MITIGATING SECURITY THREATS IN DAISY CHAINED SERVERLESS FaaS FUNCTIONS

    公开(公告)号:US20230208855A1

    公开(公告)日:2023-06-29

    申请号:US17559164

    申请日:2021-12-22

    CPC classification number: H04L63/1416 H04L41/22 H04L63/1425 H04L63/1466

    Abstract: In one embodiment, a method comprises: receiving, by a process, an executed function flow of a daisy chained serverless function-as-a-service (FaaS) function, the executed function flow having been injected with a particular trace identifier in response to an initial event trigger and span identifiers having been injected by each service that was executed; generating, by the process, a serverless flow graph associated with the particular trace identifier based on linking a path of serverless functions according to correlation of the span identifiers between the serverless functions; performing, by the process, a trace-based analysis of the serverless flow graph through comparison to a baseline of expectation; detecting, by the process, one or more anomalies in the serverless flow graph according to the trace-based analysis; and mitigating, by the process, the one or more anomalies in the serverless flow graph.

    POLICY VALIDATION
    33.
    发明公开
    POLICY VALIDATION 审中-公开

    公开(公告)号:US20230145237A1

    公开(公告)日:2023-05-11

    申请号:US17522515

    申请日:2021-11-09

    CPC classification number: H04L45/24 G06N20/00 H04L45/02 H04L45/42 H04L45/123

    Abstract: This disclosure describes techniques for policy validation techniques relating to data traffic routing among network devices. The techniques may include processing a validation request from a controller. A validation request may include information related to a computed path for routing data traffic in a computing network. The processing may include sending one or more path requests to one or more redundant controllers, and comparing computed paths from the redundant controller(s) to the originally computed path. The techniques may include generating a validation response based on comparing the computed paths. In some examples, the techniques may further include determining a health score for the controller. Policy validation techniques may improve data traffic routing among network devices by helping to ensure valid policies are produced.

    METHODS AND APPARATUSES FOR CONTENT DELIVERY OVER MOBILE NETWORKS WITH MULTI-ACCESS EDGE COMPUTING (MEC) CONTROL AND USER PLANE SEPARATION (CUPS)

    公开(公告)号:US20210352157A1

    公开(公告)日:2021-11-11

    申请号:US17339298

    申请日:2021-06-04

    Abstract: A method is performed at a mobile core, including assigning a first cache servicing a client device in response to a first request for a media content item based at least in part on a first IP address of the client device associated with a first edge location. The method further includes providing a first portion of the media content item from the first cache. The method additionally includes triggering a plurality of caches at edge locations proximate to the first edge location to retrieve a second portion of the media content item. The method also includes receiving a continuation request from the client device with a second IP address associated with a second edge location. The method further includes selecting a second cache from the plurality of caches based at least in part on the second IP address and continuing providing the media content item from the second cache.

    MULTICAST DISTRIBUTION TREE ALLOCATION USING MACHINE LEARNING

    公开(公告)号:US20210351954A1

    公开(公告)日:2021-11-11

    申请号:US16871827

    申请日:2020-05-11

    Abstract: In one embodiment, a device deploys a first machine learning model to an inference location in a network. The first machine learning model is used at the inference location to make inferences about the network. The device receives, from the inference location, an indication that the first machine learning model is exhibiting poor performance. The device identifies a corrective measure for the poor performance that minimizes resource consumption by a model training pipeline of the device. The device deploys, based on the corrective measure, a second machine learning model to the inference location. The second machine learning model is used in lieu of the first machine learning model to make the inferences about the network.

    Stateless policy and service chaining in neutral host network

    公开(公告)号:US10951578B1

    公开(公告)日:2021-03-16

    申请号:US16743073

    申请日:2020-01-15

    Abstract: Presented herein are techniques that provide for a way to associate a policy, or signal the policy for a user equipment (UE), directly from the UE traffic, inband or, in other words, within the data plane. The policies are effectively embedded in the address of the UE traffic. When the Neutral Host Network (NHN) receives the UE traffic, the policy can be determined directly from the address associated with the UE traffic. This provides for a unique way of integrating a service chain identifier in the Internet Protocol address of the UE to identify the services/policies to be applied to UE traffic in a stateless manner.

    System and method for obtaining micro-service telemetry data

    公开(公告)号:US10541893B2

    公开(公告)日:2020-01-21

    申请号:US15793557

    申请日:2017-10-25

    Abstract: Systems, methods, and computer-readable media are disclosed for use of an overlay network termination endpoint as a proxy to collect telemetry data for micro-services or specific applications provided by containers in overlay data centers. In one aspect of the present disclosure, a method includes receiving, at a controller, a probe for flow statistics associated with a service path, the probe including corresponding flow identification information, extracting the corresponding flow identification information from the probe, obtaining the flow statistics from an agent based on the flow identification information, the agent being configured to manage a plurality of containers, generating a response packet including the flow statistics obtained from the agent and sending the response packet to an initiator from which the query is received.

Patent Agency Ranking