Invention Application
- Patent Title: TECHNOLOGIES FOR MANAGING COMPROMISED SENSORS IN VIRTUALIZED ENVIRONMENTS
-
Application No.: US18429022Application Date: 2024-01-31
-
Publication No.: US20240380680A1Publication Date: 2024-11-14
- Inventor: Navindra Yadav , Abhishek Ranjan Singh , Anubhav Gupta , Shashidhar Gandham , Jackson Ngoc Ki Pang , Shih-Chun Chang , Hai Trong Vu
- Applicant: Cisco Technology, Inc.
- Applicant Address: US CA San Jose
- Assignee: Cisco Technology, Inc.
- Current Assignee: Cisco Technology, Inc.
- Current Assignee Address: US CA San Jose
- Main IPC: H04L43/045
- IPC: H04L43/045 ; G06F3/0482 ; G06F3/04842 ; G06F3/04847 ; G06F9/455 ; G06F16/11 ; G06F16/13 ; G06F16/16 ; G06F16/17 ; G06F16/174 ; G06F16/23 ; G06F16/2457 ; G06F16/248 ; G06F16/28 ; G06F16/29 ; G06F16/9535 ; G06F21/53 ; G06F21/55 ; G06F21/56 ; G06N20/00 ; G06N99/00 ; G06T11/20 ; H04J3/06 ; H04J3/14 ; H04L1/24 ; H04L7/10 ; H04L9/08 ; H04L9/32 ; H04L9/40 ; H04L41/046 ; H04L41/0668 ; H04L41/0803 ; H04L41/0806 ; H04L41/0816 ; H04L41/0893 ; H04L41/12 ; H04L41/16 ; H04L41/22 ; H04L43/02 ; H04L43/026 ; H04L43/04 ; H04L43/062 ; H04L43/08 ; H04L43/0805 ; H04L43/0811 ; H04L43/0829 ; H04L43/0852 ; H04L43/0864 ; H04L43/0876 ; H04L43/0882 ; H04L43/0888 ; H04L43/10 ; H04L43/106 ; H04L43/12 ; H04L43/16 ; H04L45/00 ; H04L45/302 ; H04L45/50 ; H04L45/74 ; H04L47/11 ; H04L47/20 ; H04L47/2441 ; H04L47/2483 ; H04L47/28 ; H04L47/31 ; H04L47/32 ; H04L61/5007 ; H04L67/01 ; H04L67/10 ; H04L67/1001 ; H04L67/12 ; H04L67/50 ; H04L67/51 ; H04L67/75 ; H04L69/16 ; H04L69/22 ; H04W72/54 ; H04W84/18

Abstract:
Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can receive, from a first capturing agent deployed in a virtualization layer of a first device, data reports generated based on traffic captured by the first capturing agent. The system can also receive, from a second capturing agent deployed in a hardware layer of a second device, data reports generated based on traffic captured by the second capturing agent. Based on the data reports, the system can determine characteristics of the traffic captured by the first capturing agent and the second capturing agent. The system can then compare the characteristics to determine a multi-layer difference in traffic characteristics. Based on the multi-layer difference in traffic characteristics, the system can determine that the first capturing agent or the second capturing agent is in a faulty state.
Public/Granted literature
- US12224921B2 Technologies for managing compromised sensors in virtualized environments Public/Granted day:2025-02-11
Information query