SYSTEMS, METHODS, AND APPARATUS TO IMPROVE CONTAINERIZED APPLICATION VISIBILITY

    公开(公告)号:US20200241903A1

    公开(公告)日:2020-07-30

    申请号:US16258016

    申请日:2019-01-25

    Applicant: VMware, Inc.

    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to improve containerized application visibility. An example apparatus includes a container application manager to build an inventory of the containerized application, the containerized application including a virtual machine, the virtual machine hosting one or more containers, and a network topology builder to invoke a virtual machine agent of the virtual machine to obtain network traffic events from the one or more containers to generate network topology information associated with the containerized application based on the inventory, generate a network topology for the containerized application based on the network topology information, build the visualization based on the network topology, the visualization including the inventory and the network topology information, and launch a user interface to display the visualization to execute one or more computing tasks.

    DETECTION OF THREATS BASED ON RESPONSES TO NAME RESOLUTION REQUESTS

    公开(公告)号:US20230131894A1

    公开(公告)日:2023-04-27

    申请号:US17507548

    申请日:2021-10-21

    Applicant: VMware, Inc.

    Abstract: Some embodiments provide a method for identifying security threats to a datacenter. The method receives flow attribute sets for multiple flows from multiple host computers in the datacenter on which data compute nodes (DCNs) execute. Each flow attribute set indicates at least a source DCN for the flow. The method identifies flow attribute sets that correspond to DCNs responding to name resolution requests. For each DCN of a set of DCNs executing on the host computers, the method determines whether the DCN has sent responses to name resolution requests in a manner that deviates from a historical baseline for the DCN based on the identified flow attribute sets. When a particular DCN has sent responses to name resolution requests in a manner that deviates from a historical baseline for the particular DCN, the method identifies the particular DCN as a security threat to the datacenter.

    ANALYSIS SYSTEM DETECTING THREATS TO DATACENTER

    公开(公告)号:US20230011397A1

    公开(公告)日:2023-01-12

    申请号:US17372264

    申请日:2021-07-09

    Applicant: VMware, Inc.

    Abstract: Some embodiments provide a system for detecting threats to a datacenter. The system includes a set of processing units and a set of non-transitory machine-readable media storing an analysis appliance. The analysis appliance includes multiple event detectors that analyze information received from host computers in the datacenter to identify anomalous events occurring in the datacenter. The analysis appliance includes a graph generation module that generates a graph of connections between data compute nodes (DCNs) in the datacenter based on the information received from the host computers. The analysis appliance includes a lateral movement threat detection module that (i) uses the graph of connections to identify a set of connections between a set of the DCNs based on a particular anomalous event and (ii) uses the set of connections and the identified anomalous events to determine whether the set of connections is indicative of a lateral movement attack on the datacenter.

    AUTOMATIC IDENTIFICATION OF POLICY MISCONFIGURATION

    公开(公告)号:US20220417096A1

    公开(公告)日:2022-12-29

    申请号:US17355829

    申请日:2021-06-23

    Applicant: VMware, Inc.

    Abstract: Some embodiments provide a method for identifying policy misconfiguration in a datacenter. Based on flow data received for a plurality of data compute nodes (DCNs) in the datacenter, the method determines that an anomalous amount of data traffic relating to a particular DCN has been dropped. The method uses (i) the received flow data for the particular DCN and (ii) a set of recent policy configuration changes to determine policy configuration changes that contributed to the anomalous amount of dropped data traffic relating to the particular DCN. The method generates an alert for presentation to a user indicating the anomalous amount of data traffic and the contributing policy configuration changes.

    Methods for enabling enhanced firewall rules via ARP-based annotations

    公开(公告)号:US11431678B2

    公开(公告)日:2022-08-30

    申请号:US16351083

    申请日:2019-03-12

    Applicant: VMware, Inc.

    Abstract: In an embodiment, a computer-implemented method for enabling enhanced firewall rules via ARP-based annotations is described. In an embodiment, a method comprises detecting, by a hypervisor implemented in a first host, that a first process is executing on the first host. The hypervisor determines first context information for the first process, generates a first request, encapsulates the first request and the first context information in a first packet, and transmits the first packet to a central controller to cause the central controller to update the controller's table to indicate that the first process is executing on the first host. In response to receiving a second packet from the central controller and determining that the second packet comprises a first response, the hypervisor extracts second context information from the second packet and, based on the second context information, determines that a second process is executing on a second host.

    Anomaly detection on groups of flows

    公开(公告)号:US10911335B1

    公开(公告)日:2021-02-02

    申请号:US16520235

    申请日:2019-07-23

    Applicant: VMware, Inc.

    Abstract: Some embodiments provide a novel method for analyzing the incoming flow data to detect anomalous behavior. The analysis, in some embodiments, is performed after a deduplication/aggregation operation. In some embodiments, the analysis identifies flows for further investigation by an administrator. The analysis, in some embodiments is also performed based on other received data sets (e.g., context data and configuration data), stored flow data, or both.

Patent Agency Ranking