-
公开(公告)号:US20230239244A1
公开(公告)日:2023-07-27
申请号:US18127881
申请日:2023-03-29
Applicant: Intel Corporation
Inventor: Ningbo TIAN , Xiahui YU , Kun QIU , Hao CHANG , Yong LIU , Hongjun NI
IPC: H04L47/11 , H04L47/122 , H04L43/062
CPC classification number: H04L47/11 , H04L47/122 , H04L43/062
Abstract: Examples described herein relate to a programmable packet processing pipeline configured to: access a data corresponding to multiple bins, respective bins associated with multiple packet flows and for respective bins: identify a single flow associated with a bin of the multiple bins as a candidate heavy hitter flow and determine a different packet flow as the candidate heavy hitter flow for the bin of the multiple bins.
-
2.
公开(公告)号:US20220279013A1
公开(公告)日:2022-09-01
申请号:US17744463
申请日:2022-05-13
Applicant: Intel Corporation
Inventor: Kun QIU , Hao CHANG , Ying WANG , Wenjun ZHU , Xiahui YU , Yingqi LIU , Baoqian LI , Weigang LI
IPC: H04L9/40 , G06F16/242 , G06F16/903 , H04L9/32
Abstract: Methods and apparatus for a flexible Deterministic Finite Automata (DFA) tokenizer for AI-based malicious traffic detection. A DFA compiler is used to process profiles, such as SQLi, HTML5 and XSS profiles, as well as user-defined profiles, to generate corresponding DFA transition tables. The DFA tokenizer includes a DFA engine that employs the DFA transition table(s) to generate token sequences derived from input strings. The token sequences are converted into feature vectors using a feature extraction engine, and the feature vectors are used for training a machine learning/Artificial Intelligence (AI) model configured to perform binary classification (benign or malicious). During run-time, strings are extracted from input received via a network and tokenized with the DFA tokenizer to generate token sequences that are converted into feature vectors. The feature vectors are then classified using the AI model to determine whether the input is benign or malicious.
-