Patents by Inventor Supranamaya Ranjan

Supranamaya Ranjan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9049117
    Abstract: A method is provided for collecting and processing information of a target who is a user of a communication network. The method includes obtaining a first identifier of the target, accessing, based on a handle of the first identifier, a first public webpage associated with the target in a first Internet site identified based on a domain of the first identifier, extracting content of the first public webpage for including in target data of the target, obtaining a third identifier of the target, intercepting a document associated with the target from a private portion of communication network traffic identified based on a domain of the third identifier, extracting content of the document for including in the target data, determining a second identifier by searching the target data, associating the second identifier with the target based on a pre-determined criterion, and collecting information of the target based on the second identifier.
    Type: Grant
    Filed: October 21, 2009
    Date of Patent: June 2, 2015
    Assignee: Narus, Inc.
    Inventors: Antonio Nucci, Ramakrishna Keralapura, Joshua Robinson, Supranamaya Ranjan, Smriti Bhagat
  • Patent number: 8762298
    Abstract: A method for identifying a botnet in a network, including analyzing historical network data using a pre-determined heuristic to determine values of a connectivity graph based feature in the historical network data, obtaining a ground truth data set having labels assigned to data units in the historical network data identifying known malicious nodes in the network, analyzing the historical network data and the ground truth data set using a machine learning algorithm to generate a model representing the labels as a function of the values of the connectivity graph based feature, analyzing real-time network data using the pre-determined heuristic to determine a value of the connectivity graph based feature for a data unit in the real-time network data, assigning a label to the data unit by applying the model to the value of the connectivity graph based feature, and categorizing the data unit as associated with the botnet based on the label.
    Type: Grant
    Filed: January 5, 2011
    Date of Patent: June 24, 2014
    Assignee: Narus, Inc.
    Inventors: Supranamaya Ranjan, Joshua Robinson, Feilong Chen
  • Patent number: 8682812
    Abstract: A method for identifying a botnet in a network, including analyzing historical network data using a pre-determined heuristic to determine values of a feature in the historical network data, obtaining a ground truth data set having labels assigned to data units in the historical network data identifying known malicious nodes in the network, analyzing the historical network data and the ground truth data set using a machine learning algorithm to generate a model representing the labels as a function of the values of the feature, analyzing real-time network data using the pre-determined heuristic to determine a value of the feature for a data unit in the real-time network data, assigning a label to the data unit by applying the model to the value of the feature, and categorizing the data unit as associated with the botnet based on the label.
    Type: Grant
    Filed: December 23, 2010
    Date of Patent: March 25, 2014
    Assignee: Narus, Inc.
    Inventor: Supranamaya Ranjan
  • Patent number: 8578493
    Abstract: A method and system to detect botnet beaconing event based on a beacon detection rule set to generate a beacon alert, which is in turn used to trigger an elevated exfiltration detection activity by reducing various thresholds in an exfiltration detection rule set.
    Type: Grant
    Filed: May 10, 2011
    Date of Patent: November 5, 2013
    Assignee: Narus, Inc.
    Inventors: Joe Cowan, Robert Edward Esposito, Travis Edward Dawson, Supranamaya Ranjan
  • Patent number: 8402543
    Abstract: Embodiments of the invention address the problem of detecting bots in network traffic based on a classification model learned during a training phase using machine learning algorithms based on features extracted from network data associated with either known malicious or known non-malicious client and applying the learned classification model to features extracted in real-time from current network data. The features represent communication activities between the known malicious or known non-malicious client and a number of servers in the network.
    Type: Grant
    Filed: March 25, 2011
    Date of Patent: March 19, 2013
    Assignee: Narus, Inc.
    Inventors: Supranamaya Ranjan, Feilong Chen
  • Patent number: 8392421
    Abstract: The present invention relates to a method of profiling an Internet endpoint associated with an Internet Protocol (IP) address, an IP prefix, or a domain name, the method includes generating a profiling rule using an Internet search engine, obtaining a search result by inputting the IP address, the IP prefix, or the domain name to the Internet search engine, and classifying the Internet endpoint based on the search result using the profiling rule.
    Type: Grant
    Filed: March 25, 2011
    Date of Patent: March 5, 2013
    Assignee: Narus, Inc.
    Inventors: Antonio Nucci, Supranamaya Ranjan, Aleksandar Kuzmanovic
  • Patent number: 8284764
    Abstract: The invention relates to a method for profiling VoIP activity in network traffic. The method includes obtaining a plurality of audio packets from a plurality of packets in the network traffic by analyzing a plurality of parameter sets based on a first pre-determined criterion, wherein each of the plurality of parameter sets corresponds to a packet of the plurality of packets and comprises a packet size and a packet arrival time associated with a corresponding packet of the plurality of packets, generating a count of an IP address by counting at least a portion of the plurality of audio packets, wherein each packet of the portion of the plurality of audio packets comprises the IP address, and identifying an endpoint corresponding to the IP address as a VoIP server and identifying the portion of the plurality of audio packets as VoIP activity associated with the VoIP server when the count exceeds a pre-determined threshold.
    Type: Grant
    Filed: December 15, 2008
    Date of Patent: October 9, 2012
    Assignee: Narus, Inc.
    Inventors: Antonio Nucci, Supranamaya Ranjan, Ram Keralapura
  • Patent number: 8279860
    Abstract: With the widespread adoption of SIP-based VoIP, understanding the characteristics of SIP traffic behavior is critical to problem diagnosis and security protection of VoIP services. A general methodology is provided for profiling SIP-based VoIP traffic behavior at several levels: SIP server host, server entity (e.g., registrar and call proxy) and individual user levels. Using SIP traffic traces captured in a production VoIP network, the characteristics of SIP-based VoIP traffic behavior in an operational environment is illustrated and the effectiveness of the general profiling methodology is demonstrated. In particular, the profiling methodology identifies anomalies due to performance problems and/or implementation flaws through a case study. The efficacy of the methodology in detecting potential VoIP attacks is also demonstrated through a test-bed experimentation.
    Type: Grant
    Filed: November 11, 2008
    Date of Patent: October 2, 2012
    Assignee: Narus, Inc.
    Inventors: Antonio Nucci, Supranamaya Ranjan, Zhi-Li Zhang
  • Patent number: 8270986
    Abstract: A method for content transmission in a cellular network having a collection of cellular zones. The method includes obtaining a statistical trace associated with the cellular network, comprising attributes of historical content chunks received from prior users of the cellular network and trajectories of the prior users moving within the cellular zones, analyzing the statistical trace to identify a portion of the cellular zones as drop zones, allocating drop zone transmission bandwidth to the drop zones based on a pre-determined criterion, receiving, subsequent to the allocating, a transmission request for a content chunk from a mobile device of a user outside the drop zones, delaying transmission of the content chunk while the mobile device remains outside of the drop zones, and transmitting the content chunk in response to detecting the mobile device within the drop zones.
    Type: Grant
    Filed: May 21, 2010
    Date of Patent: September 18, 2012
    Assignee: Narus, Inc.
    Inventors: Antonio Nucci, Supranamaya Ranjan, Aleksandar Kuzmanovic, Ionut Trestian
  • Patent number: 8260914
    Abstract: A method for detecting automatically generated malicious domain names in a network. The method includes identifying a plurality of domain name service (DNS) queries in the network, wherein the plurality of DNS queries share a common attribute, analyzing, using a central processing unit (CPU) of a computer, the plurality of DNS queries to identify a plurality of alphanumeric elements embedded in a set of domain names associated with the plurality of DNS queries, analyzing, using the CPU, the plurality of alphanumeric elements to determine a distribution metric of the set of domain names, and generating an alert based on the distribution metric according to a pre-determined criterion.
    Type: Grant
    Filed: June 22, 2010
    Date of Patent: September 4, 2012
    Assignee: Narus, Inc.
    Inventor: Supranamaya Ranjan
  • Patent number: 8229470
    Abstract: A method for providing location based service in a cellular data service network (CDSN) by analyzing accounting data packets of the CDSN to determine a user mobility pattern, classifying application data packets of the CDSN into pre-determined application categories, analyzing the accounting data packets and the application data packets to associate the user mobility pattern and one of the pre-determined application category, comparing a newly received accounting data packet and the user mobility pattern to identify a match, and providing, in response to identifying the match, the location based service to a user based on the pre-determined application category.
    Type: Grant
    Filed: October 22, 2010
    Date of Patent: July 24, 2012
    Assignee: Narus, Inc.
    Inventors: Supranamaya Ranjan, Antonio Nucci, Aleksandar Kuzmanovic, Ionut Trestian
  • Patent number: 8065731
    Abstract: The present invention relates to a method for containing propagation of a malware in a communication network having a plurality of communication nodes.
    Type: Grant
    Filed: July 1, 2008
    Date of Patent: November 22, 2011
    Assignee: Narus, Inc.
    Inventors: Antonio Nucci, Supranamaya Ranjan
  • Patent number: 8045464
    Abstract: With the widespread adoption of SIP-based VoIP, understanding the characteristics of SIP traffic behavior is critical to problem diagnosis and security protection of VoIP services. A general methodology is provided for profiling SIP-based VoIP traffic behavior at several levels: SIP server host, server entity (e.g., registrar and call proxy) and individual user levels. Using SIP traffic traces captured in a production VoIP network, the characteristics of SIP-based VoIP traffic behavior in an operational environment is illustrated and the effectiveness of the general profiling methodology is demonstrated. In particular, the profiling methodology identifies anomalies due to performance problems and/or implementation flaws through a case study. The efficacy of the methodology in detecting potential VoIP attacks is also demonstrated through a test bed experimentation.
    Type: Grant
    Filed: September 12, 2008
    Date of Patent: October 25, 2011
    Assignee: Narus, Inc.
    Inventors: Antonio Nucci, Supranamaya Ranjan, Zhi-Li Zhang
  • Patent number: 8046496
    Abstract: The present invention relates to a method of compressing data in a network, the data comprising a plurality of packets each having a header and a payload, the header comprising a plurality of header fields, the method comprising generating a classification tree based on at least a portion of the plurality of header fields, determining a inter-packet compression plan based on the classification tree, and performing inter-packet compression in real time for each payload of at least a first portion of the plurality of packets, the inter-packet compression being performed according to at least a portion of the inter-packet compression plan.
    Type: Grant
    Filed: December 12, 2007
    Date of Patent: October 25, 2011
    Assignee: Narus, Inc.
    Inventors: Antonio Nucci, Supranamaya Ranjan, Su Chen
  • Patent number: 8019764
    Abstract: The present invention relates to a method of profiling an Internet endpoint associated with an Internet Protocol (IP) address, the method includes generating a profiling rule using an Internet search engine, obtaining a search result by inputting the IP address to the Internet search engine, and classifying the Internet endpoint based on the search result using the profiling rule.
    Type: Grant
    Filed: April 17, 2008
    Date of Patent: September 13, 2011
    Assignee: Narus Inc.
    Inventors: Antonio Nucci, Supranamaya Ranjan, Aleksandar Kuzmanovic
  • Patent number: 7930424
    Abstract: The present invention relates to a method of detecting invalid border gateway protocol (BGP) route in a network, wherein network traffic is routed based at least on BGP announcements from one or more BGP routers, the method comprising obtaining a plurality of routing information objects from the BGP announcements during an observation window, each routing information object comprising at least one selected from a group consisting of an prefix-origin autonomous system (AS) association and a directed AS-link, identifying a transient routing information object having at least one selected from a group consisting of a up time less than a first pre-determined threshold or a lifespan less than a second pre-determined threshold, defining a valid routing information object set by eliminating the transient routing information object from the plurality of routing information objects, and detecting a BGP route from the BGP announcements as invalid based on the valid routing information object set.
    Type: Grant
    Filed: May 9, 2007
    Date of Patent: April 19, 2011
    Assignee: Narus, Inc.
    Inventors: Antonio Nucci, Supranamaya Ranjan, Lixin Gao, Jian Qiu
  • Patent number: 7823202
    Abstract: The invention relates to a method for generating a prefix hijacking alert in a network, wherein a plurality of network traffic flows are routed based at least on a plurality of prefix announcements from one or more Border Gateway Protocol (BGP) router, the method comprises identifying an anomalous prefix from the plurality of prefix announcements, identifying a network traffic anomaly from the plurality of network traffic flows, and correlating the anomalous prefix and the network traffic anomaly to generate the prefix hijacking alert.
    Type: Grant
    Filed: March 21, 2007
    Date of Patent: October 26, 2010
    Assignee: Narus, Inc.
    Inventors: Antonio Nucci, Supranamaya Ranjan, Lixin Gao, Jian Qiu
  • Patent number: 7712134
    Abstract: A method and an apparatus is provided that is efficient in detecting network virus and worms while using only the layer-4 information that is easily extracted from core routers and also be scalable when layer-7 information is available. Entropy analysis is used to identify anomalous activity at the flow level. Thereafter, only the contents of suspicious flows are analyzed with fingerprinting extraction. By doing so, the present invention brings together the characteristics of being deployable for real-time high data to rate links and the efficiency and reliability of content fingerprinting techniques.
    Type: Grant
    Filed: January 6, 2006
    Date of Patent: May 4, 2010
    Assignee: Narus, Inc.
    Inventors: Antonio Nucci, Supranamaya Ranjan
  • Patent number: 7441429
    Abstract: With the widespread adoption of SIP-based VoIP, understanding the characteristics of SIP traffic behavior is critical to problem diagnosis and security protection of VoIP services. A general methodology is provided for profiling SIP-based VoIP traffic behavior at several levels: SIP server host, server entity (e.g., registrar and call proxy) and individual user levels. Using SIP traffic traces captured in a production VoIP network, the characteristics of SIP-based VoIP traffic behavior in an operational environment is illustrated and the effectiveness of the general profiling methodology is demonstrated. In particular, the profiling methodology identifies anomalies due to performance problems and/or implementation flaws through a case study. The efficacy of the methodology in detecting potential VoIP attacks is also demonstrated through a test bed experimentation.
    Type: Grant
    Filed: September 28, 2006
    Date of Patent: October 28, 2008
    Assignee: Narus, inc.
    Inventors: Antonio Nucci, Supranamaya Ranjan, Zhi-Li Zhang