-
公开(公告)号:US11258655B2
公开(公告)日:2022-02-22
申请号:US16212170
申请日:2018-12-06
Applicant: VMware, Inc.
Inventor: Zhen Mo , Dexiang Wang , Bin Zan , Vijay Ganti , Amit Chopra , Ruimin Sun
Abstract: A method for managing alarms in a virtual machine environment includes receiving alarm data related to a process and storing the alarm data in a database, where the alarm data comprises one or more features. The method further includes retrieving intended state information for the process and comparing the one more features of the alarm data to the intended state information to determine whether the alarm is an outlier. The method also includes computing a normal score for the alarm if the alarm is not an outlier, and computing an abnormal score for the alarm if the alarm is an outlier. The method also includes sending a notification for the alarm and the computed score.
-
2.
公开(公告)号:US20160380972A1
公开(公告)日:2016-12-29
申请号:US15262861
申请日:2016-09-12
Applicant: VMware, Inc.
Inventor: Azeem Feroz , Binyuan Chen , Amit Chopra
IPC: H04L29/06
CPC classification number: H04L63/0263 , G06F21/44 , G06F21/554 , H04L63/0218 , H04L63/10 , H04L63/1416 , H04L63/1441 , H04L63/166 , H04L63/168 , H04L63/20
Abstract: A method for enforcing a network policy is described herein. In the method, a network socket event request from an application executing in a first context is intercepted by an agent prior to the request reaching a transport layer in the first context. A context refers to virtualization software, a physical computer, or a combination of virtualization software and physical computer. In response to the interception of the request, the agent requests a decision on whether to allow or deny the network socket event request to be communicated to a security server executing in a second context that is distinct from the first context. The request for a decision includes an identification of the application. The agent then receives from the security server either an allowance or a denial of the network socket event request, the allowance or denial being based at least in part on the identification of the application and a security policy. The agent blocks the network socket event from reaching the transport layer when the denial is received from the security server. In one embodiment, the method is implemented using a machine readable medium embodying software instructions executable by a computer.
Abstract translation: 本文描述了一种用于执行网络策略的方法。 在该方法中,来自在第一上下文中执行的应用的网络套接字事件请求在请求到达第一上下文中的传输层之前由代理截获。 上下文是指虚拟化软件,物理计算机或虚拟化软件和物理计算机的组合。 响应于该请求的截取,代理请求关于是否允许或拒绝网络套接字事件请求被传送到在与第一上下文不同的第二上下文中执行的安全服务器的决定。 决定的请求包括应用程序的标识。 代理然后从安全服务器接收对网络套接字事件请求的允许或拒绝,所述允许或拒绝至少部分地基于应用的标识和安全策略。 当从安全服务器接收到拒绝时,代理阻止网络套接字事件到达传输层。 在一个实施例中,该方法使用体现可由计算机执行的软件指令的机器可读介质实现。
-
公开(公告)号:US10454895B2
公开(公告)日:2019-10-22
申请号:US15262861
申请日:2016-09-12
Applicant: VMware, Inc.
Inventor: Azeem Feroz , Binyuan Chen , Amit Chopra
Abstract: A method for enforcing a network policy is described herein. In the method, a network socket event request from an application executing in a first context is intercepted by an agent prior to the request reaching a transport layer in the first context. A context refers to virtualization software, a physical computer, or a combination of virtualization software and physical computer. In response to the interception of the request, the agent requests a decision on whether to allow or deny the network socket event request to be communicated to a security server executing in a second context that is distinct from the first context. The request for a decision includes an identification of the application. The agent then receives from the security server either an allowance or a denial of the network socket event request, the allowance or denial being based at least in part on the identification of the application and a security policy. The agent blocks the network socket event from reaching the transport layer when the denial is received from the security server. In one embodiment, the method is implemented using a machine readable medium embodying software instructions executable by a computer.
-
公开(公告)号:US10860712B2
公开(公告)日:2020-12-08
申请号:US16032349
申请日:2018-07-11
Applicant: VMware, Inc.
Inventor: Zhen Mo , Dexiang Wang , Bin Zan , Vijay Ganti , Amit Chopra
Abstract: A virtual computing instance (VCI) is protected against security threats by a security manager, monitoring a behavior of a VCI over an observation period. The method further includes, storing by the security manager a digital profile in a first database, wherein the digital profile comprises information indicative of the behavior. The method further includes, accessing by a detection system, the digital profile from the first database, and accessing by the detection system, an intended state associated with VCI, wherein the intended state comprises information indicative of a behavior from a second VCI. The method further includes, comparing at least part of the digital profile to the at least part of the intended state. The method further includes, determining by the detection system, that the VCI contains a security threat when information indicative of a behavior in the digital profile is an outlier.
-
-
-