AUTOMATIC COPY VALIDATION USING REAL-WORLD APPLICATION TRAFFIC

    公开(公告)号:US20200019676A1

    公开(公告)日:2020-01-16

    申请号:US16031930

    申请日:2018-07-10

    IPC分类号: G06F21/10 H04L29/06 H04L12/26

    摘要: One example method includes bringing up a clone application in a validation environment, replaying recorded incoming network traffic to the clone application, obtaining a response of the clone application to the incoming network traffic, comparing the response of the clone application to recorded outgoing network traffic of the production application, and making a validation determination regarding the clone application, based on the comparison of the response of the clone application to recorded outgoing network traffic of the production application. When the clone application is not validated, the example method includes identifying and resolving a problem relating to the clone application.

    Translating existing security policies enforced in upper layers into new security policies enforced in lower layers

    公开(公告)号:US10715554B2

    公开(公告)日:2020-07-14

    申请号:US16143250

    申请日:2018-09-26

    IPC分类号: H04L29/06

    摘要: Existing policies enforced at or above an operating system (OS) layer of a device are obtained. Translation rules are stored that include data structure descriptions of conditions, corresponding actions performed when the conditions are satisfied, and attributes specified in the existing policies, and attributes of one or more layers below the OS layer that are relevant to policy enforcement in the one or more layers below the OS layer. The existing policies are parsed using the data structure descriptions to identify the conditions, corresponding actions, and attributes specified in the existing policies. New policies are generated that are consistent with the existing policies. The new policies include the identified attributes specified in the existing policies and the attributes relevant to policy enforcement in the one or more layers below the OS layer. The new policies are enforced in the one or more layers below the OS layer.

    Tracing Mechanism for Monitoring and Analysis of Cloud-Based Communication Session Attacks

    公开(公告)号:US20200028863A1

    公开(公告)日:2020-01-23

    申请号:US16039503

    申请日:2018-07-19

    IPC分类号: H04L29/06 G06F9/54

    摘要: A tracing mechanism is provided for analyzing session-based attacks. An exemplary method comprises: detecting a potential attack associated with a session from a potential attacker based on predefined anomaly detection criteria; adding a tracing flag identifier to a response packet; sending a notification to a cloud provider of the potential attack, wherein the notification comprises the tracing flag identifier; and sending the response packet to the potential attacker, wherein, in response to receiving the response packet with the tracing flag identifier, the cloud provider: determines a source of the potential attack based on a destination of the response packet; forwards the response packet to the potential attacker based on the destination of the response packet; and monitors the determined source to evaluate the potential attack. The response packet is optionally delayed by a predefined time duration and/or until the cloud provider has acknowledged receipt of the notification.

    Container life cycle management with honeypot service

    公开(公告)号:US10791144B1

    公开(公告)日:2020-09-29

    申请号:US15797597

    申请日:2017-10-30

    IPC分类号: H04L29/06

    摘要: The life cycle of one or more containers related to one or more containerized applications is managed by determining that a predefined retention time for a first container of the plurality of containers has elapsed; in response to the determining, performing the following honeypot container creation steps: suspending new session traffic to the first container; maintaining the first container as a honeypot container; and identifying communications sent to the honeypot container as an anomalous communication. Alert notifications are optionally generated for the anomalous communication.

    Container life cycle management with retention rate adjustment based on detected anomalies

    公开(公告)号:US10951651B1

    公开(公告)日:2021-03-16

    申请号:US15797601

    申请日:2017-10-30

    IPC分类号: H04L29/06

    摘要: A plurality of containers related to one or more containerized applications are managed by monitoring an execution of the one or more containers; determining that a given one of the one or more containers exhibits anomalous behavior; and in response to the determining, adjusting a retention time of the given container, wherein the retention time of the given container determines when the given container is one or more of terminated and changes role to a honeypot container. The anomalous behavior comprises, for example, the given container exhibiting behavior that is different than a learned baseline model of the given container or including program code consistent with malicious activity. An alert notification of the anomalous behavior is optionally generated. The retention time of the given container can be adjusted for example, to an interval between deployment of the given container and the time the anomalous behavior is detected.

    Tracing mechanism for monitoring and analysis of cloud-based communication session attacks

    公开(公告)号:US10855709B2

    公开(公告)日:2020-12-01

    申请号:US16039503

    申请日:2018-07-19

    IPC分类号: H04L29/06

    摘要: A tracing mechanism is provided for analyzing session-based attacks. An exemplary method comprises: detecting a potential attack associated with a session from a potential attacker based on predefined anomaly detection criteria; adding a tracing flag identifier to a response packet; sending a notification to a cloud provider of the potential attack, wherein the notification comprises the tracing flag identifier; and sending the response packet to the potential attacker, wherein, in response to receiving the response packet with the tracing flag identifier, the cloud provider: determines a source of the potential attack based on a destination of the response packet; forwards the response packet to the potential attacker based on the destination of the response packet; and monitors the determined source to evaluate the potential attack. The response packet is optionally delayed by a predefined time duration and/or until the cloud provider has acknowledged receipt of the notification.

    TRANSLATING EXISTING SECURITY POLICIES ENFORCED IN UPPER LAYERS INTO NEW SECURITY POLICIES ENFORCED IN LOWER LAYERS

    公开(公告)号:US20200099721A1

    公开(公告)日:2020-03-26

    申请号:US16143250

    申请日:2018-09-26

    IPC分类号: H04L29/06

    摘要: Existing policies enforced at or above an operating system (OS) layer of a device are obtained. Translation rules are stored that include data structure descriptions of conditions, corresponding actions performed when the conditions are satisfied, and attributes specified in the existing policies, and attributes of one or more layers below the OS layer that are relevant to policy enforcement in the one or more layers below the OS layer. The existing policies are parsed using the data structure descriptions to identify the conditions, corresponding actions, and attributes specified in the existing policies. New policies are generated that are consistent with the existing policies. The new policies include the identified attributes specified in the existing policies and the attributes relevant to policy enforcement in the one or more layers below the OS layer. The new policies are enforced in the one or more layers below the OS layer.