METHOD, APPARATUS, AND COMPUTER READABLE MEDIUM FOR PROVIDING SECURITY SERVICE FOR DATA CENTER

    公开(公告)号:US20210044567A1

    公开(公告)日:2021-02-11

    申请号:US16963946

    申请日:2018-02-06

    Abstract: Embodiments of the present disclosure relate to a method, apparatus, and computer readable medium for providing a security service for a data center. According to the method, a packet terminating at or originating from the data center is received. At least one label is determined for the packet, each label indicating a security requirement for the packet. Based on the at least one label, a security service chain is selected for the packet, the security service chain including an ordered set of security functions deployed in the data center and to be applied to the packet. The packet is transmitted to the selected security service chain in association with the at least one label, the packet being processed by the ordered set of security functions in the security service chain.

    Attack source tracing in SFC overlay network

    公开(公告)号:US11991186B2

    公开(公告)日:2024-05-21

    申请号:US17057571

    申请日:2018-05-22

    Abstract: Embodiments of the present disclosure relate to methods, devices and computer readable storage medium for tracing an attack source in a service function chain overlay network. In example embodiments, a request for tracing an attack source of an attacking data is sent at the attack tracer to a first service function chain domain of a plurality of service function chain domains through which the attacking data flow passes subsequently. The request includes flow characteristics of the attacking data flow. Then, the attack tracer receives a first set of results of flow matching based on the flow characteristics from the first service function chain domain. The attack tracer identifies the attack source in the plurality of service function chain domains at least in part based on the first set of results. In this way, the attack source may be traced efficiently in the service function chain overlay network.

    Access control barring based on cell quality

    公开(公告)号:US11617125B2

    公开(公告)日:2023-03-28

    申请号:US16832692

    申请日:2020-03-27

    Abstract: A device, method, apparatus and computer readable storage medium are provided for access control barring (ACB) based on cell quality. In one example, a network device determines a set of metrics related to quality of service (QoS) performance for a plurality of services in a cell in a measurement period. The network device determines ACB configuration in the cell based on comparison of the set of metrics with a set of thresholds.

    Apparatus, system and method for security management based on event correlation in a distributed multi-layered cloud environment

    公开(公告)号:US11368489B2

    公开(公告)日:2022-06-21

    申请号:US16764871

    申请日:2017-11-20

    Abstract: An apparatus for security management based on event correlation in a distributed multi-layered cloud environment is disclosed, wherein the distributed multi-layered cloud environment comprises at least one first layer cloud service provider, and at least one second layer cloud service provider as a tenant of the first layer cloud service provider, and the apparatus is installed at least on one cloud service provider of the first layer cloud service provider and the second layer cloud service provider, the apparatus comprising: a central processing module configured to: provide correlation as a Service (CORRaaS) to a plurality of tenants as virtualized security appliances or virtualized security functions for the plurality of tenants's lices, generate a second interface for allowing the plurality of tenants to configure the correlation as a Service (CORRaaS), and correlate and process security events from security functions in the plurality of tenants' slices to form processed security event data, and to detect or predict attacks or anomalies or incompliance with security requirements; and a third interface for transferring the processed security event data and/or log data and/or raw data to the plurality of tenants' security management systems and/or to a plurality of cloud service providers' security management systems; and a fourth interface towards a cloud manager of the cloud service provider for causing the cloud manager to mitigate the detected or predicted attacks or anomalies or incompliance with security requirements. A corresponding system and method for security management based on event correlation in a distributed multi-layered cloud environment, as well as a computer readable medium, are also provided.

    Method for network slice isolation management

    公开(公告)号:US12245042B2

    公开(公告)日:2025-03-04

    申请号:US17799545

    申请日:2020-02-14

    Abstract: A method for network isolation management is described. The method includes assigning or creating one or more isolation groups for at least one service, wherein resources of services assigned in an isolation group are shared with or without isolation; wherein an isolation group is defined for at least one resource in each layer and each domain to gather the at least one resource of the at least one service; linking an isolation profile for each of the one or more isolation groups, wherein the isolation profile comprises at least one policy to protect the at least one resource of the one or more isolation groups, and wherein the isolation profile comprises at least an isolation level to define a type of isolation; and allocating or reallocating the at least one resource to the at least one service based on the isolation profile linked to the one or more isolation groups.

    Dynamic allocation of network slice-specific credentials

    公开(公告)号:US12132732B2

    公开(公告)日:2024-10-29

    申请号:US17621971

    申请日:2019-06-24

    CPC classification number: H04L63/0892 H04L63/083 H04L63/101 H04L63/20

    Abstract: A credential manager imports credentials for a network slice in response to deployment of the network slice. The credentials are not known to other network slices. A repository is configured to store the credentials and protect the credentials based on credential protection policies that are defined by a service profile of the network slice. The repository is implemented in the credential manager, an authentication, authorization, and accounting (AAA) server, or other location. Properties of the credentials are modified in response to a modification trigger and the credentials are withdrawn in response to a withdrawal trigger.

    ATTACK SOURCE TRACING IN SFC OVERLAY NETWORK

    公开(公告)号:US20210211439A1

    公开(公告)日:2021-07-08

    申请号:US17057571

    申请日:2018-05-22

    Abstract: Embodiments of the present disclosure relate to methods, devices and computer readable storage medium for tracing an attack source in a service function chain overlay network. In example embodiments, a request for tracing an attack source of an attacking data is sent at the attack tracer to a first service function chain domain of a plurality of service function chain domains through which the attacking data flow passes subsequently. The request includes flow characteristics of the attacking data flow. Then, the attack tracer receives a first set of results of flow matching based on the flow characteristics from the first service function chain domain. The attack tracer identifies the attack source in the plurality of service function chain domains at least in part based on the first set of results. In this way, the attack source may be traced efficiently in the service function chain overlay network.

    Managing notifications for communication surveillance

    公开(公告)号:US12267223B2

    公开(公告)日:2025-04-01

    申请号:US17637997

    申请日:2019-09-06

    Abstract: Systems, methods, apparatuses, and computer program products for the management of heartbeat notifications, for instance, in a service based management architecture are provided. One method may include receiving, from a first entity, information comprising one or more attributes relating to management of an emission of heartbeat notifications at a second entity. The method may also include associating, by the second entity, the attributes with a subscription, associating the attributes with a communication channel between the second entity and a third entity relating to the subscription, and starting the emission of the heartbeat notifications according to the information received by the second entity from the first entity.

    Method and apparatus for security assurance of a network or management function

    公开(公告)号:US12212604B2

    公开(公告)日:2025-01-28

    申请号:US17607082

    申请日:2019-04-29

    Abstract: Embodiments of the present disclosure provide a method and apparatus for security assurance of a network function or service. The method comprises: generating security requirements for a network function based on a security profile and a deployment and runtime environment of the network function; generating a security policy and a security test specification for the network function based on the security requirements; deploying the network function based on the security policy; validating security compliance of the network function with the security test specification; and activating the network function or service, in response to the network function being in compliance with the security policy.

Patent Agency Ranking