Patents by Inventor Saverio Niccolini
Saverio Niccolini has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10104043Abstract: A method for analyzing a data flow includes: (a) extracting packet information of a packet, (b) determining a status of the packet based on the extracted packet information by applying at least one probabilistic filter to the packet and storing the packet for later inspection based on the status of the packet indicating that the packet is out-of sequence, and (c) inspecting the stored packet based on inspection rules. Upon a partial match of an inspection rule with the extracted packet information, a result of the inspection is temporarily stored. Already stored packets are inspected based on the already stored packets being in-order with already inspected packets. Upon a total match of at least one of the inspection rules, a predetermined action is performed and the stored result is deleted. The at least one probabilistic filter includes a connection Bloom filter and a sequence Bloom filter.Type: GrantFiled: December 22, 2017Date of Patent: October 16, 2018Assignee: NEC CORPORATIONInventors: Maurizio Dusi, Saverio Niccolini, Giulio Picierro, Riccardo Paolillo, Michele Orru, Giuseppe Bianchi
-
Publication number: 20180124019Abstract: A method for analyzing a data flow includes: (a) extracting packet information of a packet, (b) determining a status of the packet based on the extracted packet information by applying at least one probabilistic filter to the packet and storing the packet for later inspection based on the status of the packet indicating that the packet is out-of sequence, and (c) inspecting the stored packet based on inspection rules. Upon a partial match of an inspection rule with the extracted packet information, a result of the inspection is temporarily stored. Already stored packets are inspected based on the already stored packets being in-order with already inspected packets. Upon a total match of at least one of the inspection rules, a predetermined action is performed and the stored result is deleted. The at least one probabilistic filter includes a connection Bloom filter and a sequence Bloom filter.Type: ApplicationFiled: December 22, 2017Publication date: May 3, 2018Inventors: Maurizio Dusi, Saverio Niccolini, Giulio Picierro, Riccardo Paolillo, Michele Orru, Giuseppe Bianchi
-
Patent number: 9923870Abstract: A method for analyzing a data flow includes extracting packet information of a packet of the data flow, determining the status of the packet and the status of the data flow based on the extracted packet information and storing the packet for later inspection when the status of the packet and/or the status of the data flow indicate that the packet is out-of sequence, and inspecting the packet and/or the stored packet based on inspection rules. Upon a partial match of at least one of the inspection rules with the extracted packet information, a result of the inspection of the packet is temporarily stored. Already stored packets are inspected when they are in-order with already inspected packets. Upon a total match of at least one of the inspection rules, a predetermined action is performed and the stored result is deleted.Type: GrantFiled: December 12, 2013Date of Patent: March 20, 2018Assignee: NEC CORPORATIONInventors: Maurizio Dusi, Saverio Niccolini, Giulio Picierro, Riccardo Paolillo, Michele Orru, Giuseppe Bianchi
-
Publication number: 20180048530Abstract: A method for supporting detection of irregularities in a network includes monitoring features of said network using at least one monitoring device in order to collect spatio-temporal measuring data; providing, in an off-line phase, a training matrix where collected measuring data is aggregated in a predetermined time window such that said training matrix includes spatia-temporal correlations; performing, in said off-line phase, non-negative matrix factorization in order to decompose said training matrix into a coefficient matrix and a basis matrix, wherein temporal correlations and spatial correlations are jointly considered; creating, in an on-line phase; a current runtime matrix on a basis of measuring data newly collected in the on-line phase, computing, in said on-line phase, a current runtime coefficient matrix on a basis of said current runtime matrix and said basis matrix; and comparing, in said on-line phase, said current runtime coefficient matrix with at least one previous coefficient matrix.Type: ApplicationFiled: October 23, 2015Publication date: February 15, 2018Inventors: Sofia Nikitaki, Maurizio Dusi, Mohamed Ahmed, Saverio Niccolini
-
Publication number: 20170315918Abstract: A method for storing objects in a storage, wherein the storage has a predetermined capacity, includes providing an expected popularity and an uncertainty of the expected popularity for each of the objects, and selecting a set of the objects for storing in the storage, wherein the set of is selected on the basis of the expected popularity, the uncertainty and the capacity of the storage.Type: ApplicationFiled: November 10, 2015Publication date: November 2, 2017Inventors: Sofia Nikitaki, Mohamed Ahmed, Saverio Niccolini
-
Patent number: 9805122Abstract: A search engine for finding objects that correspond to a search request, including an input module for receiving a keyword query from a user, and a search module being configured to map the keyword query to the identifiers of objects that semantically match the keyword or the plurality of keywords contained in the keyword query, and to generate a search result that contains a listing of matching object identifiers, is characterized in that the search module is further configured to generate the search result by considering network layer information about the user within the process of mapping the keyword query to identifiers of matching objects, wherein the network layer information include sophisticated information the search module receives from a dedicated entity.Type: GrantFiled: August 12, 2011Date of Patent: October 31, 2017Assignees: NEC EUROPE LTD., YAHOO HOLDINGS, INC.Inventors: Jan Seedorf, Saverio Niccolini, Martin Stiemerling, Flavio Junqueira, Marco Serafini, Ivan Kelly, Vincent Leroy, Berkant Barla Cambazoglu
-
Patent number: 9648126Abstract: A method for caching objects at one or more cache servers of a content delivery network (CDN) includes: determining, by a processor, attributes of objects of a set of objects; calculating, by the processor, an efficiency metric for each object of the set of objects based on the attributes of each object, wherein the attributes of each object include an expected future popularity associated with the object; selecting, by the processor, a subset of objects from the set of objects for caching based on calculated efficiency metrics; and caching the subset of objects at the one or more cache servers.Type: GrantFiled: April 25, 2014Date of Patent: May 9, 2017Assignee: NEC CORPORATIONInventors: Felipe Huici, Mohamed Ahmed, Sofia Nikitaki, Saverio Niccolini
-
Publication number: 20160205072Abstract: A method for analyzing a data flow includes extracting packet information of a packet of the data flow, determining the status of the packet and the status of the data flow based on the extracted packet information arid storing the packet for later inspection when the status of the packet and/or the status of the data flow indicate that the packet is out-of sequence, and inspecting the packet and/or the stored packet based on inspection rules. Upon a partial match of at least one of the inspection rules with the extracted packet information, a result of the inspection of the packet is temporarily stored. Already stored packets are inspected when they are in-order with already inspected packets. Upon a total match of at least one of the inspection rules, a predetermined action is performed and the stored result is deleted.Type: ApplicationFiled: December 12, 2013Publication date: July 14, 2016Inventors: Maurizio Dusi, Saverio Niccolini, Giulio Picierro, Riccardo Paolillo, Michele Orru, Giuseppe Bianchi
-
Patent number: 9392056Abstract: The invention is directed to a network, and method for operating a network, for allowing an effective traffic localization within an Application-Layer Traffic Optimization (ALTO), wherein an ALTO process is performed with regard to at least one application or resource consumer, and traffic information with respect to the at least one application or resource consumer will be provided and used within the ALTO process.Type: GrantFiled: July 23, 2010Date of Patent: July 12, 2016Assignee: NEC CORPORATIONInventors: Jan Seedorf, Saverio Niccolini, Stella Spagna
-
Patent number: 9338075Abstract: For providing a simple monitoring mechanism with reduced resource and performance requirements a method for monitoring traffic in a network is claimed, wherein a monitoring activity of at least two monitoring probes of the network is coordinated by a coordinating element, wherein at least two nodes of the network are able to operate as coordinating elements and wherein the responsibility for coordinating the monitoring activity of the monitoring probes is split between the nodes according to a compressed representation of flow parameter keys. Further, an according network is described, preferably for carrying out the above mentioned method.Type: GrantFiled: October 9, 2009Date of Patent: May 10, 2016Assignee: NEC EUROPE LTD.Inventors: Andrea Di Pietro, Felipe Huici, Saverio Niccolini
-
Patent number: 9305265Abstract: A method for probabilistic processing of data, wherein the data is provided in form of a data set S composed of multidimensional n-tuples of the form (x1, . . . , xn), is characterized in that an n-dimensional data structure is generated by way of providing a bit matrix, providing a number K of independent hash functions Hk that are employed in order to address the bits in the matrix, and inserting the n-tuples (x1, . . . , xn) into the bit matrix by computing the hash values Hk(x) for all values x of the n-tuple for each of the number K of independent hash functions Hk, and by setting the resulting bits [Hk(x1), . . . , Hk(xn)] of the matrix. Furthermore, a respective system is disclosed.Type: GrantFiled: September 29, 2010Date of Patent: April 5, 2016Assignee: NEC EUROPE LTD.Inventors: Andrea Di Pietro, Felipe Huici, Saverio Niccolini
-
Patent number: 9253098Abstract: For allowing a very flexible scheduling of data flows within an OpenFlow (OF) switch a method for operating an OpenFlow switch within a network includes using the OpenFlow switch to direct arriving data flows out of different ports of the OpenFlow switch. The method is characterized in that a scheduling mechanism for performing at least one scheduling task is assigned to the OpenFlow switch, wherein a metric will be used to assign weights to the arriving data flows and wherein the data flows will then be scheduled based on the assigned weights and based on a scheduling policy. Further, a corresponding OpenFlow switch and a corresponding network are described, preferably for carrying out the above mentioned method.Type: GrantFiled: March 7, 2011Date of Patent: February 2, 2016Assignee: NEC EUROPE LTD.Inventors: Felipe Huici, Mohamed Ahmed, Saverio Niccolini
-
Publication number: 20150370490Abstract: A method for caching using a solid-state drive (SSD)-based cache includes: determining a set of potential objects for storage at the SSD-based cache; ranking the potential objects for storage based on expected utility values corresponding to each potential object for storage; selecting objects for storage from the potential objects for storage based on the ranking; and causing the selected objects to be written to the SSD-based cache. Further, a reserve capacity for the SSD-based cache may be dynamically adjusted based on the write speed associated with an object being written to the SSD-based cache.Type: ApplicationFiled: June 24, 2014Publication date: December 24, 2015Inventors: Felipe Huici, Mohamed Ahmed, Saverio Niccolini
-
Patent number: 9203857Abstract: A method and system for detecting anomaly of user behavior in a network with a hierarchical topology, including a plurality of users, at least two bridges to each of which at least one user is connected to and wherein the bridges are configured to be operable to connect the corresponding users to the network, and at least one predetermined profiling network entity, the method includes the steps of: a) determining common behaviors of the users connected to the respective bridges; b) transmitting the determined common behaviors to the profiling network entity; c) determining an overall profile based on the transmitted common behaviors; d) transmitting back the determined overall profile to the bridges; and e) detecting anomaly of user behavior of the users connected to the corresponding bridges based on the overall profile.Type: GrantFiled: August 10, 2012Date of Patent: December 1, 2015Assignee: NEC EUROPE LTD.Inventors: Saverio Niccolini, Maurizio Dusi, Christian Vitale
-
Publication number: 20150312367Abstract: A method for caching objects at one or more cache servers of a content delivery network (CDN) includes: determining, by a processor, attributes of objects of a set of objects; calculating, by the processor, an efficiency metric for each object of the set of objects based on the attributes of each object, wherein the attributes of each object include an expected future popularity associated with the object; selecting, by the processor, a subset of objects from the set of objects for caching based on calculated efficiency metrics; and caching the subset of objects at the one or more cache servers.Type: ApplicationFiled: April 25, 2014Publication date: October 29, 2015Inventors: Felipe Huici, Mohamed Ahmed, Sofia Nikitaki, Saverio Niccolini
-
Patent number: 9032515Abstract: A method for detecting attacks to multimedia systems, wherein a communication path (1) is established within the multimedia system by a multimedia communication flow between a communication source and a communication destination, is characterized in that at least two devices (3, 4, 8) are provided along the communication path (1), each the device (3, 4, 8) acting as inspection device (2) that is enabled to inspect the multimedia communication flow that transits the inspection device (2), and that the results of the single inspections are accumulated along the communication path (1). Furthermore, a multimedia system with attack detection functionality is described.Type: GrantFiled: August 21, 2007Date of Patent: May 12, 2015Assignee: NEC Europe Ltd.Inventors: Saverio Niccolini, Thilo Ewald, Stefan Schmid
-
Patent number: 8953472Abstract: A method for monitoring a network, wherein the network has a connected graph topology, in particular a tree structure, including a plurality of monitoring nodes that collect network measurement data, a plurality of mediator nodes each performing at least the task of aggregating network measurement data received from different monitoring nodes and/or other mediator nodes, and at least one root entity that receives network measurement data and/or aggregated network measurement data from the mediator nodes, is characterized in that the aggregation of network measurement data is performed by condensing network measurement data into a summarized probabilistic data structure. Furthermore, a network including a monitoring functionality is disclosed.Type: GrantFiled: August 31, 2010Date of Patent: February 10, 2015Assignee: NEC Europe Ltd.Inventors: Andrea Di Pietro, Felipe Huici, Diego Costantini, Saverio Niccolini
-
Publication number: 20140215612Abstract: A method and system for detecting anomaly of user behavior in a network with a hierarchical topology, including a plurality of users, at least two bridges to each of which at least one user is connected to and wherein the bridges are configured to be operable to connect the corresponding users to the network, and at least one predetermined profiling network entity, the method includes the steps of: a) determining common behaviors of the users connected to the respective bridges; b) transmitting the determined common behaviors to the profiling network entity; c) determining an overall profile based on the transmitted common behaviors; d) transmitting back the determined overall profile to the bridges; and e) detecting anomaly of user behavior of the users connected to the corresponding bridges based on the overall profile.Type: ApplicationFiled: August 10, 2012Publication date: July 31, 2014Inventors: Saverio Niccolini, Maurizio Dusi, Christian Vitale
-
Publication number: 20140201184Abstract: A search engine for finding objects that correspond to a search request, including an input module for receiving a keyword query from a user, and a search module being configured to map the keyword query to the identifiers of objects that semantically match the keyword or the plurality of keywords contained in the keyword query, and to generate a search result that contains a listing of matching object identifiers, is characterized in that the search module is further configured to generate the search result by considering network layer information about the user within the process of mapping the keyword query to identifiers of matching objects, wherein the network layer information include sophisticated information the search module receives from a dedicated entity.Type: ApplicationFiled: August 12, 2011Publication date: July 17, 2014Applicants: YAHOO ! INC., NEC EUROPE LTD.Inventors: Jan Seedorf, Saverio Niccolini, Martin Stiemerling, Flavio Junqueira, Marco Serafini, Ivan Kelly, Vincent Leroy, Berkant Barla Cambazoglu
-
Publication number: 20140029427Abstract: For allowing a very flexible scheduling of data flows within an OpenFlow (OF) switch a method for operating an OpenFlow switch within a network includes using the OpenFlow switch to direct arriving data flows out of different ports of the OpenFlow switch. The method is characterized in that a scheduling mechanism for performing at least one scheduling task is assigned to the OpenFlow switch, wherein a metric will be used to assign weights to the arriving data flows and wherein the data flows will then be scheduled based on the assigned weights and based on a scheduling policy. Further, a corresponding OpenFlow switch and a corresponding network are described, preferably for carrying out the above mentioned method.Type: ApplicationFiled: March 7, 2011Publication date: January 30, 2014Inventors: Felipe Huici, Mohamed Ahmed, Saverio Niccolini