DETECTING ATTACKS ON COMPUTING DEVICES

    公开(公告)号:US20210136092A1

    公开(公告)日:2021-05-06

    申请号:US17123342

    申请日:2020-12-16

    Abstract: An example system may comprise a first computing device comprising instructions executable by a hardware processor to: create, responsive to detecting a second computing device initially attempting to connect to a network, an unpopulated baseline profile for the second computing device; populate the baseline profile with initial processes running on the second computing device and initial system calls made by the initial processes during an initial operation time period of the second computing device; monitor, during a subsequent operation time period of the second computing device, subsequent processes running on the second computing device and subsequent system calls made by the subsequent processes; and detect an attack on the second computing device based on a comparison of the subsequent processes and the subsequent system calls to the populated baseline profile.

    Assignment of microservices
    102.
    发明授权

    公开(公告)号:US10827020B1

    公开(公告)日:2020-11-03

    申请号:US16592560

    申请日:2019-10-03

    Abstract: Example implementations relate to assigning microservices to cluster nodes. A sidecar proxy may be deployed at a data plane of a distributed service. The sidecar proxy may monitor telemetry data between microservices of the distributed service. A communication pattern may be determined from the telemetry data of the distributed service. Each microservice of the distributed service may be assigned to a cluster node based on the communication pattern.

    Managing virtualized network service bundles

    公开(公告)号:US10594621B2

    公开(公告)日:2020-03-17

    申请号:US15646070

    申请日:2017-07-10

    Abstract: Examples provided herein describe a method for managing virtualized network service bundles. For example, a physical processor may implement machine readable instructions to receive a first data packet in a virtual network, determine a first type of the first data packet, determine a first active virtualized network service bundle instance associated with a first virtualized network service bundle that handles the first type of data packet, and direct the first data packet to the first active virtualized network service bundle instance. In some examples, the first virtualized network service bundle may comprise a first set of virtual network functions, and the first virtualized network service bundle may be associated with a set of active virtualized network service bundles instances, where the set of active virtualized network service bundle instances may comprise the first active virtualized network service bundle instance.

    DETECTING ATTACKS ON COMPUTING DEVICES
    104.
    发明申请

    公开(公告)号:US20190238567A1

    公开(公告)日:2019-08-01

    申请号:US15885447

    申请日:2018-01-31

    Abstract: An example system may comprise a first computing device comprising instructions executable by a hardware processor to: create, responsive to detecting a second computing device initially attempting to connect to a network, an unpopulated baseline profile for the second computing device; populate the baseline profile with initial processes running on the second computing device and initial system calls made by the initial processes during an initial operation time period of the second computing device; monitor, during a subsequent operation time period of the second computing device, subsequent processes running on the second computing device and subsequent system calls made by the subsequent processes; and detect an attack on the second computing device based on a comparison of the subsequent processes and the subsequent system calls to the populated baseline profile.

    NETWORK POLICY GRAPHS
    106.
    发明申请

    公开(公告)号:US20170222873A1

    公开(公告)日:2017-08-03

    申请号:US15500628

    申请日:2014-11-06

    Abstract: Example implementations disclosed herein can be used to generate composite network policy graphs based on multiple network policy graphs input by network users that may have different goals for the network. The resulting composite network policy graph can be used to program a network so that it meets the requirements necessary to achieve the goals of at least some of the network users. In one example implementation, a method can include receiving multiple network policy graphs, generating composite endpoint groups based on relationships between endpoint groups and policy graph sources, generating composite paths based on the relationships between the endpoints and the network policy graphs, generating a composite network policy graph based on the composite endpoint groups and the composite paths, and analyzing the composite network policy graph to determine conflicts or errors.

Patent Agency Ranking