REAL-TIME MONITORING FOR RANSOMWARE ATTACKS USING EXCEPTION-LEVEL TRANSITION METRICS
Granted: November 16, 2023
Application Number:
20230367628
Aspects of the disclosure include a dynamic cloud workload reallocation based on an active ransomware attack. An example method includes receiving a first message that a computing instance is potentially infected by ransomware. The method further includes receiving a security state-based metric related to the computing instance based at least in part on the first message. The method further includes comparing the security state-based metric to a threshold metric. The method further…
SCALING IP ADDRESSES IN OVERLAY NETWORKS
Granted: November 16, 2023
Application Number:
20230370421
Techniques are disclosed for scaling an IP address in overlay networks without using load balancers. In certain implementations, an overlay IP address can be attached to multiple compute instances via virtual network interface cards (VNICs) associated with the multiple compute instances. Traffic directed to the multi-attached IP address is distributed across the multiple compute instances. In some other implementations, ECMP techniques in overlay networks are used to scale an overlay IP…
LAYER-2 NETWORKING STORM CONTROL IN A VIRTUALIZED CLOUD ENVIRONMENT
Granted: November 16, 2023
Application Number:
20230370371
Techniques are described for communications in an L2 virtual network. In an example, the L2 virtual network includes a plurality of L2 compute instances hosted on a set of host machines and a plurality of L2 virtual network interfaces and L2 virtual switches hosted on a set of network virtualization devices. An L2 virtual network interface emulates an L2 port of the L2 virtual network. Storm control information applicable to the L2 port is sent to a network virtualization device that…
MANAGING CUSTOMER EXPERIENCE CONTENT
Granted: November 16, 2023
Application Number:
20230368262
Techniques for managing customer experience content are disclosed. A system detects new information, such as a news story, a new service request, or a modification to a testimonial or case study, associated with a set of customer experience content, such as a customer testimonial. The system analyzes the new information to identify a sentiment associated with the new information. The system generates an effectiveness score for a particular set of customer experience content based on the…
MACHINE LEARNING TECHNIQUES FOR REBUILDING TRANSACTIONS TO PREDICT CASH POSITION
Granted: November 16, 2023
Application Number:
20230368196
Machine learning techniques are disclosed for rebuilding transactions to predict cash position. In one aspect a method includes obtaining data for an original transaction, classifying the original transaction into a class of multiple classes based on the data, predicting first tranche delay days for the original transaction based on the class and the data, predicting a tranche count for the original transaction based on the class and the data, predicting a tranche interval for the…
EFFICIENT NETWORK GRAPH DECOMPOSITION USING UNCONSTRAINED RESOURCE NODES
Granted: November 16, 2023
Application Number:
20230368106
A network may be organized to provide components. Components may be generated by combining other components (sub-components) together, and components may be provided by resources in the network. This network may be represented by a graph of nodes representing components and resources. In order to efficiently analyze this graph to generate a network plan, the graph may be subdivided into independent sub-graphs. Individual resources may be shared by individual sub-graphs and considered…
ENTROPY-BASED ANTI-MODELING FOR MACHINE LEARNING APPLICATIONS
Granted: November 16, 2023
Application Number:
20230368015
Techniques are described herein for training and applying machine learning models. The techniques include implementing an entropy-based loss function for training high-capacity machine learning models, such as deep neural networks, with anti-modeling. The entropy-based loss function may cause the model to have high entropy on negative data, helping prevent the model from becoming confidently wrong about the negative data while reducing the likelihood of generalizing from disfavored…
Systems And Methods For Securing Data Based On Discovered Relationships
Granted: November 16, 2023
Application Number:
20230367891
Techniques for automatically discovering and protecting sensitive data are disclosed. In some embodiments, a set of data objects is searched for data matching a first set of one or more regular expressions and for metadata matching a second set of one or more regular expressions. A confidence score is then generated for a particular data objects in the set of data objects as a function of regular expressions in the first set of one or more regular expressions that match data stored in…
INSTRUCTION MONITORING FOR DYNAMIC CLOUD WORKLOAD REALLOCATION BASED ON RANSOMWARE ATTACKS
Granted: November 16, 2023
Application Number:
20230367878
The present embodiments relate to identifying a ransomware attack. One embodiment relates to a method comprising configuring an operating system to collect metrics related to a hardware component. A message can be received from a user space library to validate an instruction detected in a cache, the instruction being associated with the hardware component. A metric can be compared to a threshold metric. The metric can be associated with the hardware component. A likelihood of a…
Computation and Storage of Object Identity Hash Values
Granted: November 16, 2023
Application Number:
20230367638
Techniques for computing and storing object identity hash values are disclosed. In some embodiments, a runtime system generates a value, such as a nonce, that is unique to a particular allocation region within memory. The runtime system may mix the value with one or more seed values that are associated with one or more respective objects stored in the allocation region. The runtime system may obtain object identifiers for the respective objects by applying a hash function to the result…
APPLYING A MACHINE LEARNING MODEL TO GENERATE A RANKED LIST OF CANDIDATE ACTIONS FOR ADDRESSING AN INCIDENT
Granted: November 9, 2023
Application Number:
20230360058
Techniques for providing candidate actions to a service agent based on a customer incident and associated attributes are disclosed. In one or more embodiments, a customer incident response system allows a customer support team to leverage a data ecosystem available to provide service agents with contextually relevant insights into a current data context that describes the customer incident. The system allows an administrator to configure connections to endpoints for external and/or…
REMOTE CLOUD FUNCTION INVOCATION SERVICE
Granted: November 9, 2023
Application Number:
20230359508
The present disclosure relates to a framework that provides execution of serverless functions in a cloud environment based on occurrence of events/notifications from services in an entirely different cloud environment. A target agent obtains a notification from a source agent, where the target agent is deployed in a target cloud environment and the source agent is deployed in a source cloud environment that is different than the target cloud environment. The target agent determines a…
NON-TERMINATING FIRMWARE UPDATE
Granted: November 2, 2023
Application Number:
20230350670
A computing device of the control plane may disconnect a server from at least one of a network path or a first boot storage device, the server having an initial network address. The computing device of the control plane may store a server state of the server in a storage device of the control plane. The computing device of the control plane may connect the server to an update storage device containing an update code. The computing device of the control plane may instruct the server to…
MACHINE-LEARNING-GUIDED ISSUE RESOLUTION IN DATA OBJECTS
Granted: November 2, 2023
Application Number:
20230351176
Techniques for using a machine learning model to recommend remediation actions for issues identified in data objects are disclosed. A system applies a machine learning model to data representing one or more data objects to generate recommendations for remediating issues in the one or more data objects. The machine learning model is trained on training datasets of historical data object records. The training dataset identifies issues arising from the modifications and remediation actions…
SECURE ELEMENT ENFORCING A SECURITY POLICY FOR DEVICE PERIPHERALS
Granted: November 2, 2023
Application Number:
20230351028
Techniques for implementing and enforcing a security policy in a secure element are disclosed. The secure element enforces the security policy to grant and/or deny access, such as from an application processor, to configuration of the device peripheral components and access to data of the device peripheral components across one or more bus architectures, such as an I3C bus. Implementing an access control policy in a secure element allows execution of code within the isolated secure…
NESTED QUERY ANALYSIS TOOL
Granted: November 2, 2023
Application Number:
20230350884
Techniques for tracing attributes through queries in a set of nested queries are disclosed. A graphical user interface displays individual sub-queries as separate visual representations. Based on detecting a selection, a system analyzes data underlying the visual representations to identify queries, among the set of nested queries, that are associated with a particular attribute. One selection results in the system analyzing the underlying data to identify an origin query for an…
Dynamic Dashboard with Guided Discovery
Granted: November 2, 2023
Application Number:
20230350883
Embodiments include methods and systems for configuring a dashboard with a plurality of components. Data sets populated by a plurality of data attributes and associated data attribute values can be received, where the dashboard is configured to display data from the data sets. A plurality of components can be provided on the dashboard including a guided discovery component that displays suggested filters for the dashboard according to one or more of the received data sets. A selection of…
MANAGING LIFECYCLES OF SETS OF FOREIGN RESOURCES
Granted: November 2, 2023
Application Number:
20230350802
Techniques for managing lifecycles of sets of foreign resources are disclosed, including: opening, in a runtime environment configured to use a garbage collector to manage memory in a heap, a memory session; allocating a first subset of a set of foreign memory to a memory segment associated with the memory session, the foreign memory including off-heap memory that is not managed by the garbage collector; encountering, in the runtime environment, an instruction to close the memory…
TECHNIQUES FOR DETECTING DRIFT IN A DEPLOYMENT ORCHESTRATOR
Granted: November 2, 2023
Application Number:
20230350731
Techniques for implementing an infrastructure orchestration service are described. A safety plan comprising a list of resources and operations based at least in part on a deployment configuration file can be received. Upon receiving approval of the safety plan, an operation corresponding to at least one of the list of resources can be prepared to be performed. The operation can be compared to the safety plan. If the operation is part of the safety plan, the operation can be performed. If…
MANAGING TEMPORAL DEPENDENCIES BETWEEN SETS OF FOREIGN RESOURCES
Granted: November 2, 2023
Application Number:
20230350716
Techniques for managing temporal dependencies between sets of foreign resources are disclosed, including: allocating, in a runtime environment, a segment of foreign memory to a first memory session, the runtime environment being configured to use a garbage collector to manage memory in a heap, and the foreign memory including off-heap memory that is not managed by the garbage collector; opening, in the runtime environment, a second memory session that descends from the first memory…