Invention Grant
- Patent Title: Application monitoring prioritization
-
Application No.: US15173477Application Date: 2016-06-03
-
Publication No.: US10659324B2Publication Date: 2020-05-19
- Inventor: Jackson Ngoc Ki Pang , Navindra Yadav , Anubhav Gupta , Shashidhar Gandham , Supreeth Hosur Nagesh Rao , Sunil Kumar Gupta
- Applicant: Cisco Technology, Inc.
- Applicant Address: US CA San Jose
- Assignee: CISCO TECHNOLOGY, INC.
- Current Assignee: CISCO TECHNOLOGY, INC.
- Current Assignee Address: US CA San Jose
- Agency: Polsinelli PC
- Main IPC: G08B23/00
- IPC: G08B23/00 ; G06F12/16 ; G06F12/14 ; G06F11/00 ; H04L12/26 ; H04L29/06 ; G06F9/455 ; G06N20/00 ; G06F16/29 ; G06F16/248 ; G06F16/28 ; G06F16/9535 ; G06F16/2457 ; G06F21/55 ; G06F21/56 ; H04L12/851 ; H04L12/24 ; H04W84/18 ; H04L29/08 ; G06F21/53 ; H04L12/723 ; G06F3/0484 ; H04L1/24 ; H04W72/08 ; H04L9/08 ; H04L9/32 ; H04J3/06 ; H04J3/14 ; H04L29/12 ; H04L12/813 ; H04L12/823 ; H04L12/801 ; H04L12/741 ; H04L12/833 ; H04L12/721 ; G06F3/0482 ; G06T11/20 ; H04L12/841 ; H04L12/725 ; H04L12/715 ; G06F16/16 ; G06F16/17 ; G06F16/11 ; G06F16/13 ; G06N99/00 ; G06F16/174 ; G06F16/23

Abstract:
An approach for establishing a priority ranking for endpoints in a network. This can be useful when triaging endpoints after an endpoint becomes compromised. Ensuring that the most critical and vulnerable endpoints are triaged first can help maintain network stability and mitigate damage to endpoints in the network after an endpoint is compromised. The present technology involves determining a criticality ranking and a secondary value for a first endpoint in a datacenter. The criticality ranking and secondary value can be combined to form priority ranking for the first endpoint which can then be compared to a priority ranking for a second endpoint to determine if the first endpoint or the second endpoint should be triaged first.
Public/Granted literature
- US20160359891A1 APPLICATION MONITORING PRIORITIZATION Public/Granted day:2016-12-08
Information query