摘要:
In overview, an integrated circuit in accordance with the disclosure comprises first and second network interface processors which are separate processors and which are connected by a first unidirectional interconnect. The first unidirectional interconnect allows data transfer from the first network interface processor to the second network interface processor, while preventing data transfer in the reverse direction. The first network interface processor is for communication with a first network which may be a secure network and the second network interface processor is for communication with second network which may be a public network, for example an insecure public network. In this way, the processing of data received from each of the first and second networks is performed by separate processors and data can only be sent from the first network to the second network, thereby protecting the first network from the second network.
摘要:
A data transfer system is configured to transfer data from a data transmitting site to a data receiving site. The data transfer system includes a low-side network, at least one high- side network, and a one-way data (OWD) link. The OWD link is configured to perform unidirectional data transfer from the low-side network to the at least one high-side network. The OWD link continuously synchronizes the low-side network with the at least one high- side network while continuously transferring data through the OWD link.
摘要:
Generally discussed herein are systems, devices, and methods for malware analysis lab isolation. A system can include a malware analysis zone LAN in which malware analysis is performed, a separation zone LAN communicatively connected to the malware analysis zone LAN, the separation zone LAN providing access control to manage communication of data between other LANs of the plurality of LANs, an analyst zone LAN communicatively connected to the separation zone LAN, and a remote access zone LAN communicatively connected to the separation zone LAN, the remote access zone LAN providing a user LAN with results from the malware analysis zone LAN and the analyst zone LAN and providing an item for malware analysis by the malware analysis zone LAN.
摘要:
An example method of migrating a virtualized computing instance between source and destination virtualized computing systems includes executing a first migration workflow in the source virtualized computing system, where a host computer executing the virtualized computing instance is a source host in the first migration workflow and a first mobility agent simulates a destination host in the first migration workflow. The method further includes executing a second migration workflow in the destination virtualized computing system, where a second mobility agent in the destination virtualized computing system simulates a source host in the second migration workflow and a host computer in the destination virtualized computing system is a destination host in the second migration workflow. The method further includes transferring, during execution of the first and second migration workflows, migration data including the virtualized computing instance between the first mobility agent and the second mobility agent over a network.
摘要:
Telecommunication system of the type consisting of a series of terminals mutually connected through a server and of a data transmission network characterised in that means for the management and the control of data management within the network are furthermore provided, said means consisting of a single device made up of a SOC (System on Chip) processor to which the required support peripherals are associated.
摘要:
Technologies for bootstrapping virtual network functions in a network functions virtualization (NFV) network architecture include a virtual network function (VNF) bootstrap service (VBS) in secure network communication with a VBS agent of a VNF instance. The VBS agent is configured to execute a secure VNF bootstrap capture protocol in the NFV network architecture. Accordingly, the VBS agent can be configured to register with the VBS via secure communications transmitted between the VBS and the VBS agent. The secure communications include transmitting a security quote from a TEE of a platform on which the VNF instance is instantiated and a security credential request to the VBS, as well as receiving a security credential in response to validating the security quote and the security credential request. Other embodiments are described and claimed.
摘要:
Ein Verfahren sowie eine Vorrichtung zum rückwirkungsfreien Erfassen von Daten von mindestens einer Einrichtung (16.1, 16.2, 16.3), die in einem ersten Netzwerk (12) mit hoher Sicherheitsanforderung angeordnet ist, in einem zweiten Netzwerk (11) mit geringer Sicherheitsanforderung, enthaltend - eine Anfrageeinheit (14), die innerhalb des ersten Netzwerks (12) angeordnet und derart ausgebildet ist Daten bei der mindestens einen Einrichtung (16.1, 16.2, 16.3) entsprechend einem Anfrageprofil (17, 17'), anzufordern, - eine Mithöreinheit (21), die innerhalb des ersten Netzwerks (12) angeordnet ist und derart ausgebildet ist, Daten, die von der mindestens einen Einrichtung (16.1, 16.2, 16.3) auf die Anforderung gesendet wurden, mitzuhören und an einer Auswerteeinheit (13) zu übermitteln, - eine Auswerteeinheit (13), die in dem zweiten Netzwerk (11) angeordnet und derart ausgebildet ist, die mitgehörten Daten mit dem gemäß dem Anfrageprofil (17, 17') erwarteten Daten zu vergleichen, und - Alarmeinheit (24), die derart ausgebildet ist, ein Alarmsignal bereitzustellen, wenn die mitgehörten Daten von den gemäß dem Anfrageprofil (17, 17') erwarteten Daten abweichen.
摘要:
The embodiments of the present invention provide a method for remote access and a server. The method includes: obtaining, by a Virtual Private Network VPN server, trust data of a user accessing a first network; determining, by the VPN server, a first trust level corresponding to the trust data according to a first correspondence, wherein the first correspondence comprises the trust data and the first trust level; determining, by the VPN server, a first access zone of the first network corresponding to the first trust level according to a second correspondence, wherein the second correspondence comprises the first trust level and the first access zone; and establishing, by the VPN server, a first VPN connection between a device used by the user and the first access zone. The technical solution provides an adaptive security mechanism for the remote access.
摘要:
PG446383WO Page 127of 127 LABELING COMPUTING OBJECTS FOR IMPROVED THREAT DETECTION ABSTRACT Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and soforth. In this manner, threat detection based on complex interactions of computing objects can be characterized in a platform independent manner and pre-processed on endpoints without requiring significant communications overhead with a remote threat management facility.
摘要翻译:PG446383WO Page 127 of 127用于改进的威胁检测的标签计算对象摘要通过以上下文相关的方式提供和更新计算对象的标签来简化威胁检测工具。 这可以包括用于区分对象的简单标签方案,例如可信/不受信任的过程或公司/私人数据。 这还可以包括更精细的标签方案,例如标识类别(例如,金融,电子邮件,游戏),静态威胁检测属性(例如签名,散列,API调用)和明确标识(例如, 例如,文件或进程称为自身)。 通过跟踪各种计算对象的这些数据并将这些标签与恶意软件发生关联,可以将规则写入用于分发到端点,以便基于例如标记对象的交互,对象标签和soforth的更改来促进威胁检测。 以这种方式,可以以平台独立的方式表征基于计算对象的复杂交互的威胁检测,并且在端点上进行预处理,而不需要与远程威胁管理设施的显着的通信开销。