Search

Aditya Naidu Phones & Addresses

  • Piscataway, NJ
  • Basking Ridge, NJ
  • Edison, NJ
  • Jersey City, NJ
  • Woodhaven, NY
  • 2108 Strawberry Ct, Edison, NJ 08817

Publications

Us Patents

Versioning Relational Database Disjoint Records

View page
US Patent:
20100042605, Feb 18, 2010
Filed:
Jul 31, 2009
Appl. No.:
12/533676
Inventors:
Alexander Poylisher - Brooklyn NY, US
Aditya Naidu - Edison NJ, US
Rajesh Talpade - Madison NJ, US
Shrirang Gadgil - Eatontown NJ, US
Assignee:
Telcordia Technologies, Inc. - Piscataway NJ
International Classification:
G06F 17/30
G06F 12/00
US Classification:
707 4, 707203, 707100, 707E17045
Abstract:
An inventive system and method for versioning relational database disjoint records comprises a relational database, configuration files translated into query files, and a version control system, wherein each query file is stored and checked into the version control system, updating a version number of the query file. Each query file comprises a set of query statements. Query files are retrieved from the version control system based on the version number or an independent data item, and put into the database for analysis. In one embodiment, one of the configuration files comprises a configuration of a device, such as a router, a switch, a firewall, or a medical record. The method comprises acquiring configuration files, changing the configuration files into query files and storing the query files, and checking each query file into a version control system, wherein the checking in updates a version number of the query file.

Redundancy Detection And Resolution And Partial Order Dependency Quantification In Access Control Lists

View page
US Patent:
20100199344, Aug 5, 2010
Filed:
Dec 10, 2009
Appl. No.:
12/634984
Inventors:
Yibei Ling - Belle Mead NJ, US
Aditya Naidu - Edison NJ, US
Rajesh Talpade - Madison NJ, US
Assignee:
TELCORDIA TECHNOLOGIES, INC. - Piscataway NJ
International Classification:
G06F 21/00
US Classification:
726 11
Abstract:
Aspects of the invention pertain to analyzing and modifying access control lists that are used in computer networks. Access control lists may have many individual entries that indicate whether information can be passed between certain devices in a computer network. The access control lists may include redundant or conflicting entries. An aspect of the invention converts an order-dependent control list into an order-free equivalent. Redundant entries are identified and removed without adversely affecting the access control list. Redundancy may be identified by evaluating the volume contraction ratio, which is the ratio of the volume of spin-off entries to specific original entry in the access control list. This ratio reflects the extent of order-dependent impact on that entry in a given access control list.

System And Method For Determining Symantic Equivalence Between Access Control Lists

View page
US Patent:
20100199346, Aug 5, 2010
Filed:
Dec 10, 2009
Appl. No.:
12/634975
Inventors:
Yibei Ling - Belle Mead NJ, US
Aditya Naidu - Edison NJ, US
Rajesh Talpade - Madison NJ, US
Assignee:
Telcordia Technologies, Inc. - Piscataway NJ
International Classification:
G06F 9/32
US Classification:
726 12
Abstract:
Aspects of the invention pertain to analyzing and modifying access control lists that are used in computer networks. Access control lists may have many individual rules that indicate whether information can be passed between certain devices in a computer network. The access control lists may include redundant or conflicting rules. An aspect of the invention determines whether two or more access control lists are equivalent or not. Order-dependent access control lists are converted into order-independent access control lists, which enable checking of semantic equivalence of different access control lists. Upon conversion to an order-independent access control list, lower-precedence rules in the order-free list are checked for overlap with a current higher precedence entry. If overlap exists, existing order-free rules are modified so that spinoff rules have no overlap with the current entry. This is done while maintaining semantic equivalence.

Systems And Methods For Single Session Management In Load Balanced Application Server Clusters

View page
US Patent:
20100217860, Aug 26, 2010
Filed:
Dec 7, 2009
Appl. No.:
12/631881
Inventors:
Aditya Naidu - Edison NJ, US
Rajesh Talpade - Madison NJ, US
Harshad Tanna - Plainsboro NJ, US
Sabine Winchell - Hillsborough NJ, US
Assignee:
TELCORDIA TECHNOLOGIES, INC. - Piscataway NJ
International Classification:
G06F 15/173
US Classification:
709224
Abstract:
Aspects of the invention pertain to user session management in load balanced clusters. Multiple application servers communicate with a central data server to ensure there is a single session per user ID. The central data server maintains a user session index and a parameter table. Each time a network access is attempted using a given user ID, a load balancer assigns the session to one of the application servers. The assigned application server queries the central data server to determine whether a session status for the user's login ID is inactive or active. If inactive, a new, unique value is assigned as the session number. If active, the session number is evaluated to determine whether multiple sessions exist. In this case, one of the sessions is terminated to ensure a single session per user ID. Preferably, the terminated session is the earlier session.

System And Method For Determining Firewall Equivalence, Union, Intersection And Difference

View page
US Patent:
20110283348, Nov 17, 2011
Filed:
May 13, 2010
Appl. No.:
12/779069
Inventors:
Yibei Ling - Belle Mead NJ, US
Aditya Naidu - Edison NJ, US
Rajesh Talpade - Madison NJ, US
Assignee:
TELCORDIA TECHNOLOGIES, INC. - Piscataway NJ
International Classification:
G06F 21/00
US Classification:
726 11
Abstract:
Aspects of the invention pertain to integrated compliance analysis of multiple firewalls and access control lists for network segregation and partitioning. Access control lists may have many individual rules that indicate whether information can be passed between certain devices in a computer network. The access control lists in different firewalls in different network segments within a given network may overlap or have inconsistent rules. Aspects of the invention generate differences between firewalls, analyze equivalency of firewalls, generate the intersection (if any) between a pair of firewalls, and generate the union (if any) between firewalls. Such information provides an integrated analysis of multiple interrelated firewalls, including inbound and outbound access control lists for such firewalls, and may be used to manage firewall operation within the network to ensure consistent operation and maintain network security. It also addresses a wide range of security questions that arise when dealing with multiple firewalls.

Method, Apparatus And Program For Detecting Spoofed Network Traffic

View page
US Patent:
20130125235, May 16, 2013
Filed:
Nov 14, 2011
Appl. No.:
13/295553
Inventors:
Ravichander Vaidyanathan - Belle Mead NJ, US
Abhrajit Ghosh - Edison NJ, US
Aditya Naidu - Edison NJ, US
Akira Yamada - Tokyo, JP
Ayumu Kubota - Saitama, JP
Yukiko Sawaya - Fujimi, JP
Yutaka Miyake - Saitama, JP
Assignee:
TELCORDIA TECHNOLOGIES, INC. - Piscataway NJ
International Classification:
G06F 21/20
US Classification:
726 22
Abstract:
A method, an apparatus and a program for detecting spoofed Internet Protocol (IP) traffic directed to a network having a plurality of autonomous systems (AS) is provided. The method comprises receiving an incoming packet through an AS, the incoming packet containing a source IP address and a destination IP address, acquiring a corresponding source and destination IP address prefixes, converting the corresponding source and destination IP address prefixes into a source AS number and a destination AS number, determining if the incoming packet arrived from an unexpected source based upon the corresponding destination IP address prefix and the converted source and destination AS number using an unexpected pair tuple table generated from network routing information and generating an alert indicating that the incoming packet is not allowed to enter the network.

Traffic Anomaly Detection For Iot Devices In Field Area Network

View page
US Patent:
20190036954, Jan 31, 2019
Filed:
Jul 30, 2018
Appl. No.:
16/049139
Inventors:
- Basking Ridge NJ, US
Aditya NAIDU - Basking Ridge NJ, US
Stanley PIETROWICZ - Red Bank NJ, US
International Classification:
H04L 29/06
Abstract:
A method, computer system, and computer program product that generates a whitelist for each subject device in a field area network (FAN). The whitelist includes one or more whitelist entries corresponding to one or more peer devices in the same FAN communicating with the subject device. Each whitelist entry includes one or more attribute values expected in respective traffic between the subject device and each peer device that is represented by a respective whitelist entry. The traffic in the FAN is monitored at one or more points of the FAN for anomaly by use of the whitelist.

System And Method For Network Traffic Profiling And Visualization

View page
US Patent:
20170264513, Sep 14, 2017
Filed:
May 26, 2017
Appl. No.:
15/606717
Inventors:
- Basking Ridge NJ, US
Michael M. HYLKEMA - Basking Ridge NJ, US
Paul D. MARTIN - Basking Ridge NJ, US
Jason YOUZWAK - Basking Ridge NJ, US
Aditya NAIDU - Basking Ridge NJ, US
International Classification:
H04L 12/26
H04L 12/751
Abstract:
A computer program product, computer system, and method for performing traffic analysis on a wireless mesh network, includes intercepting a stream of real-time wireless from field probes on the wireless mesh network, wherein the stream comprises non-standard protocol elements and encrypted traffic, creating an ad hoc network parallel to the wireless mesh network, obtaining, from the ad hoc network, the intercepted stream (the analyzing is performed parallel to traffic flow on the wireless mesh network), pre-processing a portion of the intercepted stream the data, where the pre-processing comprises descrambling and processing headers in the stream to differentiate the packets in the stream and create a combined output stream, obtaining the combined output stream and creating indicators by selecting an analysis operator to apply to one or more dissected fields extracted from the output stream, analyzing the packets in the combined output stream utilizing the indicators, and obtaining results from the indicators and reporting, the results from the indicators.
Aditya P Naidu from Piscataway, NJ, age ~43 Get Report