The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Oct. 15, 2019

Filed:

Apr. 26, 2017
Applicants:

At&t Intellectual Property I, L.p., Atlanta, GA (US);

At&t Technical Services Company, Inc., Vienna, VA (US);

Inventors:

Rensheng Zhang, River Edge, NJ (US);

Richard Hellstern, Cranbury, NJ (US);

Anestis Karasaridis, Oceanport, NJ (US);

Patrick Velardo, Jr., Manalapan, NJ (US);

Assignees:
Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04L 12/26 (2006.01); H04W 4/70 (2018.01);
U.S. Cl.
CPC ...
H04L 63/1416 (2013.01); H04W 4/70 (2018.02); H04L 43/026 (2013.01); H04L 43/16 (2013.01);
Abstract

Concepts and technologies disclosed herein are directed to internet traffic classification via time-frequency analysis. According to one aspect of the concepts and technologies disclosed herein, a security classification scheme can be implemented to identify potentially malicious activities from normal internet traffic. The security classification scheme can exploit the distinctive characteristics of different types of traffic in both frequency domain and time domain to identify four different cases. Due to the separation of different types of traffic, the security classification scheme can lower the false alarm rate and improve network security. The security classification scheme can utilize a recursive discrete Fourier transform ('DFT') implementation to enhance computational efficiency. The security classification scheme can be deployed for real-time network traffic monitoring due to an efficient streaming design and can be effectively used to detect and predict when and where the suspicious activities occur within a monitored network.


Find Patent Forward Citations

Loading…