, if the data flow is an elephant flow. The system of some embodiments identifies the initiation of a new data flow by intercepting a socket call or request to transfer a file.
    Type: Application
    Filed: May 7, 2018
    Publication date: November 15, 2018
    Inventors: W. Andrew Lambeth, Amit Vasant Patil, Prasad Sharad Dabak, Laxmikant Vithal Gunda, Vasantha Kumar Dhanasekar, Justin Pettit
  • Patent number: 9967199
    Abstract: Some embodiments provide a system that detects whether a data flow is an elephant flow; and if so, the system treats it differently than a mouse flow. The system of some embodiments detects an elephant flow by examining, among other items, the operations of a machine. In detecting, the system identifies an initiation of a new data flow associated with the machine. The new data flow can be an outbound data flow or an inbound data flow. The system then determines, based on the amount of data being sent or received, if the data flow is an elephant flow. The system of some embodiments identifies the initiation of a new data flow by intercepting a socket call or request to transfer a file.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: May 8, 2018
    Assignee: NICIRA, INC.
    Inventors: W. Andrew Lambeth, Amit Vasant Patil, Prasad Sharad Dabak, Laxmikant Vithal Gunda, Vasantha Kumar Dhanasekar, Justin Pettit
  • Patent number: 9760712
    Abstract: Methods and systems for protecting a virtual machine network are disclosed. In an embodiment, a method involves storing an application whitelist including application-to-user associations in memory such that the application whitelist is immutable by a guest virtual machine, receiving a request to execute an application including an application identifier and a user identifier, comparing the application identifier and the user identifier of the request with the application whitelist, and generating an execution decision indicating whether the requested application can execute on the guest virtual machine.
    Type: Grant
    Filed: May 23, 2014
    Date of Patent: September 12, 2017
    Assignee: VMware, Inc.
    Inventors: Azeem Feroz, Binyuan Chen, Prasad Sharad Dabak
  • Publication number: 20170126677
    Abstract: Some embodiments provide a novel method for authorizing network requests for a machine in a network. In some embodiments, the method is performed by security agents that execute on virtual machines operating on a host machine. In some embodiments, the method captures a network request (e.g., network control packets, socket connection request, etc.) from a primary application executing on the machine. The method identifies an extended context for the network request and determines whether the network request is authorized based on the extended context. The method then processes the network request according to the determination. The extended context of some embodiments includes identifications for primary and secondary applications associated with the network request. Alternatively, or conjunctively, some embodiments include identifications for primary and secondary users associated with the network request.
    Type: Application
    Filed: February 4, 2016
    Publication date: May 4, 2017
    Inventors: Vasantha Kumar, Prasad Sharad Dabak, Azeem Feroz, Amit Vasant Patil
  • Publication number: 20150339475
    Abstract: Methods and systems for protecting a virtual machine network are disclosed. In an embodiment, a method involves storing an application whitelist including application-to-user associations in memory such that the application whitelist is immutable by a guest virtual machine, receiving a request to execute an application including an application identifier and a user identifier, comparing the application identifier and the user identifier of the request with the application whitelist, and generating an execution decision indicating whether the requested application can execute on the guest virtual machine.
    Type: Application
    Filed: May 23, 2014
    Publication date: November 26, 2015
    Applicant: VMWARE, INC.
    Inventors: Azeem Feroz, Binyuan Chen, Prasad Sharad Dabak
  • Publication number: 20150163117
    Abstract: Some embodiments provide a system that detects whether a data flow is an elephant flow; and if so, the system treats it differently than a mouse flow. The system of some embodiments detects an elephant flow by examining, among other items, the operations of a machine. In detecting, the system identifies an initiation of a new data flow associated with the machine. The new data flow can be an outbound data flow or an inbound data flow. The system then determines, based on the amount of data being sent or received, if the data flow is an elephant flow. The system of some embodiments identifies the initiation of a new data flow by intercepting a socket call or request to transfer a file.
    Type: Application
    Filed: September 30, 2014
    Publication date: June 11, 2015
    Inventors: W. Andrew Lambeth, Amit Vasant Patil, Prasad Sharad Dabak, Laxmikant Vithal Gunda, Vasantha Kumar Dhanasekar, Justin Pettit