INTERACTIVE HIERARCHICAL NETWORK CHORD DIAGRAM FOR APPLICATION DEPENDENCY MAPPING

    公开(公告)号:US20180270127A1

    公开(公告)日:2018-09-20

    申请号:US15972033

    申请日:2018-05-04

    Abstract: The technology visualizes data flows within a datacenter in an interactive hierarchical network chord diagram. Based on analyzed data describing data flows, a portion of the data flows that originate at the same first endpoint and terminate at the same second endpoint can be grouped. Subsequently, the dataflow monitoring system displays an interactive hierarchical network chord diagram to include a chord with a first endpoint and a second endpoint. The chord represents the grouped portion of data flows that originate at the same first endpoint and terminate at the same second endpoint. Upon receiving a selection of the chord or the first endpoint of the chord, the dataflow monitoring system expands the grouped portion of the data flows into a more granular representation of the network.

    Policy-driven compliance
    162.
    发明授权

    公开(公告)号:US10033766B2

    公开(公告)日:2018-07-24

    申请号:US15133155

    申请日:2016-04-19

    Abstract: A network can achieve compliance by defining and enforcing a set of network policies to secure protected electronic information. The network can monitor network data, host/endpoint data, process data, and user data for traffic using a sensor network that provides multiple perspectives. The sensor network can include sensors for networking devices, physical servers, hypervisors or shared kernels, virtual partitions, and other network components. The network can analyze the network data, host/endpoint data, process data, and user data to determine policies for traffic. The network can determine expected network actions based on the policies, such as allowing traffic, denying traffic, configuring traffic for quality of service (QoS), or redirecting traffic along a specific route. The network can update policy data based on the expected network actions and actual network actions. The policy data can be utilized for compliance.

    AUTOMATICALLY DETERMINING SENSOR LOCATION IN A VIRTUALIZED COMPUTING ENVIRONMENT
    165.
    发明申请
    AUTOMATICALLY DETERMINING SENSOR LOCATION IN A VIRTUALIZED COMPUTING ENVIRONMENT 有权
    在虚拟化计算环境中自动确定传感器位置

    公开(公告)号:US20170075710A1

    公开(公告)日:2017-03-16

    申请号:US14855811

    申请日:2015-09-16

    Abstract: Methods, systems, and computer readable media are provided for determining, in a virtualized network system, a relationship of a sensor relative to other sensors. In a virtualized computing system in which a plurality of software sensors are deployed and in which there are one or more traffic flows, captured network data is received from the plurality of sensors, the captured network data from a given sensor of the plurality of sensors indicating one or more traffic flows detected by the given sensor. The received captured network data is analyzed to identify, for each respective sensor, a first group of sensors, a second group of sensors, and a third group of sensors, wherein all traffic flows observed by the first group of sensors are also observed by the second group of sensors, and all traffic flows observed by the second group of sensors are also observed by the third group of sensors. For each respective sensor, a location of each respective sensor relative to other sensors within the virtualized computing system is determined based upon whether the respective sensor belongs to the first group of sensors, the second group of sensors, or the third group of sensors.

    Abstract translation: 提供了方法,系统和计算机可读介质,用于在虚拟化网络系统中确定传感器相对于其他传感器的关系。 在其中部署多个软件传感器并且其中存在一个或多个业务流的虚拟化计算系统中,从多个传感器接收捕获的网络数据,来自多个传感器中的给定传感器的所捕获的网络数据指示 由给定传感器检测到的一个或多个交通流量。 分析所接收的捕获的网络数据,以便为每个相应的传感器识别第一组传感器,第二组传感器和第三组传感器,其中由第一组传感器观察到的所有交通流也被 第二组传感器,第二组传感器观测到的所有交通流量也由第三组传感器观察到。 对于每个相应的传感器,基于各个传感器是否属于第一组传感器,第二组传感器或第三组传感器来确定每个相应传感器相对于虚拟化计算系统内的其它传感器的位置。

    SYSTEM AND METHOD OF DETECTING WHETHER A SOURCE OF A PACKET FLOW TRANSMITS PACKETS WHICH BYPASS AN OPERATING SYSTEM STACK
    170.
    发明申请
    SYSTEM AND METHOD OF DETECTING WHETHER A SOURCE OF A PACKET FLOW TRANSMITS PACKETS WHICH BYPASS AN OPERATING SYSTEM STACK 审中-公开
    检测分组流量传输的源的系统和方法除了操作系统堆栈之外的包

    公开(公告)号:US20160359890A1

    公开(公告)日:2016-12-08

    申请号:US15171879

    申请日:2016-06-02

    Abstract: A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed on a second host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that the second packet flow was transmitted by a component that bypassed an operating stack of the first host or a packet capture agent at the device to yield a determination, detecting that hidden network traffic exists, and predicting a malware issue with the first host based on the determination.

    Abstract translation: 一种方法包括使用部署在第一主机处的第一捕获代理捕获与来自第一主机的第一分组流相关联的第一数据,以产生第一流数据,从第二主捕获与第一主机起源的第二分组流相关联的第二数据 部署在第二主机上的捕获代理产生第二流数据并比较第一流数据和第二流数据以产生差异。 当所述差异高于阈值时,所述方法包括确定所述第二分组流由绕过所述设备的所述第一主机或分组捕获代理的操作堆栈的组件发送以产生确定,检测所述隐藏网络流量 存在并且基于该确定来预测与第一主机的恶意软件问题。

Patent Agency Ranking