-
公开(公告)号:US11716352B2
公开(公告)日:2023-08-01
申请号:US16902526
申请日:2020-06-16
Applicant: Cisco Technology, Inc.
Inventor: Supreeth Rao , Navindra Yadav , Prasannakumar Jobigenahally Malleshaiah , Tapan Shrikrishna Patwardhan , Umamaheswaran Arumugam , Darshan Shrinath Purandare , Aiyesha Ma , Fuzhuo Sun , Ashok Kumar
CPC classification number: H04L63/164 , H04L63/029 , H04L63/20
Abstract: The present disclosure relates to methods, systems, and non-transitory computer readable media for generating an application protectability index for network applications and a corresponding protectability scheme. In one aspect, a method includes identifying, by a network controller, network layers associated with an application; determining, by the network controller, a corresponding security index for the application at each of the network layers to yield a plurality of security indexes, each of the plurality of security indexes providing an objective assessment of protectability of the application at a corresponding one of the network layers; determining, by the network controller, an application protectability index; and providing an application protectability scheme for protecting the application based on the application protectability index.
-
公开(公告)号:US11716343B2
公开(公告)日:2023-08-01
申请号:US16990664
申请日:2020-08-11
Applicant: Cisco Technology, Inc.
Inventor: Supreeth Rao , Navindra Yadav , Prasannakumar Jobigenahally Malleshaiah , Hanlin He , Umamaheswaran Arumugam , Robert Bukofser , Aiyesha Ma , Kai Zhu , Ashok Kumar
IPC: H04L9/40 , G06F16/9035 , G06F16/901 , H04L41/22
CPC classification number: H04L63/1433 , G06F16/9024 , G06F16/9035 , H04L41/22 , H04L63/1425
Abstract: Systems, methods, and computer-readable media for determine a neighborhood graph can include the following processes. A neighborhood graph system generates a neighborhood graph for a plurality of nodes in an enterprise network, the neighborhood graph representing a multi-hop connections between any two nodes of the plurality of nodes. A security score service determines a security score for each of the plurality of nodes to yield a plurality of scores. The neighborhood graph system updates the neighborhood graph of the plurality of nodes using the plurality of scores to provide a visual representation of securities of the plurality of nodes relative to each other.
-
公开(公告)号:US20220070065A1
公开(公告)日:2022-03-03
申请号:US17499651
申请日:2021-10-12
Applicant: Cisco Technology, Inc.
Inventor: Matthew Lawson Finn, II , Alok Lalit Wadhwa , Navindra Yadav , Jerry Xin Ye , Supreeth Rao , Prasannakumar Jobigenahally Malleshaiah , Tapan Shrikrishna Patwardhan , Umamaheswaran Arumugam , Aiyesha Ma , Darshan Shrinath Purandare
Abstract: Systems and methods provide for enriching flow data to analyze network security, availability, and compliance. A network analytics system can capture flow data and metadata from network elements. The network analytics system can enrich the flow data by in-line association of the flow data and metadata. The network analytics system can generate multiple planes with each plane representing a dimension of enriched flow data. The network analytics system can generate nodes for the planes with each node representing a unique value or set of values for the dimensions represented by planes. The network analytics system can generate edges for the nodes of the planes with each edge representing a flow between endpoints corresponding to the nodes. The network analytics system can update the planes in response to an interaction with the planes or in response to a query.
-
公开(公告)号:US20210392165A1
公开(公告)日:2021-12-16
申请号:US16902526
申请日:2020-06-16
Applicant: Cisco Technology, Inc.
Inventor: Supreeth Rao , Navindra Yadav , Prasannakumar Jobigenahally Malleshaiah , Tapan Shrikrishna Patwardhan , Umamaheswaran Arumugam , Darshan Shrinath Purandare , Aiyesha Ma , Fuzhuo Sun , Ashok Kumar
IPC: H04L29/06
Abstract: The present disclosure relates to methods, systems, and non-transitory computer readable media for generating an application protectability index for network applications and a corresponding protectability scheme. In one aspect, a method includes identifying, by a network controller, network layers associated with an application; determining, by the network controller, a corresponding security index for the application at each of the network layers to yield a plurality of security indexes, each of the plurality of security indexes providing an objective assessment of protectability of the application at a corresponding one of the network layers; determining, by the network controller, an application protectability index; and providing an application protectability scheme for protecting the application based on the application protectability index.
-
公开(公告)号:US20210320853A1
公开(公告)日:2021-10-14
申请号:US17355423
申请日:2021-06-23
Applicant: Cisco Technology, Inc.
Inventor: Ashutosh Kulshreshtha , Navindra Yadav , Khawar Deen , Jackson Pang , Supreeth Rao
Abstract: An application and network analytics platform can capture comprehensive telemetry from servers and network devices operating within a network. The platform can discover flows running through the network, applications generating the flows, servers hosting the applications, computing resources provisioned and consumed by the applications, and network topology, among other insights. The platform can generate various models relating one set of application and network performance metrics to another. For example, the platform can model application latency as a function of computing resources provisioned to and/or actually used by the application, its host's total resources, and/or the distance of its host relative to other elements of the network. The platform can change the model by moving, removing, or adding elements to predict how the change affects application and network performance. In some situations, the platform can automatically act on predictions to improve application and network performance.
-
公开(公告)号:US11128700B2
公开(公告)日:2021-09-21
申请号:US16024182
申请日:2018-06-29
Applicant: Cisco Technology, Inc.
Inventor: Supreeth Rao , Navindra Yadav , Umamaheswaran Arumugam , Michael Watts , Shashi Gandham , Darshan Shrinath Purandare , Duy Nguyen , Hai Vu , Kai Zhu , Aiyesha Ma , Tapan Shrikrishna Patwardhan , Jothi Prakash Prabakaran
IPC: G06F15/173 , H04L29/08 , H04L12/24 , H04L12/26
Abstract: Aspects of the disclosed technology provide methods for automatically tuning load-balancer configurations in a network environment. In some implementations, a process of the disclosed technology includes steps for collecting flow records of traffic flow segments at a middle box in a network environment, the traffic flow segments corresponding to one or more traffic flows passing through the middle box, analyzing the flow records to identify one or more traffic patterns in the network environment, and automatically updating a load balancer configuration based on the one or more traffic patterns, wherein updating the load balancer configuration improves at least one traffic flow parameter for at least one of the traffic flows passing through the middle box. Systems and machine-readable media are also provided.
-
公开(公告)号:US20210218638A1
公开(公告)日:2021-07-15
申请号:US17214674
申请日:2021-03-26
Applicant: Cisco Technology, Inc.
Inventor: Supreeth Rao , Navindra Yadav , Umamaheswaran Arumugam , Michael Watts , Shashi Gandham , Prasannakumar Jobigenahally Malleshaiah , Duy Nguyen , Hai Vu , Aiyesha Ma , Tapan Shrikrishna Patwardhan , Kai Zhu , Jothi Prakash Prabakaran
Abstract: Systems, methods, and computer-readable media for flow stitching network traffic flow segments at a middlebox in a network environment. In some embodiments, flow records of traffic flow segments at a middlebox in a network environment are collected. The flow records can include transaction identifiers assigned to the traffic flow segments. Sources and destinations of the traffic flow segments with respect to the middlebox can be identified using the flow records. Further, the traffic flow segments can be stitched together to form a plurality of stitched traffic flows at the middlebox based on the transaction identifiers and the sources and destinations of the traffic flow segments in the network environment with respect to the middlebox. A configuration of the middlebox operating in the network environment can be identified based on the stitched traffic flows at the middlebox in the network environment.
-
公开(公告)号:US11924240B2
公开(公告)日:2024-03-05
申请号:US17105409
申请日:2020-11-25
Applicant: Cisco Technology, Inc.
Inventor: Shashi Gandham , Navindra Yadav , Janardhanan Radhakrishnan , Hoang-Nam Nguyen , Umesh Paul Mahindra , Sunil Gupta , Praneeth Vallem , Supreeth Rao , Darshan Shrinath Purandare , Xuan Zou , Joseph Daniel Beshay , Jothi Prakash Prabakaran
CPC classification number: H04L63/1433 , G06F9/45558 , G06F21/53 , H04L41/0886 , H04L41/145 , H04L43/028 , H04L63/1425 , H04L63/1458 , G06F2009/45587 , G06F2009/45595
Abstract: Aspects of the subject technology relate to a system configured to receive a set of network snapshot segments from an output stream of a stream processing service, compile the set of network snapshot segments from the set of messages into a first network snapshot and a second network snapshot, and compare the first network snapshot and the second network snapshot to identify a difference between the first network snapshot and the second network snapshot.
-
公开(公告)号:US10999149B2
公开(公告)日:2021-05-04
申请号:US15985520
申请日:2018-05-21
Applicant: Cisco Technology, Inc.
Inventor: Supreeth Rao , Navindra Yadav , Umamaheswaran Arumugam , Michael Watts , Shashi Gandham , Prasannakumar Jobigenahally Malleshaiah , Duy Nguyen , Hai Vu , Aiyesha Ma , Tapan Shrikrishna Patwardhan , Kai Zhu , Jothi Prakash Prabakaran
Abstract: Systems, methods, and computer-readable media for flow stitching network traffic flow segments at a middlebox in a network environment. In some embodiments, flow records of traffic flow segments at a middlebox in a network environment are collected. The flow records can include transaction identifiers assigned to the traffic flow segments. Sources and destinations of the traffic flow segments with respect to the middlebox can be identified using the flow records. Further, the traffic flow segments can be stitched together to form a plurality of stitched traffic flows at the middlebox based on the transaction identifiers and the sources and destinations of the traffic flow segments in the network environment with respect to the middlebox. A configuration of the middlebox operating in the network environment can be identified based on the stitched traffic flows at the middlebox in the network environment.
-
公开(公告)号:US10917438B2
公开(公告)日:2021-02-09
申请号:US16032765
申请日:2018-07-11
Applicant: Cisco Technology, Inc.
Inventor: Shashi Gandham , Navindra Yadav , Janardhanan Radhakrishnan , Hoang-Nam Nguyen , Umesh Paul Mahindra , Sunil Gupta , Praneeth Vallem , Supreeth Rao , Darshan Shrinath Purandare , Xuan Zou , Girish Anant Kalele , Jothi Prakash Prabakaran
Abstract: Aspects of the disclosed technology relate to ways to authenticate customer/subscriber access to a policy update stream. A process of the technology can include steps for instantiating a network monitoring device in response to a request, the request comprising one or more configuration parameters for the network monitoring device, and receiving a first certificate from the network monitoring device, wherein the first certificate is based on the one or more configuration parameters. In some aspects, the steps can further include sending the first certificate to a processing pipeline for authentication, wherein the processing pipeline is configured to authenticate the first certificate based on a second certificate received by the processing pipeline from the network monitoring device. Systems and machine readable media are also provided.
-
-
-
-
-
-
-
-
-