On-path dynamic policy enforcement and endpoint-aware policy enforcement for endpoints

    公开(公告)号:US11201800B2

    公开(公告)日:2021-12-14

    申请号:US16782769

    申请日:2020-02-05

    Abstract: Systems, methods, and computer-readable media for locally applying endpoint-specific policies to an endpoint in a network environment. A network device local to one or more endpoints in a network environment can receive from a centralized network controller one or more network-wide endpoint policies. A first endpoint of the one or more endpoints can be configured to inject policy metadata into first data traffic. Policy metadata injected into the first traffic data can be received from the first endpoint. The network device can determine one or more first endpoint-specific polices for the first endpoint by evaluation the first policy metadata with respect to the one or more network-wide endpoint policies. As follows, the one or more first endpoint-specific policies can be applied to control data traffic associated with the first endpoint.

    GROUP-BASED POLICIES FOR INTER-DOMAIN TRAFFIC

    公开(公告)号:US20210160175A1

    公开(公告)日:2021-05-27

    申请号:US16697016

    申请日:2019-11-26

    Abstract: In one embodiment, a method includes receiving a data packet from a first host located in the first site, where the data packet may be destined to a second host located in a second site that may be different from the first site, determining that an identifier of a second group to which the second host belongs is not available at the first network apparatus, sending a request for an identifier of the second group to a second network apparatus, where the request may comprise an address of the second host, receiving a response comprising the identifier of the second group from the second network apparatus, determining that the second group is a destination group, applying one or more policies associated with the destination group to the data packet, and causing the data packet to be routed to the second host.

    AUTOMATICALLY DETERMINING SENSOR LOCATION IN A VIRTUALIZED COMPUTING ENVIRONMENT
    47.
    发明申请
    AUTOMATICALLY DETERMINING SENSOR LOCATION IN A VIRTUALIZED COMPUTING ENVIRONMENT 有权
    在虚拟化计算环境中自动确定传感器位置

    公开(公告)号:US20170075710A1

    公开(公告)日:2017-03-16

    申请号:US14855811

    申请日:2015-09-16

    Abstract: Methods, systems, and computer readable media are provided for determining, in a virtualized network system, a relationship of a sensor relative to other sensors. In a virtualized computing system in which a plurality of software sensors are deployed and in which there are one or more traffic flows, captured network data is received from the plurality of sensors, the captured network data from a given sensor of the plurality of sensors indicating one or more traffic flows detected by the given sensor. The received captured network data is analyzed to identify, for each respective sensor, a first group of sensors, a second group of sensors, and a third group of sensors, wherein all traffic flows observed by the first group of sensors are also observed by the second group of sensors, and all traffic flows observed by the second group of sensors are also observed by the third group of sensors. For each respective sensor, a location of each respective sensor relative to other sensors within the virtualized computing system is determined based upon whether the respective sensor belongs to the first group of sensors, the second group of sensors, or the third group of sensors.

    Abstract translation: 提供了方法,系统和计算机可读介质,用于在虚拟化网络系统中确定传感器相对于其他传感器的关系。 在其中部署多个软件传感器并且其中存在一个或多个业务流的虚拟化计算系统中,从多个传感器接收捕获的网络数据,来自多个传感器中的给定传感器的所捕获的网络数据指示 由给定传感器检测到的一个或多个交通流量。 分析所接收的捕获的网络数据,以便为每个相应的传感器识别第一组传感器,第二组传感器和第三组传感器,其中由第一组传感器观察到的所有交通流也被 第二组传感器,第二组传感器观测到的所有交通流量也由第三组传感器观察到。 对于每个相应的传感器,基于各个传感器是否属于第一组传感器,第二组传感器或第三组传感器来确定每个相应传感器相对于虚拟化计算系统内的其它传感器的位置。

    SYSTEM AND METHOD OF DETECTING WHETHER A SOURCE OF A PACKET FLOW TRANSMITS PACKETS WHICH BYPASS AN OPERATING SYSTEM STACK
    49.
    发明申请
    SYSTEM AND METHOD OF DETECTING WHETHER A SOURCE OF A PACKET FLOW TRANSMITS PACKETS WHICH BYPASS AN OPERATING SYSTEM STACK 审中-公开
    检测分组流量传输的源的系统和方法除了操作系统堆栈之外的包

    公开(公告)号:US20160359890A1

    公开(公告)日:2016-12-08

    申请号:US15171879

    申请日:2016-06-02

    Abstract: A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed on a second host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that the second packet flow was transmitted by a component that bypassed an operating stack of the first host or a packet capture agent at the device to yield a determination, detecting that hidden network traffic exists, and predicting a malware issue with the first host based on the determination.

    Abstract translation: 一种方法包括使用部署在第一主机处的第一捕获代理捕获与来自第一主机的第一分组流相关联的第一数据,以产生第一流数据,从第二主捕获与第一主机起源的第二分组流相关联的第二数据 部署在第二主机上的捕获代理产生第二流数据并比较第一流数据和第二流数据以产生差异。 当所述差异高于阈值时,所述方法包括确定所述第二分组流由绕过所述设备的所述第一主机或分组捕获代理的操作堆栈的组件发送以产生确定,检测所述隐藏网络流量 存在并且基于该确定来预测与第一主机的恶意软件问题。

Patent Agency Ranking