End-to-end policy management for a chain of administrative domains

    公开(公告)号:US10419446B2

    公开(公告)日:2019-09-17

    申请号:US15644982

    申请日:2017-07-10

    IPC分类号: H04L29/06 H04L29/08 H04L12/24

    摘要: Managing policies for a chain of administrative domains, from end-to-end, includes receiving, at a network device associated with an administrative domain that is part of a chain of administrative domains provisioning an Internet-based application or an Internet-based service to a network, a root block for a blockchain. The root block is generated by a network device in the network and includes a request for a specific network parameter over a specific time period. The network device associated with the administrative domain appends a first block to the blockchain including the root block to accept the request and configures the administrative domain in accordance with the specific network parameter when an end-to-end path in the chain of administrative domains accepts the request. The network device associated with the administrative domain also generates blockchain transactions that append network status updates to the blockchain during the specific time period.

    Identity based domain name system (DNS) caching with security as a service (SecaaS)

    公开(公告)号:US10305934B2

    公开(公告)日:2019-05-28

    申请号:US15165032

    申请日:2016-05-26

    IPC分类号: H04L29/06 H04L29/08 H04L29/12

    摘要: A local network element on an enterprise network caches Domain Name System (DNS) responses in association with user identifiers in accordance with a DNS-based access control policy. The network element receives a DNS request from a first endpoint device. The DNS request includes a domain name to resolve. The network element forwards the DNS request to a domain name server along with a first user identifier associated with the first endpoint device. The network element receives a DNS response from the domain name server. The DNS response includes a network address associated with the domain name, as well as the first user identifier and at least one other user identifier. The network element stores the network address in a DNS cache as a cached DNS response for the domain name. The cached DNS response is stored in association with the first user identifier and the other user identifier(s).

    SHARING NETWORK SECURITY THREAT INFORMATION USING A BLOCKCHAIN NETWORK

    公开(公告)号:US20190109717A1

    公开(公告)日:2019-04-11

    申请号:US15728208

    申请日:2017-10-09

    IPC分类号: H04L9/32 H04L9/06 H04L29/06

    摘要: In an example embodiment, a validating peer of a plurality of validating peers in a blockchain network receives, from a non-validating peer, a request to create a root block of a blockchain. The root block includes information related to a potential computer security threat. The validating peer creates the root block with a root block pending validation status. The validating peer shares, with other validating peers of the plurality of validating peers, a notification of the root block with the root block pending validation status to provide an indication of the information. The validating peer determines whether the information is authentic. If the information is determined to be authentic, the validating peer changes the root block pending validation status to a root block authenticated validation status and shares, with the other validating peers, a notification of the root block authenticated validation status to indicate that the information is authentic.

    DISTRIBUTED DENIAL OF SERVICE MITIGATION FOR WEB CONFERENCING

    公开(公告)号:US20190020678A1

    公开(公告)日:2019-01-17

    申请号:US15646429

    申请日:2017-07-11

    IPC分类号: H04L29/06 H04L9/32

    摘要: A web conferencing operator can enable participants to share multimedia content in real-time despite one or more of the participants operating from behind a middlebox via network address translation (NAT) traversal protocols and tools, such as STUN, TURN, and/or ICE. In NAT traversal, participants share a transport addresses that the participants can use to establish a joint media session. However, connectivity checks during NAT traversal can expose a media distribution device hosted by the web conferencing operator to various vulnerabilities, such as distributed denial of service (DDoS) attacks. The web conferencing operator can minimize the effects of a DDoS attack during the connectivity checks at scale and without significant performance degradation by configuring the middlebox to validate incoming requests for the connectivity checks without persistent signaling between the web conference operator and the middlebox.

    Leveraging security as a service for cloud-based file sharing

    公开(公告)号:US10135826B2

    公开(公告)日:2018-11-20

    申请号:US14845505

    申请日:2015-09-04

    IPC分类号: G06F21/56 H04L29/06 H04L29/08

    摘要: A method of leveraging security-as-a-service for cloud-based file sharing includes receiving, at a cloud-based file sharing server external to an enterprise network and having connectivity to the enterprise network, instructions from an enterprise network to validate a file uploaded by a first user associated with the enterprise network before allowing the file to be downloaded. The file sharing server may then receive the file from the first user and forward the file to a cloud-based security-as-a-service (SECaaS) server that is also external to the enterprise network and has connectivity to the enterprise network. The file sharing server receives a determination of validation from the cloud-based SECaaS server and allows a second user to download the file based on the determination. To make the determination, the SECaaS server retrieves cryptographic keying material from a cloud-based key management server, and decrypts the file.

    IDENTITY BASED DOMAIN NAME SYSTEM (DNS) CACHING WITH SECURITY AS A SERVICE (SECAAS)

    公开(公告)号:US20170346855A1

    公开(公告)日:2017-11-30

    申请号:US15165032

    申请日:2016-05-26

    IPC分类号: H04L29/06 H04L29/12 H04L29/08

    摘要: A local network element on an enterprise network caches Domain Name System (DNS) responses in association with user identifiers in accordance with a DNS-based access control policy. The network element receives a DNS request from a first endpoint device. The DNS request includes a domain name to resolve. The network element forwards the DNS request to a domain name server along with a first user identifier associated with the first endpoint device. The network element receives a DNS response from the domain name server. The DNS response includes a network address associated with the domain name, as well as the first user identifier and at least one other user identifier. The network element stores the network address in a DNS cache as a cached DNS response for the domain name. The cached DNS response is stored in association with the first user identifier and the other user identifier(s).