Using keys to aggregate flows at appliance

    公开(公告)号:US11176157B2

    公开(公告)日:2021-11-16

    申请号:US16520227

    申请日:2019-07-23

    Applicant: VMware, Inc.

    Abstract: Some embodiments provide a novel method for receiving a plurality of attribute sets from a set of host computers, each attribute set associated with a group of one or more flows that is created by using a key to associate individual flows into the group of flows. The appliance, in some embodiments, identifies at least two received attribute sets from two different host computers that relate to a same set of flows between a same set of source machines and a same set of destination machines. The appliance merges the two identified attribute sets into one merged attribute set and analyzes the merged attribute set to identify a set of properties of the flows in the groups of flows associated with the two identified attribute sets, in some embodiments.

    ANOMALY DETECTION ON GROUPS OF FLOWS

    公开(公告)号:US20210029002A1

    公开(公告)日:2021-01-28

    申请号:US16520235

    申请日:2019-07-23

    Applicant: VMware, Inc.

    Abstract: Some embodiments provide a novel method for analyzing the incoming flow data to detect anomalous behavior. The analysis, in some embodiments, is performed after a deduplication/aggregation operation. In some embodiments, the analysis identifies flows for further investigation by an administrator. The analysis, in some embodiments is also performed based on other received data sets (e.g., context data and configuration data), stored flow data, or both.

    Detection of threats based on responses to name resolution requests

    公开(公告)号:US11792151B2

    公开(公告)日:2023-10-17

    申请号:US17507548

    申请日:2021-10-21

    Applicant: VMware, Inc.

    CPC classification number: H04L61/10 H04L61/2521 H04L61/2571 H04L61/5053

    Abstract: Some embodiments provide a method for identifying security threats to a datacenter. The method receives flow attribute sets for multiple flows from multiple host computers in the datacenter on which data compute nodes (DCNs) execute. Each flow attribute set indicates at least a source DCN for the flow. The method identifies flow attribute sets that correspond to DCNs responding to name resolution requests. For each DCN of a set of DCNs executing on the host computers, the method determines whether the DCN has sent responses to name resolution requests in a manner that deviates from a historical baseline for the DCN based on the identified flow attribute sets. When a particular DCN has sent responses to name resolution requests in a manner that deviates from a historical baseline for the particular DCN, the method identifies the particular DCN as a security threat to the datacenter.

    SECURITY THREAT DETECTION BASED ON NETWORK FLOW ANALYSIS

    公开(公告)号:US20220239675A1

    公开(公告)日:2022-07-28

    申请号:US17220553

    申请日:2021-04-01

    Applicant: VMware, Inc.

    Abstract: Some embodiments provide a method for identifying security threats to a datacenter. From multiple host computers in the datacenter, the method receives attribute sets for multiple flows. Each respective attribute set for a respective flow includes at least (i) a source identifier for the respective flow and (ii) an indicator as to whether the respective flow is indicative of the source of the respective flow being a security threat. For each of multiple source identifiers, the method aggregates the received attribute sets to generate an aggregate attribute set for the source identifier that includes a combined measurement of security threat indicators. For a particular source identifier, the method adjusts a security threat likelihood score for the source corresponding to the particular source identifier based on the combined measurement of security threat indicators for the source identifier.

    Systems, methods, and apparatus to improve containerized application visibility

    公开(公告)号:US11106480B2

    公开(公告)日:2021-08-31

    申请号:US16258016

    申请日:2019-01-25

    Applicant: VMware, Inc.

    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to improve containerized application visibility. An example apparatus includes a container application manager to build an inventory of the containerized application, the containerized application including a virtual machine, the virtual machine hosting one or more containers, and a network topology builder to invoke a virtual machine agent of the virtual machine to obtain network traffic events from the one or more containers to generate network topology information associated with the containerized application based on the inventory, generate a network topology for the containerized application based on the network topology information, build the visualization based on the network topology, the visualization including the inventory and the network topology information, and launch a user interface to display the visualization to execute one or more computing tasks.

    USING KEYS TO AGGREGATE FLOWS AT APPLIANCE

    公开(公告)号:US20210026863A1

    公开(公告)日:2021-01-28

    申请号:US16520227

    申请日:2019-07-23

    Applicant: VMware, Inc.

    Abstract: Some embodiments provide a novel method for receiving a plurality of attribute sets from a set of host computers, each attribute set associated with a group of one or more flows that is created by using a key to associate individual flows into the group of flows. The appliance, in some embodiments, identifies at least two received attribute sets from two different host computers that relate to a same set of flows between a same set of source machines and a same set of destination machines. The appliance merges the two identified attribute sets into one merged attribute set and analyzes the merged attribute set to identify a set of properties of the flows in the groups of flows associated with the two identified attribute sets, in some embodiments.

Patent Agency Ranking