CLASSIFICATION OF ENCRYPTED INTERNET TRAFFIC

    公开(公告)号:US20210044572A1

    公开(公告)日:2021-02-11

    申请号:US16533190

    申请日:2019-08-06

    Abstract: A method includes obtaining a first plurality of encrypted traffic flows traversing a communication network, performing a first classification, wherein a result of the first classification identifies a traffic type associated with each encrypted traffic flow of the first plurality of encrypted traffic flows, and wherein the first classification is based on a traffic pattern of the each encrypted traffic flow, performing a second classification, wherein a result of the second classification identifies a traffic type associated with each server name indication from which the first plurality of encrypted traffic flows is associated, and wherein the second classification is based on the result of the first classification, and performing a third classification identifying a traffic type associated with each encrypted traffic flow of the first plurality of encrypted traffic flows, wherein the third classification is based on a combination of the results of the first classification and the second classification.

    OPTIMIZING DELAY-SENSITIVE NETWORK-BASED COMMUNICATIONS WITH LATENCY GUIDANCE

    公开(公告)号:US20210028884A1

    公开(公告)日:2021-01-28

    申请号:US17068795

    申请日:2020-10-12

    Abstract: Devices, computer-readable media, and methods for selecting a type of packet loss protection for a network-based communication based upon a latency estimate are disclosed. For example, a processing system including at least one processor may obtain a latency estimate for a network-based communication, determine whether the latency estimate exceeds a latency threshold for selecting a type of packet loss protection, and select, the type of packet loss protection for the network-based communication from among a first type of packet loss protection and a second type of packet loss protection based upon the determining. When the latency estimate is determined to not exceed the latency threshold, the first type of packet loss protection is selected. When the latency estimate is determined to exceed the latency threshold, the second type of packet loss protection is selected.

    METHODS TO ESTIMATE VIDEO PLAYBACK BUFFER
    84.
    发明申请

    公开(公告)号:US20200213636A1

    公开(公告)日:2020-07-02

    申请号:US16814451

    申请日:2020-03-10

    Abstract: Aspects of the subject disclosure may include, for example, a method including monitoring a video session to determine key performance indicators for cross-layer interactions between a network providing video session video data and user equipment receiving the video session video data, wherein the key performance indicators include a transmission control protocol congestion window size that corresponds to a video chunk requested by the user equipment, and a radio access network throughput of a download of the video chunk requested by the user equipment, and determining a quality of service for the user equipment during the video session according to a residual length of content in a playback buffer for the user equipment based on the transmission control protocol congestion window size, and the radio access network throughput. Other embodiments are disclosed.

    Method to Identify Video Applications from Encrypted Over-the-top (OTT) Data

    公开(公告)号:US20190279113A1

    公开(公告)日:2019-09-12

    申请号:US15914057

    申请日:2018-03-07

    Abstract: Aspects of the subject disclosure may include, for example, a processing system that performs operations including collecting encrypted network traffic flow data from user interaction with an application, deriving a first set of traffic feature vectors from the encrypted network traffic flow data collected, training a machine learning algorithm on the first set of traffic feature vectors to classify each traffic feature vector in the first set of traffic feature vectors as associated with a type of the application or not associated with the type of the application, and classifying whether an encrypted network traffic flow as the type of the application by applying the machine learning algorithm to a traffic feature vector of the encrypted network traffic flow. Other embodiments are disclosed.

    ESTIMATING NETWORK DATA STREAMING RATE
    86.
    发明申请

    公开(公告)号:US20180324234A1

    公开(公告)日:2018-11-08

    申请号:US15587479

    申请日:2017-05-05

    CPC classification number: H04L65/1083 H04L65/607 H04L67/02 H04L67/06

    Abstract: In one example, the present disclosure describes a device, computer-readable medium, and method for estimating the streaming rate at which data is delivered over a network. For instance, in one example, a data packet is intercepted from a data streaming session conducted between a first device and a second device connected over a network. A size of a file segment contained in the data packet is calculated. The file segment corresponds to a portion of an item of multimedia content being delivered via the data streaming session. The encoding rate of the data streaming session is then calculated based at least in part on the size of the file segment.

    Estimation of network latency based on aggregated performance data

    公开(公告)号:US12212479B2

    公开(公告)日:2025-01-28

    申请号:US17957326

    申请日:2022-09-30

    Abstract: Estimation of network latency based on aggregated performance data is disclosed. End-to-end latency between endpoints can comprise protocol-induced latency, access network-induced, core-network latency, and network-distance-based latency. Network latency, e.g., network-distance-based latency, also referred to as topological latency, can correspond to communication path length between endpoints. Crowdsourcing of communication path performance information can enable estimation of topological latency, and derivatives thereof, such as topological distance. Crowdsourcing can be the practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, e.g., collection of performance information. The disclosure illustrates estimation of protocol-induced latency, access network-induced, and core-network latency, such that they can be compensated for in end-to-end latency information, thereby enabling estimation of topological latency that can be employed in determining, initiating, etc., a network response operation that can affect change in a network.

Patent Agency Ranking