MALICIOUS VIRTUAL MACHINE ALERT GENERATOR
    1.
    发明申请
    MALICIOUS VIRTUAL MACHINE ALERT GENERATOR 有权
    恶意虚拟机警报发生器

    公开(公告)号:US20160255103A1

    公开(公告)日:2016-09-01

    申请号:US14768960

    申请日:2014-10-30

    Abstract: Technologies are generally described for methods and systems effective to generate an alert in a data center. In some examples, a device may detect an execution of a virtual machine in the data center. The device may also analyze traffic data at a port that may be in the data center. The traffic data may be associated with a communication from the virtual machine to a destination address through the port. The device may also compare the destination address with a data center address of the data center. The device may also generate the alert based on the comparison.

    Abstract translation: 一般来说,对于在数据中心中产生警报有效的方法和系统进行了描述。 在一些示例中,设备可以检测数据中心中的虚拟机的执行。 设备还可以分析可能在数据中心的端口的业务数据。 业务数据可以与通过该端口从虚拟机到目的地地址的通信相关联。 该设备还可以将目的地址与数据中心的数据中心地址进行比较。 设备还可以基于比较来生成警报。

    NETWORK CONTROLLER SECURITY MONITOR
    2.
    发明申请
    NETWORK CONTROLLER SECURITY MONITOR 有权
    网络控制器安全监控

    公开(公告)号:US20160337247A1

    公开(公告)日:2016-11-17

    申请号:US14905837

    申请日:2014-12-29

    CPC classification number: H04L47/15 H04L12/6418 H04L45/58 H04L45/745

    Abstract: Technologies are generally described for systems, devices and methods effective to compare network element instructions and network control instructions. In some examples, first instructions may be identified and may be related to flow of network traffic. The first instructions may be stored in a data structure of a memory of a network element. The network element may generate a first network instruction signature based on the first instructions. A network controller device may identify second instructions. In some examples, the second instructions may be related to control of the network traffic, and may be stored in a memory of the network controller device. The network controller device may generate a second network instruction signature based on the second instructions. The network controller device may compare the first network instruction signature to the second network instruction signature to produce a comparison between the first instructions and the second instructions.

    Abstract translation: 通常描述有效地比较网元指令和网络控制指令的系统,设备和方法的技术。 在一些示例中,可以识别第一指令并且可以与网络流量的流动相关。 第一指令可以存储在网元的存储器的数据结构中。 网络元件可以基于第一指令生成第一网络指令签名。 网络控制器设备可以识别第二指令。 在一些示例中,第二指令可以与网络流量的控制相关,并且可以存储在网络控制器设备的存储器中。 网络控制器设备可以基于第二指令生成第二网络指令签名。 网络控制器设备可以将第一网络指令签名与第二网络指令签名进行比较,以产生第一指令与第二指令之间的比较。

Patent Agency Ranking