Peer risk benchmarking using generative adversarial networks

    公开(公告)号:US11533241B2

    公开(公告)日:2022-12-20

    申请号:US17704449

    申请日:2022-03-25

    Abstract: A method, computer system, and computer program product are provided for peer risk benchmarking. Customer data for a first network is obtained, wherein the customer data comprises a role of one or more network devices in the first network and a plurality of risk reports corresponding to the one or more network devices, and wherein each risk report is associated with a particular dimension of a plurality of dimensions of risk for the one or more network devices. A network profile image is generated by processing the plurality of risk reports. A generative adversarial network generates a synthetic network profile image from the network profile image, wherein the synthetic network profile image does not include the customer data. A second network is evaluated using the synthetic network profile image to identify differences between the first network and the second network.

    Dynamic transaction-aware web application authentication using call intercepts

    公开(公告)号:US12299097B2

    公开(公告)日:2025-05-13

    申请号:US17390610

    申请日:2021-07-30

    Abstract: According to one or more embodiments of the disclosure, the techniques herein are directed toward a dynamic transaction-aware web application authentication using call intercepts. In one embodiment, a method comprises: intercepting, by a monitoring process, calls made for transactions within an executing application; determining, by the monitoring process, whether a particular intercepted call triggers an enhanced user authentication requirement for a particular transaction; initiating, by the monitoring process in response to the particular intercepted call triggering the enhanced user authentication requirement, a corresponding challenge to adequately authenticate a user for the particular transaction; and allowing, by the monitoring process, the particular intercepted call to proceed for the particular transaction in response to an adequately authenticated user for the particular transaction.

    OPERATIONAL CHARACTERISTIC-BASED CONTAINER MANAGEMENT

    公开(公告)号:US20240427899A1

    公开(公告)日:2024-12-26

    申请号:US18213983

    申请日:2023-06-26

    Abstract: In some embodiments, operational characteristics-based container management may include receiving, by a device and from a container agent executing in a container environment, operational characteristics of an application instance executing in the container environment; determining, by the device and based on the operational characteristics, whether the application instance executing in the container environment is associated with a policy violation for application instances; generating, by the device, a notification of the policy violation when the device determines that the application instance is associated with the policy violation; and causing, by the device, the container environment to perform a mitigation action of the policy violation by the application instance.

    DYNAMIC AND TRANSPARENT APPLICATION PROGRAM INTERFACE (API) ENDPOINT HOST REDIRECTION

    公开(公告)号:US20240406205A1

    公开(公告)日:2024-12-05

    申请号:US18328530

    申请日:2023-06-02

    Abstract: A method of application program interface (API) endpoint host redirection may include with an intelligent domain name system (DNS) engine (IDE) associated with a containerized service within a pod of a mesh network, snooping a DNS query from the containerized service, identifying within the DNS query, an API endpoint name, snooping a DNS response associated with the DNS query, identifying an Internet protocol (IP) address associated with the API endpoint name, transmitting the API endpoint name and the IP address to a controller, receiving, from the controller, a list of safe API endpoint hosts with no known security vulnerabilities based on security data obtained from at least one security service, caching, at the IDE, the list of safe API endpoint hosts including safe IP addresses, and transmitting to the containerized service, via the IDE, IP addresses of safe API endpoint hosts within the list of safe API endpoint hosts.

    DATA COMPLIANCE METADATA MARKING
    78.
    发明申请

    公开(公告)号:US20240380734A1

    公开(公告)日:2024-11-14

    申请号:US18780780

    申请日:2024-07-23

    Abstract: A method is provided that is performed using an application performance management agent running on an application and/or application microservices. The method comprises detecting a request to the application and/or application microservices for data, and inserting data compliance metadata into packet headers of packets that are to be sent in response to the request by the application and/or application microservices. The data compliance metadata comprises data-compliance markings associated with the data based on user/operator-defined data compliance requirements. The method further includes causing the packets to be sent into a network so that one or more network devices or services in the network can read the data compliance metadata and apply packet handling policies.

    CONTEXTUAL VALIDATION FOR NETWORK DEVICES
    80.
    发明公开

    公开(公告)号:US20240364687A1

    公开(公告)日:2024-10-31

    申请号:US18306700

    申请日:2023-04-25

    CPC classification number: H04L63/0876

    Abstract: This disclosure describes techniques for validating a network device based on an operational context of the network device. The techniques may include receiving, via an intercepting node, a DNS query from a querying device. The techniques may include extracting the metadata from the DNS query. Based at least in part on verifying a signature of the metadata, the techniques may include extracting a location code from the metadata. Based at least in part on comparing the location code to an expected location of the intercepting node, the techniques may include sending a response to the querying device indicating a contextual validation of the querying device.

Patent Agency Ranking