Patents by Inventor Sakthikumar Subramanian

Sakthikumar Subramanian has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9338657
    Abstract: A method is provided in one example embodiment and includes receiving a subscriber accounting start packet for a subscriber device in a mobile network environment. The method also includes extracting, from the subscriber accounting start packet, subscriber device information and a network address of the subscriber device. The method further includes mapping the network address to the subscriber device information, and then correlating the subscriber device information and a security event when the security event is detected in subscriber data network traffic associated with the subscriber device. In a specific embodiment, the subscriber device information includes at least one of an International Mobile Equipment Identity (IMEI), an International Mobile Subscriber Identity (IMSI), a Mobile Station International Subscriber Directory Number (MSISDN), and an access point name (APN).
    Type: Grant
    Filed: October 16, 2012
    Date of Patent: May 10, 2016
    Assignee: McAfee, Inc.
    Inventors: Bikram Kumar Gupta, Elanthiraiyan Ammoor Anbalagan, Sakthikumar Subramanian, Manish Gupta
  • Publication number: 20160094564
    Abstract: In an example, a classification engine compares two binary objects to determine whether they can be classified as belonging to a common family. As an example application, the classification engine may be used to detect malware objects derived from a common ancestor. To classify the object, the binary is disassembled and the resulting assembly code is normalized. Known “clean” functions, such as compiler-generated library code, are filtered out. Normalized blocks of assembly code may then be characterized, such as by forming N-grams, and checksumming each N-gram. These may be compared to known malware routines.
    Type: Application
    Filed: September 26, 2014
    Publication date: March 31, 2016
    Inventors: Rahul Mohandas, Lixin Lu, Sakthikumar Subramanian, Saravanan Mohankumar, Anand Tripathi, Bharath Kumar, Ashish Mishra, Simon Hunt, Jennifer Mankin, Jeffrey Zimmerman
  • Patent number: 9258273
    Abstract: A network security appliance uses a switch to switch packets between cores configured for fast path processing and slow path processing. The switch duplicates packets for delivery to the slow path processing cores, eliminating the need for the fast path processing cores to expend processor resources on packet duplication. The switch can use IEEE 802.1ad Q-in-Q VLAN tags in the packet to perform the switching and packet duplication. Slow path processing cores may also broadcast packets to other slow path processing cores via the switch.
    Type: Grant
    Filed: October 3, 2013
    Date of Patent: February 9, 2016
    Assignee: McAfee, Inc.
    Inventor: Sakthikumar Subramanian
  • Publication number: 20150101035
    Abstract: A network security appliance uses a switch to switch packets between cores configured for fast path processing and slow path processing. The switch duplicates packets for delivery to the slow path processing cores, eliminating the need for the fast path processing cores to expend processor resources on packet duplication. The switch can use IEEE 802.1ad Q-in-Q VLAN tags in the packet to perform the switching and packet duplication. Slow path processing cores may also broadcast packets to other slow path processing cores via the switch.
    Type: Application
    Filed: October 3, 2013
    Publication date: April 9, 2015
    Inventor: Sakthikumar Subramanian
  • Publication number: 20140259140
    Abstract: A network appliance can adjust the amount of deep packet inspection performed by the network appliance as a function of load. In one example, the network appliance can be configured to utilize load (e.g., of its internal processors) and reputation of data flows to determine when selected trusted flows can bypass inspection performed using deep packet analysis. Reputation of data flows can be determined based on historical information regarding a particular flow in combination with a reputation service determining reputation scores based on properties of the data flow (e.g., source, type of data in flow, destination, Internet Protocol domains, etc.). In general, when the network appliance is under heavy load, the more trusted flows are allowed to pass through without in depth inspection.
    Type: Application
    Filed: March 11, 2013
    Publication date: September 11, 2014
    Inventor: Sakthikumar Subramanian
  • Publication number: 20140105119
    Abstract: A method is provided in one example embodiment and includes receiving a subscriber accounting start packet for a subscriber device in a mobile network environment. The method also includes extracting, from the subscriber accounting start packet, subscriber device information and a network address of the subscriber device. The method further includes mapping the network address to the subscriber device information, and then correlating the subscriber device information and a security event when the security event is detected in subscriber data network traffic associated with the subscriber device. In a specific embodiment, the subscriber device information includes at least one of an International Mobile Equipment Identity (IMEI), an International Mobile Subscriber Identity (IMSI), a Mobile Station International Subscriber Directory Number (MSISDN), and an access point name (APN).
    Type: Application
    Filed: October 16, 2012
    Publication date: April 17, 2014
    Inventors: Bikram Kumar Gupta, Elanthiraiyan Ammoor Anbalagan, Sakthikumar Subramanian, Manish Gupta
  • Publication number: 20140075505
    Abstract: A method provided in one example includes receiving a request for configuration information for a host in a first network, determining whether the request was sent over a quarantine virtual local area network (VLAN) in the first network, and providing to the host a network address of a first domain name system (DNS) server if the request was sent over the quarantine VLAN in the first network. In addition, the first DNS server translates a domain name in a query from the host to a network address of a network security device in a second network. In more specific embodiments, the domain name in the query is mapped to a different network address in a second DNS server. The method may also include providing a network address of the second DNS server if the request was sent over a production virtual local area network (VLAN) in the first network.
    Type: Application
    Filed: September 11, 2012
    Publication date: March 13, 2014
    Inventor: Sakthikumar Subramanian