Interactive hierarchical network chord diagram for application dependency mapping

    公开(公告)号:US10797970B2

    公开(公告)日:2020-10-06

    申请号:US15972033

    申请日:2018-05-04

    Abstract: The technology visualizes data flows within a datacenter in an interactive hierarchical network chord diagram. Based on analyzed data describing data flows, a portion of the data flows that originate at the same first endpoint and terminate at the same second endpoint can be grouped. Subsequently, the dataflow monitoring system displays an interactive hierarchical network chord diagram to include a chord with a first endpoint and a second endpoint. The chord represents the grouped portion of data flows that originate at the same first endpoint and terminate at the same second endpoint. Upon receiving a selection of the chord or the first endpoint of the chord, the dataflow monitoring system expands the grouped portion of the data flows into a more granular representation of the network.

    NETWORK INTRUSION COUNTER-INTELLIGENCE
    229.
    发明申请

    公开(公告)号:US20190207976A1

    公开(公告)日:2019-07-04

    申请号:US15862363

    申请日:2018-01-04

    CPC classification number: H04L63/1491 H04L63/102 H04L63/1425 H04L63/20

    Abstract: Systems, methods, and computer-readable media for gathering network intrusion counter-intelligence. A system can maintain a decoy network environment at one or more machines. The system can identify a malicious user accessing network services through the network environment. Further, the system can receive network service access requests from the user at one or more machines in the network environment and subsequently direct the network service access requests from the malicious user to the decoy network environment based on an identification of the malicious user. The network services access requests can be satisfied with network service access responses generated in the decoy network environment. Subsequently, the system can maintain malicious user analytics based on the network service access requests of the malicious user that are directed to the decoy network environment.

Patent Agency Ranking