Zero day attack detection
    283.
    发明授权

    公开(公告)号:US11741225B2

    公开(公告)日:2023-08-29

    申请号:US17105851

    申请日:2020-11-27

    Inventor: Joseph Soryal

    Abstract: The concepts and technologies disclosed herein are directed to zero day attack detection. A system can monitor, by a sequence manager, a sequence of transaction requests. The sequence manager can determine whether a transaction request in the sequence is anomalous. In response to determining that the transaction request is anomalous, and before the allowing the system to process the transaction request, the sequence manager can provide the sequence of transaction requests to a sequence emulator. The sequence emulator can attempt to verify an output of the sequence of transaction requests. The sequence manager can receive a notification from the sequence emulator. The notification can indicate whether the output of the sequence of transaction requests can be verified. In response, the sequence manager can instruct the system to deny (if the output cannot be verified) or allow (if the output can be verified) processing of the sequence of transaction requests.

    CENTRALIZED METHOD FOR COMPUTING BYPASS/FRR (FAST RE-ROUTE) TUNNELS

    公开(公告)号:US20230261980A1

    公开(公告)日:2023-08-17

    申请号:US17672388

    申请日:2022-02-15

    CPC classification number: H04L45/28 H04L43/16 H04L43/0882

    Abstract: Aspects of the subject disclosure may include, for example, obtaining for a first path carrying first network traffic a corresponding first alternate path; obtaining for a second path carrying second network traffic a corresponding second alternate path, at least a first portion of the first alternate path being the same as at least a second portion of the second alternate path; responsive to a first detected failure on the first path, causing communication of first re-directed network traffic via the first alternate path instead of via the first path; responsive to a second detected failure on the second path, detecting whether total traffic, including the first re-directed network traffic, on the first portion of the first alternate path meets a threshold; responsive to the detected meeting of the threshold, obtaining for the second path a corresponding back-up alternate path; and causing communication of second re-directed network traffic via the back-up alternative path instead of via the second path. Other embodiments are disclosed.

Patent Agency Ranking