Method and apparatus for mitigating routing misbehavior in a network is described. In one example, routing protocol traffic is received from a remote router destined for a local router. The routing protocol traffic is parsed to identify a subset of traffic. The subset of traffic is normalized to identify and correct misconfigured routing updates. The routing protocol traffic is provided to the local router. In one embodiment, the subset of traffic is normalized by at least one of detecting and correcting routing protocol semantics, detecting and correcting violations in routing policies, detecting and correcting routing anomalies, or mitigating routing instability.
Zhuoqing Morley Mao - Ann Arbor MI, US Lili Qiu - Austin TX, US Jia Wang - Randolph NJ, US Yin Zhang - Austin TX, US
Assignee:
AT&T Intellectual Property II, L.P. - Atlanta GA
International Classification:
H04L 12/50 H04L 12/56 H04L 12/28 H04Q 11/00
US Classification:
370397, 370381, 370392, 37039531
Abstract:
Disclosed is a method and apparatus for inferring AS paths between two endpoint nodes communicating over a network having a plurality of nodes without having access to the endpoint nodes. The method and apparatus determine routing tables of at least some of the plurality of nodes. A relationship between each node is then inferred from the routing tables. The method and apparatus then determine a path between the two endpoint nodes from the relationship and the routing table determination.
Alexandre Gerber - Madison NJ, US Zhuoqing Mao - Ann Arbor MI, US Feng Qian - Ann Arbor MI, US Subhabrata Sen - New Providence NJ, US Oliver Spatscheck - Randolph NJ, US Walter Willinger - Madison NJ, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
H04L 12/56
US Classification:
370230, 370235
Abstract:
A packet trace is received. Inter-arrival times between the multiple packets in the packet trace are determined. An inter-arrival time in the inter-arrival times that is greater than a threshold is identified. An order number of the inter-arrival time is identified. A determination is made as to whether a size of each of at least a portion of the multiple packets is equal to a maximum segment size. When a determination is made that the size of each of at least a portion of the multiple packets is equal to the maximum segment size, a size of the ICW as a product of the order number and the maximum segment size is returned.
Yinglian Xie - Cupertino CA, US Fang Yu - Sunnyvale CA, US Martin Abadi - Palo Alto CA, US Eliot C. Gillum - Mountain View CA, US Junxian Huang - Ann Arbor MI, US Zhuoqing Morley Mao - Ann Arbor MI, US Jason D. Walter - San Jose CA, US Krishna Vitaldevara - Fremont CA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 29/06
US Classification:
726 22, 726 4, 726 14, 726 18, 713154, 709206
Abstract:
Detection of user accounts associated with spammer attacks may be performed by constructing a social graph of email users. Biggest connected components (BCC) of the social graph may be used to identify legitimate user accounts, as the majority of the users in the biggest connected components are legitimate users. BCC users may be used to identify more legitimate users. Using degree-based detection techniques and PageRank based detection techniques, the hijacked user accounts and spammer user accounts may be identified. The users' email sending and receiving behaviors may also be examined, and the subgraph structure may be used to detect stealthy attackers. From the social graph analysis, legitimate user accounts, malicious user accounts, and compromised user accounts can be identified.
Intelligent Mobility Application Profiling With Respect To Identified Communication Bursts
Alexandre Gerber - Madison NJ, US Zhuoqing Morley Mao - Ann Arbor MI, US Feng Qian - Basking Ridge NJ, US Subhabrata Sen - New Providence NJ, US Oliver Spatscheck - Randolph NJ, US Zhaoguang Wang - Ann Arbor MI, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
G06F 15/173
US Classification:
709224, 709223, 370229
Abstract:
Systems and methods for analyzing mobile device applications within a wireless data network are presented herein. More particularly, described herein is a novel Intelligent Mobility Application Profiling Tool (iMAP) and/or other mechanisms, systems and methods for profiling and benchmarking applications associated with mobile devices in a wireless data network. Various systems and methods described herein expose cross-layer interaction associated with a network device in order to profile an application on the network device with respect to energy efficiency, performance, and functionality. As described herein, radio resource control (RRC) analysis can be performed to infer RRC states associated with a given application, identify tail time, etc. Further, analyzers are employed for various layers, including transmission control protocol (TCP) and/or hypertext transfer protocol (HTTP), as well as to analyze communication bursts associated with a given application. Analysis results are subsequently utilized to deliver application profiling results to a user.
Method And Apparatus For Inferring State Transitions In A Wireless Communications Network
Alexandre Gerber - Madison NJ, US Zhuoqing Mao - Ann Arbor MI, US Feng Qian - Ann Arbor MI, US Subhabrata Sen - New Providence NJ, US Oliver Spatscheck - Randolph NJ, US Zhaoguang Wang - Ann Arbor MI, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
H04W 52/02 H04W 52/22
US Classification:
370311, 370328, 455 134, 4553432, 4554221, 455522
Abstract:
A method, a computer readable medium and an apparatus for inferring state transitions in a wireless communications network are disclosed. In one embodiment, the method infers a state promotion procedure. In another embodiment, the method infers a state demotion procedure.
Alexandre Gerber - Madison NJ, US Zhuoqing Mao - Ann Arbor MI, US Feng Qian - Ann Arbor MI, US Subhabrata Sen - New Providence NJ, US Oliver Spatscheck - Randolph NJ, US Walter Willinger - Madison NJ, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
H04L 7/02
US Classification:
375359, 375354, 37039552, 370912, 370913
Abstract:
A packet trace is received. The packet trace is transformed into a sequence of pulse signals in a temporal domain. The sequence of pulse signals in the temporal domain is transformed into a sequence of pulse signals in a frequency domain. Peaks are detected within relevant frequency bands in the sequence of pulse signals in the frequency domain. A fundamental frequency is identified within the peaks. The fundamental frequency, which represents the TCP flow clock, is returned.
Method And Apparatus For Performing A Demotion In A Cellular Communications Network
Alexandre Gerber - Madison NJ, US Zhuoqing Mao - Ann Arbor MI, US Feng Qian - Ann Arbor MI, US Subhabrata Sen - New Providence NJ, US Oliver Spatscheck - Randolph NJ, US Zhaoguang Wang - Ann Arbor MI, US
Assignee:
AT&T Intellectual Property I, L.P. - Atlanta GA
International Classification:
H04W 72/00 H04W 4/00 H04B 1/38 G08C 17/00
US Classification:
4554522, 455574, 370311, 370328
Abstract:
A method, computer readable medium and apparatus for performing a demotion in a cellular communications network are disclosed. For example, the method receives a packet indicating that a batching transfer is completed, determines if a background packet was received after receiving the packet indicating that the batching transfer is completed and demotes a state of a state machine implemented by a radio network controller to a lower state if the background packet was not received.