Method and system for computer assisted hot-tracing mechanism
    41.
    发明授权
    Method and system for computer assisted hot-tracing mechanism 有权
    计算机辅助热追踪机制的方法与系统

    公开(公告)号:US09489286B2

    公开(公告)日:2016-11-08

    申请号:US14168375

    申请日:2014-01-30

    CPC classification number: G06F11/3644 G06F11/3636

    Abstract: This invention provides a new mechanism for “Hot-Tracing” using a novel placeholder mechanism and binary rewriting techniques, which leverages existing compiler flags in order to enable light-weight and highly flexible dynamic instrumentation. Broadly, I-Probe can be divided in 2 distinct workflows—1. Pre-processing (ColdPatch), and 2. Hot Tracing. The first phase is a pre-processing mechanism to prepare the binary for phase 2. The second phase is the actual hot-tracing mechanism, which allows users to dynamically instrument functions (more specifically symbols) of their choice.

    Abstract translation: 本发明提供了一种使用新型占位符机制和二进制重写技术的“热追踪”的新机制,其利用现有的编译器标志以便实现轻量级和高度灵活的动态仪器。 普遍来说,I-Probe可以分为两个不同的工作流程 - 1。 预处理(ColdPatch)和2.热追踪。 第一阶段是为阶段2准备二进制的预处理机制。第二阶段是实际的热追踪机制,允许用户动态地对其选择的功能(更具体地说是符号)进行仪器仪表功能。

    SYSTEM AND METHOD FOR PROFILING REQUESTS IN SERVICE SYSTEMS
    42.
    发明申请
    SYSTEM AND METHOD FOR PROFILING REQUESTS IN SERVICE SYSTEMS 有权
    在服务系统中分配要求的系统和方法

    公开(公告)号:US20160063398A1

    公开(公告)日:2016-03-03

    申请号:US14839363

    申请日:2015-08-28

    Abstract: A system and method for profiling a request in a service system with kernel events including a pre-processing module configured to obtain kernel event traces from the service system and determine starting and ending communication pairs of a request path for a request. A learning module is configured to learn pairwise relationships between the starting and ending communication pairs of training traces of sequential requests. A generation module is configured to generate communication paths for the request path from the starting and ending communication pairs of testing traces of concurrent requests using a heuristic procedure that is guided by the learned pairwise relationships and generate the request path for the request from the communication paths. The system and method precisely determine request paths for applications in a distributed system from kernel event traces even when there are numerous concurrent requests.

    Abstract translation: 一种用于在具有内核事件的服务系统中对请求进行分析的系统和方法,所述内核事件包括预处理模块,所述预处理模块被配置为从所述服务系统获取内核事件跟踪并且确定请求的请求路径的起始和结束通信对。 学习模块被配置为学习顺序请求的训练轨迹的开始和结束通信对之间的成对关系。 生成模块被配置为使用由所学习的成对关系指导的启发式过程从并发请求的测试跟踪的起始和结束通信对生成针对请求路径的通信路径,并且从通信路径生成针对请求的请求路径 。 即使有许多并发请求,系统和方法也可以精确地确定来自内核事件跟踪的分布式系统中应用程序的请求路径。

    Method and system for correlated tracing with automated multi-layer function instrumentation localization
    44.
    发明授权
    Method and system for correlated tracing with automated multi-layer function instrumentation localization 有权
    自动多层功能仪器定位的相关跟踪方法与系统

    公开(公告)号:US09092568B2

    公开(公告)日:2015-07-28

    申请号:US13873610

    申请日:2013-04-30

    CPC classification number: G06F11/3636 G06F11/3604

    Abstract: A system for automatically instrumenting and tracing an application program and related software components achieves a correlated tracing of the program execution. It includes tracing of endpoints that are the set of functions in the program execution path that the developers are interested. The tracing endpoints and related events become the total set of functions to be traced in the program (called instrument points). This invention automatically analyzes the program and generates such instrumentation points to enable correlated tracing. The generated set of instrumentation points addresses common questions that developers ask when they use monitoring tools.

    Abstract translation: 用于自动测试和跟踪应用程序和相关软件组件的系统实现了程序执行的相关跟踪。 它包括跟踪开发人员感兴趣的程序执行路径中的一组函数的端点。 跟踪终点和相关事件成为程序中要追踪的功能的总数(称为仪器点)。 本发明自动分析程序并生成这样的仪器点以实现相关跟踪。 生成的仪器仪表组解决了开发人员在使用监控工具时所要求的常见问题。

    Method and System for Computer Assisted Hot-Tracing Mechanism
    45.
    发明申请
    Method and System for Computer Assisted Hot-Tracing Mechanism 有权
    计算机辅助热追踪机制的方法与系统

    公开(公告)号:US20140229921A1

    公开(公告)日:2014-08-14

    申请号:US14168375

    申请日:2014-01-30

    CPC classification number: G06F11/3644 G06F11/3636

    Abstract: This invention provides a new mechanism for “Hot-Tracing” using a novel placeholder mechanism and binary rewriting techniques, which leverages existing compiler flags in order to enable light-weight and highly flexible dynamic instrumentation. Broadly, I-Probe can be divided in 2 distinct workflows—1. Pre-processing (ColdPatch), and 2. Hot Tracing. The first phase is a pre-processing mechanism to prepare the binary for phase 2. The second phase is the actual hot-tracing mechanism, which allows users to dynamically instrument functions (more specifically symbols) of their choice.

    Abstract translation: 本发明提供了一种使用新型占位符机制和二进制重写技术的“热追踪”的新机制,其利用现有的编译器标志以便实现轻量级和高度灵活的动态仪器。 普遍来说,I-Probe可以分为两个不同的工作流程 - 1。 预处理(ColdPatch)和2.热追踪。 第一阶段是为阶段2准备二进制的预处理机制。第二阶段是实际的热追踪机制,允许用户动态地对其选择的功能(更具体地说是符号)进行仪器仪表功能。

    Protocol-independent anomaly detection

    公开(公告)号:US11297082B2

    公开(公告)日:2022-04-05

    申请号:US16535521

    申请日:2019-08-08

    Abstract: A computer-implemented method for implementing protocol-independent anomaly detection within an industrial control system (ICS) includes implementing a detection stage, including performing byte filtering using a byte filtering model based on at least one new network packet associated with the ICS, performing horizontal detection to determine whether a horizontal constraint anomaly exists in the at least one network packet based on the byte filtering and a horizontal model, including analyzing constraints across different bytes of the at least one new network packet, performing message clustering based on the horizontal detection to generate first cluster information, and performing vertical detection to determine whether a vertical anomaly exists based on the first cluster information and a vertical model, including analyzing a temporal pattern of each byte of the at least one new network packet.

    FAULT DETECTION IN CYBER-PHYSICAL SYSTEMS

    公开(公告)号:US20210350232A1

    公开(公告)日:2021-11-11

    申请号:US17241430

    申请日:2021-04-27

    Abstract: Methods and systems for training a neural network model include processing a set of normal state training data and a set of fault state training data to generate respective normal state inputs and fault state inputs that each include data features and sensor correlation graph information. A neural network model is trained, using the normal state inputs and the fault state inputs, to generate a fault score that provides a similarity of an input to the fault state training data and an anomaly score that provides a dissimilarity of the input to the normal state training data.

    ANOMALY DETECTION WITH GRAPH ADVERSARIAL TRAINING IN COMPUTER SYSTEMS

    公开(公告)号:US20210067549A1

    公开(公告)日:2021-03-04

    申请号:US17004752

    申请日:2020-08-27

    Abstract: Methods and systems for detecting and responding to an intrusion in a computer network include generating an adversarial training data set that includes original samples and adversarial samples, by perturbing one or more of the original samples with an integrated gradient attack to generate the adversarial samples. The original and adversarial samples are encoded to generate respective original and adversarial graph representations, based on node neighborhood aggregation. A graph-based neural network is trained to detect anomalous activity in a computer network, using the adversarial training data set. A security action is performed responsive to the detected anomalous activity.

    FLEXIBLE EDGE-EMPOWERED GRAPH CONVOLUTIONAL NETWORKS WITH NODE-EDGE ENHANCEMENT

    公开(公告)号:US20210064959A1

    公开(公告)日:2021-03-04

    申请号:US16998280

    申请日:2020-08-20

    Abstract: Systems and methods for predicting road conditions and traffic volume is provided. The method includes generating a graph of one or more road regions including a plurality of road intersections and a plurality of road segments, wherein the road intersections are represented as nodes and the road segments are represented as edges. The method can also include embedding the nodes from the graph into a node space, translating the edges of the graph into nodes of a line graph, and embedding the nodes of the line graph into the node space. The method can also include aligning the nodes from the line graph with the nodes from the graph, and optimizing the alignment, outputting a set of node and edge representations that predicts the traffic flow for each of the road segments and road intersections based on the optimized alignment of the nodes.

Patent Agency Ranking