SYSTEMS AND METHODS FOR DETECTING VULNERABILITIES IN NETWORK PROCESSES DURING RUNTIME

    公开(公告)号:US20220070197A1

    公开(公告)日:2022-03-03

    申请号:US17003450

    申请日:2020-08-26

    Abstract: Systems, methods, and non-transitory computer-readable storage media are disclosed for detecting vulnerabilities in real-time during execution of a process or an application. In one example, a device may have one or more memories storing computer-readable instructions and one or more processors configured to execute the computer-readable instructions to obtain real-time process information associated with a process executing in an endpoint. The device can then determine package information for a package associated with the process based on the process information. The device can then identify at least one vulnerability associated with the package information using a database of vulnerabilities stored on a backend component of the network. The backend component may have a database of vulnerabilities for packages.

    AUTOMATICALLY DETERMINING SENSOR LOCATION IN A VIRTUALIZED COMPUTING ENVIRONMENT
    27.
    发明申请
    AUTOMATICALLY DETERMINING SENSOR LOCATION IN A VIRTUALIZED COMPUTING ENVIRONMENT 有权
    在虚拟化计算环境中自动确定传感器位置

    公开(公告)号:US20170075710A1

    公开(公告)日:2017-03-16

    申请号:US14855811

    申请日:2015-09-16

    Abstract: Methods, systems, and computer readable media are provided for determining, in a virtualized network system, a relationship of a sensor relative to other sensors. In a virtualized computing system in which a plurality of software sensors are deployed and in which there are one or more traffic flows, captured network data is received from the plurality of sensors, the captured network data from a given sensor of the plurality of sensors indicating one or more traffic flows detected by the given sensor. The received captured network data is analyzed to identify, for each respective sensor, a first group of sensors, a second group of sensors, and a third group of sensors, wherein all traffic flows observed by the first group of sensors are also observed by the second group of sensors, and all traffic flows observed by the second group of sensors are also observed by the third group of sensors. For each respective sensor, a location of each respective sensor relative to other sensors within the virtualized computing system is determined based upon whether the respective sensor belongs to the first group of sensors, the second group of sensors, or the third group of sensors.

    Abstract translation: 提供了方法,系统和计算机可读介质,用于在虚拟化网络系统中确定传感器相对于其他传感器的关系。 在其中部署多个软件传感器并且其中存在一个或多个业务流的虚拟化计算系统中,从多个传感器接收捕获的网络数据,来自多个传感器中的给定传感器的所捕获的网络数据指示 由给定传感器检测到的一个或多个交通流量。 分析所接收的捕获的网络数据,以便为每个相应的传感器识别第一组传感器,第二组传感器和第三组传感器,其中由第一组传感器观察到的所有交通流也被 第二组传感器,第二组传感器观测到的所有交通流量也由第三组传感器观察到。 对于每个相应的传感器,基于各个传感器是否属于第一组传感器,第二组传感器或第三组传感器来确定每个相应传感器相对于虚拟化计算系统内的其它传感器的位置。

    SYSTEM AND METHOD OF DETECTING WHETHER A SOURCE OF A PACKET FLOW TRANSMITS PACKETS WHICH BYPASS AN OPERATING SYSTEM STACK
    29.
    发明申请
    SYSTEM AND METHOD OF DETECTING WHETHER A SOURCE OF A PACKET FLOW TRANSMITS PACKETS WHICH BYPASS AN OPERATING SYSTEM STACK 审中-公开
    检测分组流量传输的源的系统和方法除了操作系统堆栈之外的包

    公开(公告)号:US20160359890A1

    公开(公告)日:2016-12-08

    申请号:US15171879

    申请日:2016-06-02

    Abstract: A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed on a second host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that the second packet flow was transmitted by a component that bypassed an operating stack of the first host or a packet capture agent at the device to yield a determination, detecting that hidden network traffic exists, and predicting a malware issue with the first host based on the determination.

    Abstract translation: 一种方法包括使用部署在第一主机处的第一捕获代理捕获与来自第一主机的第一分组流相关联的第一数据,以产生第一流数据,从第二主捕获与第一主机起源的第二分组流相关联的第二数据 部署在第二主机上的捕获代理产生第二流数据并比较第一流数据和第二流数据以产生差异。 当所述差异高于阈值时,所述方法包括确定所述第二分组流由绕过所述设备的所述第一主机或分组捕获代理的操作堆栈的组件发送以产生确定,检测所述隐藏网络流量 存在并且基于该确定来预测与第一主机的恶意软件问题。

Patent Agency Ranking