-
公开(公告)号:US11743122B1
公开(公告)日:2023-08-29
申请号:US17709068
申请日:2022-03-30
Applicant: Amazon Technologies, Inc.
Inventor: Samuel Bayless , John David Backes , Daniel William Dacosta , Vaibhav Katkade , Sagar Chintamani Joshi , Nadia Labai , Syed Mubashir Iqbal , Patrick Trentin , Nathan Launchbury , Nikolaos Giannarakis , Victor Heorhiadi , Nick Matthews
IPC: H04L41/0869 , H04L41/08 , H04L41/22 , H04L41/0816 , H04L41/14 , H04L41/147 , H04L9/40
CPC classification number: H04L41/0869 , H04L41/0816 , H04L41/0883 , H04L41/145 , H04L41/147 , H04L41/22 , H04L63/0263
Abstract: A network change verification (NCV) system is disclosed for checking whether a proposed configuration change on a network alters the way that the network controls recently observed network flows. In embodiments, the system builds an observed flow control model (OFCM) from logs of recent flows observed in the network. The OFCM, which may be periodically updated based on newly observed flows, provides a compact representation of how individual network flows were ostensibly controlled by the network. When a proposed configuration change is received, the system analyzes the change against the OFCM to check whether the change will alter how the network controls recently observed flows. If so, the proposed change is blocked, and an alert is generated identifying flows that are affected by the change. The NCV system thus prevents network operators from accidentally making changes on the network that will materially alter the behavior of the network.
-
公开(公告)号:US11206175B1
公开(公告)日:2021-12-21
申请号:US17117930
申请日:2020-12-10
Applicant: Amazon Technologies, Inc.
Inventor: Samuel Bayless , John David Backes , Daniel William Dacosta , Benjamin F Jones , Patrick Trentin , Nathan Launchbury , Sagar Chintamani Joshi , Nandita Mathews
IPC: G06F15/177 , H04L12/24 , H04L12/26
Abstract: This disclosure describes techniques for identifying blocked paths and network configuration settings that block paths in networks, such as network paths in a virtual private cloud (VPC). The configuration of virtual networks depends on the correct configuration of many networking resources, such as firewalls, security groups, routing lists, access control lists (ACLs), and the like. In some cases, an analysis that uses formal methods can be performed to determine a network configuration of a virtual network. Using the network configuration information, network paths that are blocked and network configuration settings that may be blocking one or more of the network paths can be determined. The PAS can provide an explanation of what is blocking the network paths. For example, the PAS may identify that a configuration setting of a firewall, router, network gateway, an access control list (ACL), and the like may be blocking a network path.
-