Firewall rules with expression matching

    公开(公告)号:US10791092B2

    公开(公告)日:2020-09-29

    申请号:US15897129

    申请日:2018-02-14

    Applicant: Nicira, Inc.

    Abstract: Some embodiments provide a method that receives a packet, having a set of one or more layer 7 (L7) expressions, from a datapath. The method identifies a set of datapath firewall rules that match on expressions in the set of expressions. The method provides identifiers for the datapath firewall rules of the identified set to the datapath. The datapath uses the identifiers and additional packet header data to determine a matching firewall rule from the set of datapath firewall rules.

    Tracking the dynamics of application-centric clusters in a virtualized datacenter

    公开(公告)号:US10742673B2

    公开(公告)日:2020-08-11

    申请号:US15835865

    申请日:2017-12-08

    Applicant: Nicira, Inc.

    Abstract: For a managed network including multiple nodes providing multiple services and executing multiple applications some embodiments provide a method for generating groupings of network addresses associated with different applications or services. The method analyzes network traffic patterns using a probabilistic topic modeling algorithm to generate the groupings of network addresses. In some embodiments, data is collected and analyzed periodically. A network administrator defines the granularity of the time stamps in some embodiments to monitor changes in network traffic patterns over time for each network address or node and/or for the network as a whole. For each network address or node, a probability distribution over the topics at a given time is stored in some embodiments. The stored distributions are then used to determine a divergence over time of the application or service provided by the network address or node. Additionally, the stored distributions can be used to detect anomalous behavior.

    UNSUPERVISED MACHINE LEARNING FOR CLUSTERING DATACENTER NODES ON THE BASIS OF NETWORK TRAFFIC PATTERNS

    公开(公告)号:US20190180141A1

    公开(公告)日:2019-06-13

    申请号:US15835870

    申请日:2017-12-08

    Applicant: Nicira, Inc.

    Abstract: For a managed network including multiple nodes providing multiple services and executing multiple applications some embodiments provide a method for generating groupings of network addresses associated with different applications or services. The method analyzes network traffic patterns using a probabilistic topic modeling algorithm to generate the groupings of network addresses. Network traffic patterns are related to the different flows in the network. The method analyzes information about the different flows such as some combination of the network addresses in the network that are a source or destination of the flow, the source or destination port, the number of packets in each flow, the number of bytes exchanged during the life of the flow, a start time of a flow, and the duration of the flow. In some embodiments, the information is collected as part of an internet protocol flow information export (IPFIX) operation or a tcpdump operation.

    TRACKING THE DYNAMICS OF APPLICATION-CENTRIC CLUSTERS IN A VIRTUALIZED DATACENTER

    公开(公告)号:US20190182276A1

    公开(公告)日:2019-06-13

    申请号:US15835865

    申请日:2017-12-08

    Applicant: Nicira, Inc.

    Abstract: For a managed network including multiple nodes providing multiple services and executing multiple applications some embodiments provide a method for generating groupings of network addresses associated with different applications or services. The method analyzes network traffic patterns using a probabilistic topic modeling algorithm to generate the groupings of network addresses. In some embodiments, data is collected and analyzed periodically. A network administrator defines the granularity of the time stamps in some embodiments to monitor changes in network traffic patterns over time for each network address or node and/or for the network as a whole. For each network address or node, a probability distribution over the topics at a given time is stored in some embodiments. The stored distributions are then used to determine a divergence over time of the application or service provided by the network address or node. Additionally, the stored distributions can be used to detect anomalous behavior.

    Security policy analysis based on detecting new network port connections

    公开(公告)号:US10193862B2

    公开(公告)日:2019-01-29

    申请号:US15363639

    申请日:2016-11-29

    Applicant: Nicira, Inc.

    Abstract: A computer system provides a method for identifying firewall rules to apply to a virtual machine based on detecting initiation of a new network connection from the virtual machine. An example method generally includes detecting initiation of communications on a network port by a virtual machine, identifying one or more applications executing on the virtual machine that initiated communications on the network port, identifying one or more firewall rules to apply to the virtual machine based, at least in part, on the identification of the one or more applications, determining a deviation between firewall rules applied to the virtual machine and the identified one or more firewall rules, and upon determining that a deviation exists between the firewall rules applied to the virtual machine and the identified one or more firewall rules, applying one or more rules corresponding to the determined deviation to the virtual machine.

    Mechanisms for layer 7 context accumulation for enforcing layer 4, layer 7 and verb-based rules

    公开(公告)号:US11431677B2

    公开(公告)日:2022-08-30

    申请号:US15868789

    申请日:2018-01-11

    Applicant: NICIRA, INC.

    Abstract: The method for implementing mechanisms for Layer 7 context accumulation for enforcing Layers 4, 7, and verb-based rules is presented. The method comprises: receiving stream data, and identifying a packet in the stream. If the packet includes Layer 7 headers: for each Layer 7 header: determining content of the packet identified by a Layer 7 header's identifier; and parsing the content to extract firewall input data. If one or more rules at least partially match the firewall input data, determining that a particular rule also includes additional information that cannot be found in the firewall input data; performing a DPI on the content to determine whether at least a portion of the additional information is found in the content; extracting additional input data from the content and adding it to the firewall input data; and applying the rules to the firewall input data to process the packet.

    FIREWALL RULES WITH EXPRESSION MATCHING
    9.
    发明申请

    公开(公告)号:US20190253390A1

    公开(公告)日:2019-08-15

    申请号:US15897129

    申请日:2018-02-14

    Applicant: Nicira, Inc.

    Abstract: Some embodiments provide a method that receives a packet, having a set of one or more layer 7 (Li) expressions, from a datapath. The method identifies a set of datapath firewall rules that match on expressions in the set of expressions. The method provides identifiers for the datapath firewall rules of the identified set to the datapath. The datapath uses the identifiers and additional packet header data to determine a matching firewall rule from the set of datapath firewall rules.

Patent Agency Ranking