Movatterモバイル変換


[0]ホーム

URL:


US20220376968A1 - Triggering recovery actions based on corroborating anomalies - Google Patents

Triggering recovery actions based on corroborating anomalies
Download PDF

Info

Publication number
US20220376968A1
US20220376968A1US17/327,174US202117327174AUS2022376968A1US 20220376968 A1US20220376968 A1US 20220376968A1US 202117327174 AUS202117327174 AUS 202117327174AUS 2022376968 A1US2022376968 A1US 2022376968A1
Authority
US
United States
Prior art keywords
network
anomaly
namespace
computing device
rules
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US17/327,174
Other versions
US11522751B1 (en
Inventor
Rajesh Kumar Maskara
Srinivasachakrapani Kotipalli
Saurabh Vats
Irina Andreea ROSOIU
Malvika MODI
Fangwen YU
Liting ZHAO
Zhenguo Yang
Bradley David Rutkowski
Todd Carlyle Luttinen
Xuelin CHEN
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Technology Licensing LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Technology Licensing LLCfiledCriticalMicrosoft Technology Licensing LLC
Priority to US17/327,174priorityCriticalpatent/US11522751B1/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLCreassignmentMICROSOFT TECHNOLOGY LICENSING, LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MODI, MALVIKA, ROSOIU, IRINA ANDREEA, LUTTINEN, TODD CARLYLE, MASKARA, Rajesh Kumar, CHEN, Xuelin, VATS, SAURABH, YANG, ZHENGUO, YU, FANGWEN, ZHAO, LITING, KOTIPALLI, SRINIVASACHAKRAPANI, RUTKOWSKI, BRADLEY DAVID
Publication of US20220376968A1publicationCriticalpatent/US20220376968A1/en
Application grantedgrantedCritical
Publication of US11522751B1publicationCriticalpatent/US11522751B1/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

The present application describes a detect, alert and recovery system for various cloud-based and/or network-based services. The detect, alert and recovery system receives network performance data associated with a particular namespace from various network information sources. The network performance data may be aggregated based on various scopes. The aggregated data is then analyzed to determine whether an anomaly exists. If an anomaly exists, the detect, alert and recovery system may cause the performance of various actions in order to address the anomaly.

Description

Claims (20)

1. A method, comprising:
receiving network performance information associated with a namespace from a plurality of network information sources, wherein the namespace can be resolved at a plurality of endpoints, including at least a first endpoint and a second endpoint;
aggregating the network performance information associated with the namespace from each of the plurality of network information sources into data sets of varying scope, wherein the plurality of network information sources includes at least a computing device that accesses the namespace, and the network performance information includes at least a round-trip time or a latency between the computing device and an endpoint of the namespace ;
analyzing each of the data sets of varying scope to detect an anomaly associated with the namespace;
analyzing the anomaly with respect to one or more rules in a hierarchy of rules, the hierarchy of rules being based, at least in part, on a geographic scope associated with (1) the anomaly and (2) at least one of the plurality of endpoints; and
causing performance of an action among a plurality of actions to address the anomaly, the action being specified by the one or more rules in the hierarchy of rules, and the plurality of actions including at least an action of causing network traffic from a client computing device to the first endpoint to be rerouted to the second endpoint.
13. A system, comprising:
a processor; and
a memory coupled to the processor and storing instructions that, when executed by the processor, perform operations, comprising:
receiving network performance information associated with a namespace from a plurality of network information sources, wherein the namespace can be resolved at a plurality of endpoints, including at least a first endpoint and a second endpoint;
aggregating the network performance information associated with the namespace into data sets of varying scope, wherein the plurality of network information sources includes at least a computing device that accesses the namespace, and the network performance information includes at least a round-trip time or a latency between the computing device and an endpoint of the namespace;
analyzing each of the data sets of varying scope to detect an anomaly associated with the namespace;
analyzing the anomaly based, at least in part, on a geographic scope associated with (1) the anomaly, and (2) at least one of the plurality of endpoints; and
based on detecting the anomaly, causing performance of an action among a plurality of actions to address the anomaly, the action being specified by one or more rules of a rule hierarchy, and the plurality of actions including at least an action of causing network traffic from a client computing device to the first endpoint to be rerouted to the second endpoint.
20. A method, comprising:
receiving a first set of network performance information associated with a namespace from a first plurality of network information sources;
aggregating the first set of network performance information associated with the namespace from each of the first plurality of network information sources into first data sets of varying scope, wherein the first plurality of network information sources includes at least a first computing device that accesses the namespace, and the first set of network performance information includes at least a round-trip time or a latency between the first computing device and a first endpoint of the namespace;
analyzing each of the first data sets of varying scope to determine a presence of an anomaly associated with the namespace;
receiving a second set of network performance information associated with the namespace from a second plurality of network information sources;
aggregating the second set of network performance information associated with the namespace from each of the second plurality of network information sources into second data sets of varying scope that correspond to the varying scopes of the first data sets, wherein the second plurality of network information sources includes at least a second computing device that accesses the namespace, and the second set of network performance information includes at least a round-trip time or a latency between the second computing device and a second endpoint of the namespace;
analyzing each of the second data sets of varying scope to determine the presence of the anomaly associated with the namespace, wherein the namespace can be resolved at a plurality of endpoints, including at least the first endpoint and the second endpoint;
analyzing the anomaly with respect to one or more rules in a hierarchy of rules, the hierarchy of rules being based, at least in part, on a geographic scope associated with (1) the anomaly, and (2) at least one of the plurality of endpoints; and
based on the presence of the anomaly being determined using the first data sets and the second data sets, causing performance of an action among a plurality of actions to address the anomaly, the action being specified by the one or more rules in the hierarchy of rules, and the plurality of actions including at least an action of causing network traffic from a client computing device to the first endpoint to be rerouted to the second endpoint.
US17/327,1742021-05-212021-05-21Triggering recovery actions based on corroborating anomaliesActiveUS11522751B1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US17/327,174US11522751B1 (en)2021-05-212021-05-21Triggering recovery actions based on corroborating anomalies

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US17/327,174US11522751B1 (en)2021-05-212021-05-21Triggering recovery actions based on corroborating anomalies

Publications (2)

Publication NumberPublication Date
US20220376968A1true US20220376968A1 (en)2022-11-24
US11522751B1 US11522751B1 (en)2022-12-06

Family

ID=84103300

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US17/327,174ActiveUS11522751B1 (en)2021-05-212021-05-21Triggering recovery actions based on corroborating anomalies

Country Status (1)

CountryLink
US (1)US11522751B1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20250055771A1 (en)*2022-01-042025-02-13Telefonaktiebolaget Lm Ericsson (Publ)First Node, Second Node and Methods Performed Thereby for Handling Anomalous Values
EP4580143A1 (en)*2023-12-292025-07-02Juniper Networks, Inc.Determining a network scope of a root cause of a network anomaly

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8931095B2 (en)*2011-02-072015-01-06Dell Products, LpSystem and method for assessing whether a communication contains an attack
US20160352762A1 (en)*2015-05-262016-12-01International Business Machines CorporationProbabilistically Detecting Low Intensity Threat Events
US9544321B2 (en)*2015-01-302017-01-10Securonix, Inc.Anomaly detection using adaptive behavioral profiles
US10862749B1 (en)*2017-07-212020-12-08Vmware, Inc.Systems for and methods of network management and verification using intent inference
US10902062B1 (en)*2017-08-242021-01-26Amazon Technologies, Inc.Artificial intelligence system providing dimension-level anomaly score attributions for streaming data

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8458467B2 (en)*2005-06-212013-06-04Cisco Technology, Inc.Method and apparatus for adaptive application message payload content transformation in a network infrastructure element
US8689280B2 (en)*2011-09-092014-04-01Microsoft CorporationDNS-based content routing
US9608886B2 (en)*2012-08-262017-03-28At&T Intellectual Property I, L.P.Methods, systems, and products for monitoring domain name servers
US11178107B2 (en)*2019-09-302021-11-16Michael SchlossSystem and method for detecting surreptitious packet rerouting

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8931095B2 (en)*2011-02-072015-01-06Dell Products, LpSystem and method for assessing whether a communication contains an attack
US9544321B2 (en)*2015-01-302017-01-10Securonix, Inc.Anomaly detection using adaptive behavioral profiles
US20160352762A1 (en)*2015-05-262016-12-01International Business Machines CorporationProbabilistically Detecting Low Intensity Threat Events
US10862749B1 (en)*2017-07-212020-12-08Vmware, Inc.Systems for and methods of network management and verification using intent inference
US10902062B1 (en)*2017-08-242021-01-26Amazon Technologies, Inc.Artificial intelligence system providing dimension-level anomaly score attributions for streaming data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Grigorik, et al, "Network Error Logging", Retrieved from: https://w3c.github.io/network-error-logging/, November 23, 2020, 50 pages (Year: 2020)*

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20250055771A1 (en)*2022-01-042025-02-13Telefonaktiebolaget Lm Ericsson (Publ)First Node, Second Node and Methods Performed Thereby for Handling Anomalous Values
EP4580143A1 (en)*2023-12-292025-07-02Juniper Networks, Inc.Determining a network scope of a root cause of a network anomaly

Also Published As

Publication numberPublication date
US11522751B1 (en)2022-12-06

Similar Documents

PublicationPublication DateTitle
US11379461B2 (en)Multi-master architectures for distributed databases
CN109951576B (en) Methods, devices and storage media for monitoring services
EP3379419B1 (en)Situation analysis
US10686807B2 (en)Intrusion detection system
CN108833202B (en) Faulty link detection method, apparatus and computer-readable storage medium
US10015243B2 (en)Optimized content distribution based on metrics derived from the end user
US10445197B1 (en)Detecting failover events at secondary nodes
US10116674B2 (en)Framework for explaining anomalies in accessing web applications
CN108322320B (en) Business survivability analysis method and device
US20120054265A1 (en)Optimized Content Distribution Based on Metrics Derived from the End User
US11522751B1 (en)Triggering recovery actions based on corroborating anomalies
CN107241211A (en)Improve the method and system of relevance between data center's overlay network and bottom-layer network
EP3232620B1 (en)Data center based fault analysis method and device
US11838822B2 (en)Techniques for selecting network protocols
US20240205127A1 (en)Efficiently storing raw metric data in a volatile memory and aggregated metrics in a non-volatile time-series database for monitoring network elements of a software-defined network
US20230336453A1 (en)Techniques for providing inter-cluster dependencies
US20230106935A1 (en)Network probe placement optimization
CN113518367B (en)Fault diagnosis method and system based on service characteristics under 5G network slice
US20230153736A1 (en)Providing business values with service health scores
US11539728B1 (en)Detecting connectivity disruptions by observing traffic flow patterns
CN112148508A (en)Information processing method and related device
CN106933718B (en)Method for monitoring performance and device
CN116318800A (en)BGP route data monitoring method and device and electronic equipment
CN115941432A (en)Domain name alarm information sending method and device, electronic equipment and computer readable storage medium
CN115150253A (en)Fault root cause determination method and device and electronic equipment

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MASKARA, RAJESH KUMAR;KOTIPALLI, SRINIVASACHAKRAPANI;VATS, SAURABH;AND OTHERS;SIGNING DATES FROM 20210514 TO 20210520;REEL/FRAME:056327/0001

FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCFInformation on status: patent grant

Free format text:PATENTED CASE


[8]ページ先頭

©2009-2025 Movatter.jp