Reuse of groups in security policy

    公开(公告)号:US12015591B2

    公开(公告)日:2024-06-18

    申请号:US17543254

    申请日:2021-12-06

    Applicant: VMware LLC

    CPC classification number: H04L63/0263 H04L63/20

    Abstract: Some embodiments provide a method for modifying a firewall rule of a security policy implemented in a network. The method identifies a set of compute machines to be added to a match condition for the firewall rule. The match condition is expressed using one or more groups of compute machines. The method selects a set of groups for the identified set of compute machines from a plurality of existing groups of compute machines based on a user-specified threshold indicating tolerance for inclusion of compute machines that are not in the identified set of compute machines in the selected groups. The method uses the selected set of groups for the match condition of the firewall rule.

    Self-learning packet flow monitoring in software-defined networking environments

    公开(公告)号:US11909653B2

    公开(公告)日:2024-02-20

    申请号:US16744131

    申请日:2020-01-15

    Applicant: VMware LLC

    CPC classification number: H04L47/2441 G06N5/01 H04L43/045 G06N20/00

    Abstract: Example methods and systems for self-learning packet flow monitoring. One example method may comprise monitoring a packet flow to identify attribute information associated with the packet flow between a source and a destination; and classifying the packet flow using a classification engine that is trained using a training dataset to determine a classification output associated with the packet flow. The example method may also comprise providing, to a user device, a user interface (UI) that includes a visualization of the packet flow and the classification output; requesting, via the UI, a feedback associated with the classification output for the packet flow; and updating the classification engine or the training dataset based on the feedback from the user device.

    Security threat detection based on network flow analysis

    公开(公告)号:US11991187B2

    公开(公告)日:2024-05-21

    申请号:US17220553

    申请日:2021-04-01

    Applicant: VMware LLC

    CPC classification number: H04L63/1416 H04L63/1425

    Abstract: Some embodiments provide a method for identifying security threats to a datacenter. From multiple host computers in the datacenter, the method receives attribute sets for multiple flows. Each respective attribute set for a respective flow includes at least (i) a source identifier for the respective flow and (ii) an indicator as to whether the respective flow is indicative of the source of the respective flow being a security threat. For each of multiple source identifiers, the method aggregates the received attribute sets to generate an aggregate attribute set for the source identifier that includes a combined measurement of security threat indicators. For a particular source identifier, the method adjusts a security threat likelihood score for the source corresponding to the particular source identifier based on the combined measurement of security threat indicators for the source identifier.

    Modifying network relationships using a heterogenous network flows graph

    公开(公告)号:US12143393B2

    公开(公告)日:2024-11-12

    申请号:US17582943

    申请日:2022-01-24

    Applicant: VMware LLC

    Abstract: Systems and methods are described for recommending security groups using graph-based learning models. A server can create a network graph that illustrates network flows between devices in a network and security groups that the devices belong to. The network graph can include nodes that represent the devices and security groups. The server can apply a graph-based learning model to learn embeddings of the nodes and create vectors using the embeddings. Using vectors of two nodes, the server can calculate a vector that represents an edge between the two nodes. The server can apply a binary classifier determine whether the edge should exist. A “true” classification between two nodes can indicate that they should be able to communicate, and vice versa. A “true” classification between a device node and a security group node can indicate that the device should be assigned to the security group, and vice versa.

Patent Agency Ranking