-
公开(公告)号:US10523541B2
公开(公告)日:2019-12-31
申请号:US15793424
申请日:2017-10-25
Applicant: Cisco Technology, Inc.
Inventor: Supreeth Rao , Navindra Yadav , Prasannakumar Jobigenahally Malleshaiah , Darshan Shrinath Purandare , Aiyesha Ma , Aria Rahadian , Tapan Shrikrishna Patwardhan , Jackson Ngoc Ki Pang
IPC: G06F15/173 , H04L12/26 , H04L12/24
Abstract: Systems, methods, and computer-readable media for providing interoperability between nodes in separate networks as part of a federated network. In some embodiments, a system can identify a first cluster of nodes in a first network and a second cluster of nodes in a second network. The system can provide interoperability between the first cluster of nodes and the second cluster of nodes. First analytics for the first cluster of nodes can be generated using first network traffic data gathered based on first network traffic flowing through the first cluster of nodes by a group of sensors implemented in the first network. The second cluster of nodes can access the first analytics for the first cluster of nodes as part of providing the interoperability between the first cluster of nodes in the first network and the second cluster of nodes in the second network.
-
公开(公告)号:US20190238633A1
公开(公告)日:2019-08-01
申请号:US16024182
申请日:2018-06-29
Applicant: Cisco Technology, Inc.
Inventor: Supreeth Rao , Navindra Yadav , Umamaheswaran Arumugam , Michael Watts , Shashi Gandham , Darshan Shrinath Purandare , Duy Nguyen , Hai Vu , Kai Zhu , Aiyesha Ma , Tapan Shrikrishna Patwardhan , Jothi Prakash Prabakaran
CPC classification number: H04L67/1031 , H04L41/0677 , H04L41/0816 , H04L41/0893 , H04L43/08 , H04L67/1017 , H04L67/1025 , H04L67/1029
Abstract: Aspects of the disclosed technology provide methods for automatically tuning load-balancer configurations in a network environment. In some implementations, a process of the disclosed technology includes steps for collecting flow records of traffic flow segments at a middle box in a network environment, the traffic flow segments corresponding to one or more traffic flows passing through the middle box, analyzing the flow records to identify one or more traffic patterns in the network environment, and automatically updating a load balancer configuration based on the one or more traffic patterns, wherein updating the load balancer configuration improves at least one traffic flow parameter for at least one of the traffic flows passing through the middle box. Systems and machine-readable media are also provided.
-
公开(公告)号:US20190230035A1
公开(公告)日:2019-07-25
申请号:US15966561
申请日:2018-04-30
Applicant: Cisco Technology, Inc.
Inventor: Supreeth Rao , Navindra Yadav , Umamaheswaran Arumugam , Micheal Watts , Shashi Gandham , Prasannakumar Jobigenahally Malleshaiah , Duy Nguyen , Hai Vu , Tapan Shrikrishna Patwardhan , Aiyesha Ma , Xuan Zou , Jothi Prakash Prabakaran
IPC: H04L12/801 , H04L12/26 , H04L12/24
Abstract: Systems, methods, and computer-readable media for flow stitching network traffic flow segments at a middlebox in a network environment. In some embodiments, a method can include collecting flow records of traffic flow segments at a middlebox in a network environment including one or more transaction identifiers assigned to the traffic flow segments. The traffic flow segments can correspond to one or more traffic flows passing through the middlebox and flow directions of the traffic flow segments with respect to the middlebox can be identified using the flow records. The traffic flow segments can be stitched together based on the one or more transaction identifiers and the flow directions of the traffic flow segments to form a stitched traffic flow of the one or more traffic flows passing through the middlebox. The stitched traffic flow can be incorporated as part of network traffic data for the network environment.
-
公开(公告)号:US20190229995A1
公开(公告)日:2019-07-25
申请号:US15985520
申请日:2018-05-21
Applicant: Cisco Technology, Inc.
Inventor: Supreeth Rao , Navindra Yadav , Umamaheswaran Arumugam , Michael Watts , Shashi Gandham , Prasannakumar Jobigenahally Malleshaiah , Duy Nguyen , Hai Vu , Aiyesha Ma , Tapan Shrikrishna Patwardhan , Kai Zhu , Jothi Prakash Prabakaran
Abstract: Systems, methods, and computer-readable media for flow stitching network traffic flow segments at a middlebox in a network environment. In some embodiments, flow records of traffic flow segments at a middlebox in a network environment are collected. The flow records can include transaction identifiers assigned to the traffic flow segments. Sources and destinations of the traffic flow segments with respect to the middlebox can be identified using the flow records. Further, the traffic flow segments can be stitched together to form a plurality of stitched traffic flows at the middlebox based on the transaction identifiers and the sources and destinations of the traffic flow segments in the network environment with respect to the middlebox. A configuration of the middlebox operating in the network environment can be identified based on the stitched traffic flows at the middlebox in the network environment.
-
公开(公告)号:US20190123985A1
公开(公告)日:2019-04-25
申请号:US15793424
申请日:2017-10-25
Applicant: Cisco Technology, Inc.
Inventor: Supreeth Rao , Navindra Yadav , Prasannakumar Jobigenahally Malleshaiah , Darshan Shrinath Purandare , Aiyesha Ma , Aria Rahadian , Tapan Shrikrishna Patwardhan , Jackson Ngoc Ki Pang
CPC classification number: H04L43/065 , H04L41/0816 , H04L41/0886 , H04L41/0893 , H04L41/0896 , H04L41/14 , H04L43/04 , H04L43/062 , H04L43/0876 , H04L43/12
Abstract: Systems, methods, and computer-readable media for providing interoperability between nodes in separate networks as part of a federated network. In some embodiments, a system can identify a first cluster of nodes in a first network and a second cluster of nodes in a second network. The system can provide interoperability between the first cluster of nodes and the second cluster of nodes. First analytics for the first cluster of nodes can be generated using first network traffic data gathered based on first network traffic flowing through the first cluster of nodes by a group of sensors implemented in the first network. The second cluster of nodes can access the first analytics for the first cluster of nodes as part of providing the interoperability between the first cluster of nodes in the first network and the second cluster of nodes in the second network.
-
公开(公告)号:US11895156B2
公开(公告)日:2024-02-06
申请号:US17931595
申请日:2022-09-13
Applicant: Cisco Technology, Inc.
Inventor: Supreeth Hosur Nagesh Rao , Navindra Yadav , Tapan Shrikrishna Patwardhan , Umamaheswaran Arumugam , Darshan Shrinath Purandare , Aiyesha Ma , Hongyang Zhang , Kai Zhu
IPC: H04L9/40
CPC classification number: H04L63/20 , H04L63/101 , H04L63/145 , H04L63/1416
Abstract: The present disclosure relates to securing workloads of a network by identifying compromised elements in communication with the network and preventing their access to network resources. In one aspect, a method includes monitoring network traffic at network elements of a network; detecting a compromised element in communication with one or more of the network elements, the compromised element being associated with at least one network threat; and based on a defined network policy, applying one of a number of different access prevention schemes to the compromised element to prevent access to the network by the compromised element.
-
公开(公告)号:US11716352B2
公开(公告)日:2023-08-01
申请号:US16902526
申请日:2020-06-16
Applicant: Cisco Technology, Inc.
Inventor: Supreeth Rao , Navindra Yadav , Prasannakumar Jobigenahally Malleshaiah , Tapan Shrikrishna Patwardhan , Umamaheswaran Arumugam , Darshan Shrinath Purandare , Aiyesha Ma , Fuzhuo Sun , Ashok Kumar
CPC classification number: H04L63/164 , H04L63/029 , H04L63/20
Abstract: The present disclosure relates to methods, systems, and non-transitory computer readable media for generating an application protectability index for network applications and a corresponding protectability scheme. In one aspect, a method includes identifying, by a network controller, network layers associated with an application; determining, by the network controller, a corresponding security index for the application at each of the network layers to yield a plurality of security indexes, each of the plurality of security indexes providing an objective assessment of protectability of the application at a corresponding one of the network layers; determining, by the network controller, an application protectability index; and providing an application protectability scheme for protecting the application based on the application protectability index.
-
公开(公告)号:US11698976B2
公开(公告)日:2023-07-11
申请号:US16922565
申请日:2020-07-07
Applicant: Cisco Technology, Inc.
Inventor: Supreeth Hosur Nagesh Rao , Navindra Yadav , Prasannakumar Jobigenahally Malleshaiah , Tapan Shrikrishna Patwardhan , Umamaheswaran Arumugam , Darshan Shrinath Purandare , Aiyesha Ma , Songlin Li
CPC classification number: G06F21/577 , H04L63/1433 , H04L63/20 , G06F2221/033
Abstract: Systems, methods, and computer-readable media for attack surface score computation can include the following processes. An attack surface score service receives information identifying open ports associated with an application. The attack surface score service determines an attack surface score for the application based on the information and common attack ports. A policy engine determines whether to implement a policy for reducing vulnerability of the application to attacks to yield a determination. The policy engine implements a vulnerability reduction policy based on the determination.
-
公开(公告)号:US20230012641A1
公开(公告)日:2023-01-19
申请号:US17931595
申请日:2022-09-13
Applicant: Cisco Technology, Inc.
Inventor: Supreeth Hosur Nagesh Rao , Navindra Yadav , Tapan Shrikrishna Patwardhan , Umamaheswaran Arumugam , Darshan Shrinath Purandare , Aiyesha Ma , Hongyang Zhang , Kai Zhu
IPC: H04L9/40
Abstract: The present disclosure relates to securing workloads of a network by identifying compromised elements in communication with the network and preventing their access to network resources. In one aspect, a method includes monitoring network traffic at network elements of a network; detecting a compromised element in communication with one or more of the network elements, the compromised element being associated with at least one network threat; and based on a defined network policy, applying one of a number of different access prevention schemes to the compromised element to prevent access to the network by the compromised element.
-
20.
公开(公告)号:US11539735B2
公开(公告)日:2022-12-27
申请号:US16985520
申请日:2020-08-05
Applicant: Cisco Technology, Inc.
Inventor: Supreeth Hosur Nagesh Rao , Navindra Yadav , Prasannakumar Jobigenahally Malleshaiah , Tapan Shrikrishna Patwardhan , Umamaheswaran Arumugam , Darshan Shrinath Purandare , Aiyesha Ma , Matthew Lawson Finn, II
IPC: H04L9/40
Abstract: Systems, methods, and computer-readable media for application placement can include the following processes. A security score service determines a respective security posture score for each of a plurality of candidate hosts of an enterprise network. A user then identify a set of performance parameters and security parameters for a host in an enterprise network to execute a workload thereon. An application placement engine selects a host from the plurality of candidate hosts having a security posture score matching the performance parameters and the security parameters for executing the workload. An application deployment engine places the workload on the host.
-
-
-
-
-
-
-
-
-