Recommending network NANO-segmentation for micro-services using flow analysis

    公开(公告)号:US11483284B2

    公开(公告)日:2022-10-25

    申请号:US16436930

    申请日:2019-06-11

    Applicant: VMWARE, INC.

    Abstract: The present disclosure provides an approach for generating one or more firewall rules to regulate communication between containerized services running within containers. The approach includes determining which services communicate with each other, independently of in which containers the services execute. The determining occurs over a period of time. If two services communicated with each other during the period of time, then the firewall allows the services to continue communicating, but only over the same ports as used during the period of time. If two services did not communicate during the period of time, then the firewall does not allow the services to communicate after the expiration of the period of time. In some embodiments, redetermining the communication flow over a new period of time may occur after the initial period of time so as to refresh the firewall rules.

    Security context aware nano-segmentation for container based microservices

    公开(公告)号:US11343231B2

    公开(公告)日:2022-05-24

    申请号:US16547634

    申请日:2019-08-22

    Applicant: VMWARE, INC.

    Abstract: The present disclosure provides an approach for creating one or more firewall rules to regulate communication between containers. The approach includes calculating a trust score for each container. To generate a rule for any two containers, a difference between the trust scores is computed, and if the difference in trust levels is too large, then the more trustworthy container is not allowed to communicate with the less trustworthy container. If the difference in trust scores is not too large, then the trustworthy container is allowed to communicate with the other trustworthy container, or an untrustworthy container is allowed to communicate with another untrustworthy container.

    GENERATING METRICS FOR QUANTIFYING COMPUTING RESOURCE USAGE

    公开(公告)号:US20200026565A1

    公开(公告)日:2020-01-23

    申请号:US16037298

    申请日:2018-07-17

    Applicant: VMware, Inc.

    Abstract: Various examples are disclosed for generating metrics for quantifying computing resource usage. A computing environment can identify a computing function that utilizes a plurality of computing services hosted in at least one virtual machine. The computing environment can determine a first cost metric for the at least one virtual machine based on hardware resources used by the at least one virtual machine and determine a second cost metric for individual ones of the computing services based on virtual machine resources used by the individual ones of the computing services and the first cost metric. A third cost metric can be determined for the computing function as a function of the second cost metric and a utilization ratio.

    SCALABLE PROVENANCE DATA DISPLAY FOR DATA PLANE ANALYSIS

    公开(公告)号:US20230096394A1

    公开(公告)日:2023-03-30

    申请号:US17570336

    申请日:2022-01-06

    Applicant: VMware, Inc.

    Abstract: Some embodiments provide a method. The method determines a forwarding path for a packet set by using a data plane model of a network. The method identifies a rule table implementing a step in the forwarding path of the packet set. The method retrieves an indexing file at a scalable storage based on the identified rule table. The indexing file stores rule entries for one or more rule tables of the network. The method retrieves provenance data regarding a rule of the rule table that is applicable to the packet set from the indexing file. The method presents the retrieved provenance information of the identified rule.

    SECURITY CONTEXT AWARE NANO-SEGMENTATION FOR CONTAINER BASED MICROSERVICES

    公开(公告)号:US20210006543A1

    公开(公告)日:2021-01-07

    申请号:US16547634

    申请日:2019-08-22

    Applicant: VMWARE, INC.

    Abstract: The present disclosure provides an approach for creating one or more firewall rules to regulate communication between containers. The approach includes calculating a trust score for each container. To generate a rule for any two containers, a difference between the trust scores is computed, and if the difference in trust levels is too large, then the more trustworthy container is not allowed to communicate with the less trustworthy container. If the difference in trust scores is not too large, then the trustworthy container is allowed to communicate with the other trustworthy container, or an untrustworthy container is allowed to communicate with another untrustworthy container.

Patent Agency Ranking