Patents by Inventor Prem Gopalan

Prem Gopalan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8578479
    Abstract: A system, method, and computer program product for identifying a worm are disclosed. The system, method, and computer product are configured to generate a signature for a computer worm by identifying a set of bits representing the signature, generate a first worm signature based on the signature, and generate a second worm signature based on the signature. The first worm signature is formatted for a first device and the second worm signature is formatted for a second, different device. The first worm signature and the second worm signature are different.
    Type: Grant
    Filed: March 21, 2006
    Date of Patent: November 5, 2013
    Assignee: Riverbed Technology, Inc.
    Inventors: Prem Gopalan, Kyle Jamieson, Panayiotis Mavrommatis
  • Patent number: 8458795
    Abstract: A system for detecting network intrusions and other conditions in a network is described. The system includes a plurality of collector devices that are disposed to collect data and statistical information on packets that are sent between nodes on a network. An aggregator device is disposed to receive data and statistical information from the plurality of collector devices. The aggregator device produces a connection table that maps each node on the network to a record that stores information about traffic to or from the node. The aggregator runs processes that determine network events from aggregating of anomalies into network events.
    Type: Grant
    Filed: April 19, 2008
    Date of Patent: June 4, 2013
    Assignee: Riverbed Technologies, Inc.
    Inventors: Daniel Weber, Prem Gopalan, Massimiliano Antonio Poletto
  • Patent number: 8006306
    Abstract: A system, method and computer program product for exploit-based worm detection and mitigation are disclosed. The system, method, and computer program product are configured to identify a signature representing content prevalent in network traffic, determine if the traffic including the signature exhibits propagation, determine if the traffic including the signature exhibits connectedness, and generate a worm signature based on the signature if the signature exhibits both connectedness and propagation.
    Type: Grant
    Filed: March 21, 2006
    Date of Patent: August 23, 2011
    Assignee: Riverbed Technology, Inc.
    Inventors: Prem Gopalan, Kyle Jamieson, Panayiotis Mavrommatis
  • Publication number: 20100115617
    Abstract: A system for detecting network intrusions and other conditions in a network is described. The system includes a plurality of collector devices that are disposed to collect data and statistical information on packets that are sent between nodes on a network. An aggregator device is disposed to receive data and statistical information from the plurality of collector devices. The aggregator device produces a connection table that maps each node on the network to a record that stores information about traffic to or from the node. The aggregator runs processes that determine network events from aggregating of anomalies into network events.
    Type: Application
    Filed: April 19, 2008
    Publication date: May 6, 2010
    Inventors: Daniel Weber, Prem Gopalan, Massimiliano Antonio Poletto
  • Patent number: 7363656
    Abstract: A system for detecting network intrusions and other conditions in a network is described. The system includes a plurality of collector devices that are disposed to collect data and statistical information on packets that are sent between nodes on a network. An aggregator device is disposed to receive data and statistical information from the plurality of collector devices. The aggregator device produces a connection table that maps each node on the network to a record that stores information about traffic to or from the node. The aggregator runs processes that determine network events from aggregating of anomalies into network events.
    Type: Grant
    Filed: November 3, 2003
    Date of Patent: April 22, 2008
    Assignee: Mazu Networks, Inc.
    Inventors: Daniel Weber, Prem Gopalan, Massimiliano Antonio Poletto
  • Publication number: 20070226802
    Abstract: A system, method and computer program product for exploit-based worm detection and mitigation are disclosed. The system, method, and computer program product are configured to identify a signature representing content prevalent in network traffic, determine if the traffic including the signature exhibits propagation, determine if the traffic including the signature exhibits connectedness, and generate a worm signature based on the signature if the signature exhibits both connectedness and propagation.
    Type: Application
    Filed: March 21, 2006
    Publication date: September 27, 2007
    Inventors: Prem Gopalan, Kyle Jamieson, Panayiotis Mavrommatis
  • Publication number: 20070226799
    Abstract: A system, method and computer program product for email-based worm detection and mitigation are disclosed. The system, method, and computer program product are configured to identify a signature representing content prevalent in email-based network traffic, generate a client list for the identified signature, determine if a number of clients included in the client list exceeds a threshold, and generate a worm signature based on the signature if the number of clients included in the client list exceeds the threshold.
    Type: Application
    Filed: March 21, 2006
    Publication date: September 27, 2007
    Inventors: Prem Gopalan, Kyle Jamieson, Panayiotis Mavrommatis
  • Publication number: 20070226801
    Abstract: A system, method, and computer program product for identifying a worm are disclosed. The system, method, and computer product are configured to generate a signature for a computer worm by identifying a set of bits representing the signature, generate a first worm signature based on the signature, and generate a second worm signature based on the signature. The first worm signature is formatted for a first device and the second worm signature is formatted for a second, different device. The first worm signature and the second worm signature are different.
    Type: Application
    Filed: March 21, 2006
    Publication date: September 27, 2007
    Inventors: Prem Gopalan, Kyle Jamieson, Panayiotis Mavrommatis
  • Publication number: 20060173992
    Abstract: A system for detecting network intrusions and other conditions in a network is described. The system includes a plurality of collector devices that are disposed to collect data and statistical information on packets that are sent between nodes on a network. An aggregator device is disposed to receive data and statistical information from the plurality of collector devices. The aggregator device produces a connection table that maps each node on the network to a record that stores information about traffic to or from the node. The aggregator runs processes that determine network events from aggregating of anomalies into network events.
    Type: Application
    Filed: November 3, 2003
    Publication date: August 3, 2006
    Inventors: Daniel Weber, Prem Gopalan, Massimiliano Poletto