Patents by Inventor Richard Hellstern
Richard Hellstern has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230128061Abstract: A method may include a processing system having at least one processor obtaining a first plurality of domain name system traffic records, generating an input aggregate vector from the first plurality of domain name system traffic records, where the input aggregate vector comprises a plurality of features derived from the first plurality of domain name system traffic records, and applying an encoder-decoder neural network to the input aggregate vector to generate a reconstructed vector, where the encoder-decoder neural network is trained with a plurality of aggregate vectors generated from a second plurality of domain name system traffic records. In one example, the processing system may then calculate a distance between the input aggregate vector and the reconstructed vector, and apply at least one remedial action associated with the first plurality of domain name system traffic records when the distance is greater than a threshold distance.Type: ApplicationFiled: October 10, 2022Publication date: April 27, 2023Inventors: Yaron Koral, Rensheng Wang Zhang, Eric Noel, Patrick Velardo, JR., Richard Hellstern, Swapna Buccapatnam Tirumala, Anestis Karasaridis
-
Patent number: 11470101Abstract: A method may include a processing system having at least one processor obtaining a first plurality of domain name system traffic records, generating an input aggregate vector from the first plurality of domain name system traffic records, where the input aggregate vector comprises a plurality of features derived from the first plurality of domain name system traffic records, and applying an encoder-decoder neural network to the input aggregate vector to generate a reconstructed vector, where the encoder-decoder neural network is trained with a plurality of aggregate vectors generated from a second plurality of domain name system traffic records. In one example, the processing system may then calculate a distance between the input aggregate vector and the reconstructed vector, and apply at least one remedial action associated with the first plurality of domain name system traffic records when the distance is greater than a threshold distance.Type: GrantFiled: October 3, 2018Date of Patent: October 11, 2022Assignees: AT&T Intellectual Property I, L.P., AT&T Technical Services Company, Inc.Inventors: Yaron Koral, Rensheng Wang Zhang, Eric Noel, Patrick Velardo, Jr., Richard Hellstern, Swapna Buccapatnam Tirumala, Anestis Karasaridis
-
Publication number: 20220164697Abstract: Creating and using learning models to identify botnet traffic can include obtaining netflow data associated with a connecting device that is communicating with a carrier network. The netflow data can represent communications associated with the connecting device. Data features associated with the communications can be extracted. The data features can include statistical information associated with the communications. A learning model based on the data features extracted from the netflow data can be trained. A prediction using the learning model can be generated, and an action based on the prediction can be taken.Type: ApplicationFiled: November 24, 2020Publication date: May 26, 2022Applicants: AT&T Intellectual Property I, L.P., AT&T Technical Services Company, Inc.Inventors: Ganesh Subramaniam, Robert Archibald, Richard Hellstern
-
Publication number: 20200112574Abstract: A method may include a processing system having at least one processor obtaining a first plurality of domain name system traffic records, generating an input aggregate vector from the first plurality of domain name system traffic records, where the input aggregate vector comprises a plurality of features derived from the first plurality of domain name system traffic records, and applying an encoder-decoder neural network to the input aggregate vector to generate a reconstructed vector, where the encoder-decoder neural network is trained with a plurality of aggregate vectors generated from a second plurality of domain name system traffic records. In one example, the processing system may then calculate a distance between the input aggregate vector and the reconstructed vector, and apply at least one remedial action associated with the first plurality of domain name system traffic records when the distance is greater than a threshold distance.Type: ApplicationFiled: October 3, 2018Publication date: April 9, 2020Inventors: Yaron Koral, Rensheng Wang Zhang, Eric Noel, Patrick Velardo, JR., Richard Hellstern, Swapna Buccapatnam Tirumala, Anestis Karasaridis
-
Patent number: 10447713Abstract: Concepts and technologies disclosed herein are directed to internet traffic classification via time-frequency analysis. According to one aspect of the concepts and technologies disclosed herein, a security classification scheme can be implemented to identify potentially malicious activities from normal internet traffic. The security classification scheme can exploit the distinctive characteristics of different types of traffic in both frequency domain and time domain to identify four different cases. Due to the separation of different types of traffic, the security classification scheme can lower the false alarm rate and improve network security. The security classification scheme can utilize a recursive discrete Fourier transform (“DFT”) implementation to enhance computational efficiency.Type: GrantFiled: April 26, 2017Date of Patent: October 15, 2019Assignees: AT&T Intellectual Property I, L.P., AT&T Technical Services Company, Inc.Inventors: Rensheng Zhang, Richard Hellstern, Anestis Karasaridis, Patrick Velardo, Jr.
-
Publication number: 20180316693Abstract: Concepts and technologies disclosed herein are directed to internet traffic classification via time-frequency analysis. According to one aspect of the concepts and technologies disclosed herein, a security classification scheme can be implemented to identify potentially malicious activities from normal internet traffic. The security classification scheme can exploit the distinctive characteristics of different types of traffic in both frequency domain and time domain to identify four different cases. Due to the separation of different types of traffic, the security classification scheme can lower the false alarm rate and improve network security. The security classification scheme can utilize a recursive discrete Fourier transform (“DFT”) implementation to enhance computational efficiency.Type: ApplicationFiled: April 26, 2017Publication date: November 1, 2018Applicants: AT&T Intellectual Property I, L.P., AT&T Technical Services Company, Inc.Inventors: Rensheng Zhang, Richard Hellstern, Anestis Karasaridis, Patrick Velardo, JR.
-
Patent number: 7760759Abstract: The invention provides methods and systems for providing priority processing to critical data as the data is transmitted across a network. A plurality of Internet protocol (IP) packets, each of which contains data and priority information, are received at a first router. The data contained in the IP packets is then encapsulated into frame relay frames containing the priority information. The frame relay frames are transmitted from the first router to a frame relay network in a manner determined by the priority information included in the frame relay frames. The frame relay flames are then transmitted across a frame relay network to a second router in a manner determined by the priority information included in the frame relay frames.Type: GrantFiled: September 27, 2005Date of Patent: July 20, 2010Inventors: Hrair Aldermeshian, Arvind S Chakravarti, Richard Hellstern, Raymond L. Kimber, Ali Mohammad Kujoory, Yonatan Aharon Levy, John Babu Medamana, John Joseph Sikora
-
Patent number: 7539752Abstract: A next generation performance network management system (30?) includes a first component (34a) that monitors one or more attributes of network elements (111-11n, 121-12m, 20 and 26) as well as peripheral devices (16 and 22) and interconnecting links (18, 24) to establish an historic trend for each monitored element. A second performance management system component (34b) monitors, on a near real-time basis, critical attributes of elements identified from historic trends as undergoing performance degradation: If such performance degradation persist, as detected by such near real-time monitoring, then the network operator can repair or replace the element in question to maintain network performance.Type: GrantFiled: February 6, 2007Date of Patent: May 26, 2009Assignee: AT&T Intellectual Property II, L.P.Inventors: Arvind S Chakravarti, Hossein Eslambolchi, Richard Hellstern, John Babu Medamana
-
Patent number: 7191230Abstract: A next generation performance network management system (30?) includes a first component (34a) that monitors one or more attributes of network elements (111–11n, 121–12m, 20 and 26) as well as peripheral devices (16 and 22) and interconnecting links (18, 24) to establish an historic trend for each monitored element. A second performance management system component (34b) monitors, on a near real-time basis, critical attributes of elements identified from historic trends as undergoing performance degradation. If such performance degradations persist, as detected by such near real-time monitoring, then the network operator can repair or replace the element in question to maintain network performance.Type: GrantFiled: December 21, 2005Date of Patent: March 13, 2007Assignee: AT&T Corp.Inventors: Arvind S Chakravarti, Hossein Eslambolchi, Richard Hellstern, John Babu Medamana
-
Patent number: 7007084Abstract: A next generation performance network management system (30?) includes a first component (34a) that monitors one or more attributes of network elements (111–11n, 121–12m, 20 and 26) as well as peripheral devices (16 and 22) and interconnecting links (18, 24) to establish an historic trend for each monitored element. A second performance management system component (34b) monitors, on a near real-time basis, critical attributes of elements identified from historic trends as undergoing performance degradation. If such performance degradations persist, as detected by such near real-time monitoring, then the network operator can repair or replace the element in question to maintain network performance.Type: GrantFiled: November 7, 2001Date of Patent: February 28, 2006Assignee: AT&T Corp.Inventors: Arvind S Chakravarti, Hossein Eslambolchi, Richard Hellstern, John Babu Medamana
-
Publication number: 20060034328Abstract: The invention provides methods and systems for providing priority processing to critical data as the data is transmitted across a network. A plurality of Internet protocol (IP) packets, each of which contains data and priority information, are received at a first router. The data contained in the IP packets is then encapsulated into frame relay frames containing the priority information. The frame relay frames are transmitted from the first router to a frame relay network in a manner determined by the priority information included in the frame relay frames. The frame relay flames are then transmitted across a frame relay network to a second router in a manner determined by the priority information included in the frame relay frames.Type: ApplicationFiled: September 27, 2005Publication date: February 16, 2006Inventors: Hrair Aldermeshian, Arvind Chakravarti, Richard Hellstern, Raymond Kimber, Ali Kujoory, Yonatan Levy, John Medamana, John Sikora
-
Patent number: 6993043Abstract: The invention provides methods and systems for providing priority processing to critical data as the data is transmitted across a network. A plurality of Internet protocol (IP) packets, each of which contains data and priority information, are received at a first router. The data contained in the IP packets is then encapsulated into frame relay frames containing the priority information. The frame relay frames are transmitted from the first router to a frame relay network in a manner determined by the priority information included in the frame relay frames. The frame relay frames are then transmitted across a frame relay network to a second router in a manner determined by the priority information included in the frame relay frames.Type: GrantFiled: November 13, 2000Date of Patent: January 31, 2006Assignee: AT&T Corp.Inventors: Hrair Aldermeshian, Arvind S Chakravarti, Richard Hellstern, Raymond L. Kimber, Ali Mohammad Kujoory, Yonatan Aharon Levy, John Babu Medamana, John Joseph Sikora
-
Patent number: 4843712Abstract: Individual components (12) in a tube (14) are successively removed and then riented for pickup by first positioning the tube, whose ends are opened, in a horizontal orientation such that the components in the tube are upside down. Thereafter, a component is at least partially expelled from one end of the tube by directing a stream of gas (e.g., air) into the other end of the tube. The component partially expelled from the tube is then withdrawn from the tube to locate the component between a pair of jaws (124) capable of rotation about an arc of 180.degree.. The jaws then engage the component and thereafter rotate it 180.degree. before positioning the component right side up.Type: GrantFiled: September 2, 1988Date of Patent: July 4, 1989Assignee: American Telephone and Telegraph Company, AT&T Technologies, Inc.Inventor: Richard Hellstern