Chao Feng - San Jose CA, US Samar Sharma - San Jose CA, US Sriram Chidambaram - Sunnyvale CA, US Raghavendra J. Rao - Bangalore, IN Sanjay Hemant Sane - Fremont CA, US Murali Basavaiah - Sunnyvale CA, US
Assignee:
CISCO TECHNOLOGY, INC. - San Jose CA
International Classification:
H04L 12/26 H04L 12/28
US Classification:
370221, 370392, 370254
Abstract:
Systems and methods for providing service virtualization endpoint (SVE) redundancy in a two-node, active-standby form. An active-standby pair of SVEs register with a cloud-centric-network control point (CCN-CP) as a single service node (SN) using a virtual IP address for both a control-plane and a data-plane. At any given time, only the active SVE is a host for the control-plane and the data-plane. When a failover happens, the hosting operation is taken over by the standby SVE, therefore the failover will be transparent to CCN-CP and the SN.
System And Method For Non-Disruptive Management Of Servers In A Network Environment
Chao Feng - San Jose CA, US Samar Sharma - San Jose CA, US Ronak Desai - Fremont CA, US Diheng Qu - Palo Alto CA, US
International Classification:
H04L 12/28
US Classification:
370255
Abstract:
An example method includes disengaging a target node from a cluster, where the disengaging comprises: selecting an inheritor; migrating flows from the target node to the inheritor; informing a migration manager that the target node is disengaged from the cluster; and broadcasting to peer nodes of the target node that the target node is replaced by the inheritor. In particular implementations of the present disclosure, the cluster can include a first layer of a network topology including a forwarding engine that implements hash-based packet forwarding; a second layer of the network topology comprising the target node and the inheritor, where the target node and the inheritor implement flow-based packet forwarding; and a third layer including service nodes configured for packet processing in a network.
Methods And Apparatus For Providing One-Arm Node Clustering Using A Port Channel
Chao Feng - San Jose CA, US Nitesh G. Soni - San Jose CA, US Pramod Cherukumilli - Belmont CA, US Diheng Qu - Palo Alto CA, US Suresh Kumar Nalluru - San Jose CA, US Samar Sharma - San Jose CA, US
Assignee:
CISCO TECHNOLOGY, INC. - San Jose CA
International Classification:
H04L 12/56 G06F 15/16
US Classification:
370392, 370401, 709203
Abstract:
Methods and apparatus for providing one-arm node clustering using a port channel are provided herein. An example application node may be communicatively connected to at least one application node, and the application node may be connected to a network through a port channel. The application node may include: a link included in the port channel for accommodating the network data being communicated between the remote client and server; and a processor configured to send/receive a cluster control packet to/from the at least one application node through the link included in the port channel.
Methods And Apparatuses For Automating Return Traffic Redirection To A Service Appliance By Injecting Traffic Interception/Redirection Rules Into Network Nodes
Devendra Mohan Badhani - San Jose CA, US Chao Feng - San Jose CA, US Samar Sharma - San Jose CA, US Kalyan Venkataramana - San Ramon CA, US
Assignee:
CISCO TECHNOLOGY, INC. - San Jose CA
International Classification:
H04L 12/56 H04L 12/24
US Classification:
370235, 370389, 370392
Abstract:
Methods and apparatuses for automating return traffic redirection to a service appliance by injecting forwarding policies in a packet-forwarding element are disclosed herein. An example method for automating return traffic redirection can include: establishing a communication channel between a service appliance and a packet-forwarding element; and transmitting an out-of-band message over the communication channel to the packet-forwarding element. The message can include a forwarding policy that requests the packet-forwarding element to forward predetermined packets to the service appliance.
Entropy-Based Classification Of Human And Digital Entities
A method of distinguishing between human and computer actions in a cloud environment includes receiving one or more actions from a monitored cloud environment; identifying a text string associated with the one or more actions; calculating an entropy value for the text string; determining whether the text string is bot-generated based at least in part on the entropy value; and determining whether to generate an alert based at least in part on a result of determining whether the text string is bot-generated.
- Redwood Shores CA, US Chao Feng - San Jose CA, US Ganesh Kirti - San Jose CA, US
Assignee:
Oracle International Corporation - Redwood Shores CA
International Classification:
H04L 29/06 G06F 11/32 G06N 3/02 G06F 17/18
Abstract:
A method of detecting anomalous user behavior in a cloud environment includes calculating a first vector that is representative of actions taken during a plurality of previous time intervals; calculating a similarity between the first vector and a second vector that comprises counts of actions taken by the user during a current time interval; comparing the similarity to a baseline threshold to determine whether one or more anomalous actions have occurred; and generating an alert based at least in part on a determination that the one or more anomalous actions have occurred in the cloud environment.
Detecting Behavior Anomalies Of Cloud Users For Outlier Actions
- Redwood Shores CA, US Chao Feng - San Jose CA, US
Assignee:
Oracle International Corporation - Redwood Shores CA
International Classification:
H04L 29/06 G06F 11/32 G06N 3/08 G06F 17/18
Abstract:
A method of detecting anomalous user behavior in a cloud environment includes receiving a vector that comprises counts of actions taken by the user during a current time interval; determining whether an action count in the vector is greater than a global mean; building a scale table by combining new action skills that are above a threshold and original action skills if below the threshold; and identifying outliers when the action count is greater than the global mean multiplied by a corresponding action scale from the scale table.
Attaching Service Level Agreements To Application Containers And Enabling Service Assurance
Providing a template for orchestration of a cloud provided service in a datacenter. This template can include virtual processing services, virtual networking services, storage services, and service level requirements that a user or administrator can select for the cloud provided service. Based on the template the cloud provided service can be provisioned according to the requirements of the service level agreement.
Figure Eight
Data Scientist
Oracle Dec 2016 - Jul 2019
Software Engineer
Palerra Oct 2016 - Dec 2016
Software Engineer
Palerra May 2016 - Aug 2016
Summer Intern
Education:
University at Buffalo 2010 - 2016
Doctorates, Doctor of Philosophy, Computer Science, Philosophy
Skills:
Java C++ C Matlab Python Sql Microsoft Office Html Algorithms Programming
Fineground Networks 2000 - 2005
Principal Engineer
Cisco 2000 - 2005
Senior Technical Leader
Cisco 2000 - 2005
Team Lead
Education:
Beijing University of Posts and Telecommunications 2008 - 2011
Masters, Telecommunications, Engineering
Beijing University of Posts and Telecommunications 2004 - 2008
Bachelors, Electronics, Engineering, Communications
East China Normal University 1999 - 2003
Bachelors, Bachelor of Arts
Shanghai University of Engineering Science 1992 - 1995
University of the Pacific
Doctorates, Doctor of Philosophy, Philosophy
Fudan University
Bachelors, Bachelor of Science, Electrical Engineering
Texas A&M University
Doctorates, Doctor of Philosophy, Computer Science
Skills:
Cctv Access Control Security Alarm Systems Ip Cameras Fire Alarm Surveillance Cabling Intrusion Detection Ip Cctv Security Management Video Over Ip Dvr Project Management Cloud Computing Data Center Snmp Load Balancing C High Availability Linux Distributed Systems Tcp/Ip Software Development Clustering Shell Scripting C++ Server Load Balancer Network Security Network Applications Ip Networking Data Center Architecture Network Management Software Lan Switching Layer 2 Apache Content Switching Virtualization Technology Perl Project Planning Project Coordination Http Socket Linux Server Squid Cisco Computer Architecture Cisco Security Cisco Wireless Firewalls Aaa Ipsec Cisco Access Points Multicast Cisco Technologies Routing Wireless Ccie Cisco Asa Ips