Systems and Methods for Preventing Solicited-Node Multicast Address Collisions

    公开(公告)号:US20250141708A1

    公开(公告)日:2025-05-01

    申请号:US19008097

    申请日:2025-01-02

    Abstract: A method includes receiving, at a first edge node, an Internet Protocol (IP) multicast address of a first silent host node. The method further includes receiving, at a second edge node, an IP multicast address of a second silent host node. The IP multicast address of the first silent host node is equal to the IP multicast address of the second silent host node. The method further includes storing the IP multicast address of the first and second silent host node in a shared entry of a routing table. The method further includes receiving, at a third edge node, a packet from a third host node and determining that a destination address of the packet corresponds to the IP multicast address stored in the shared entry of the routing table. The method further includes sending the packet to both the first host node and the second host node.

    Deploying just in time (JIT) deceptions at scale in networks

    公开(公告)号:US12289342B2

    公开(公告)日:2025-04-29

    申请号:US18122074

    申请日:2023-03-15

    Inventor: Vincent E. Parla

    Abstract: Techniques for utilizing a deception service to deploy deceptions at scale in a network, such as, for example, a client network. The deception service may be configured to generate a small number (e.g., 5, 10, 15, etc.) of deceptions of hosts and/or services associated with the network (or emulations of the hosts/services and/or emulations of protocols associated with the hosts/services) and deploy them to a number of deception host computing devices that cover all of the components and/or technologies found in the network. The deception service may map a large number (e.g., 1000, 100,000, 1,000,000, etc.) of IP addresses available in the network to the deceptions, making it appear as though a large number of deceptions exist, when in reality the IP addresses map back to a small number of deceptions. The deception service may assign/unassign IP addresses to and/or from deceptions and/or actual hosts in the network as needed.

    TECHNIQUES TO FACILITATE NETWORK SLICE SERVICE CONTINUITY FOR MOBILE NETWORK ENVIRONMENTS

    公开(公告)号:US20250133527A1

    公开(公告)日:2025-04-24

    申请号:US18490247

    申请日:2023-10-19

    Abstract: Provided herein are techniques to facilitate network slice service continuity in a mobile network environment. In one example, a method may include for a registration request involving a user equipment (UE), obtaining, by an Access and Mobility Management Function (AMF), subscription information identifying primary network slices backup network slices to which the UE is subscribed in which each of the primary network slices and the backup network slices are active network slices capable of actively handling sessions for multiple UEs. The method may further include determining whether there is registration capacity for the UE with each of the network slices with which the UE is allowed registration. Based on the determining that there is registration capacity for registration of the UE, the AMF can transmit a registration response to the UE that indicating registration with the first primary network slice and the first backup network slice is accepted.

    LABEL-BASED DATA GOVERNANCE ENFORCEMENT FOR DECENTRALIZED SYSTEMS

    公开(公告)号:US20250133115A1

    公开(公告)日:2025-04-24

    申请号:US18381289

    申请日:2023-10-18

    Abstract: In one embodiment, a sidecar proxy executed by a device extracts label information from input data for input to a microservice associated with the sidecar proxy indicative of a lineage of the input data. The sidecar proxy makes, based on the label information, a determination as to whether the microservice processing the input data would violate a data governance policy. The sidecar proxy provides, based on the determination, the input data to the microservice. The sidecar proxy tags output data generated by the microservice with appended label information that includes the label information extracted from the input data and an indication of a data transformation performed by the microservice to the input data to form the output data.

    FIREWALLS AUTOMATIC RULES CREATION FROM STEALTHWATCH DATA

    公开(公告)号:US20250133061A1

    公开(公告)日:2025-04-24

    申请号:US18493026

    申请日:2023-10-24

    Abstract: In one aspect, a method for automated creation and management of firewall rules in a network environment, includes obtaining network traffic patterns including data exported from one or more network appliances in the network environment, where the data includes a plurality of network identifiers, automatically generating a first set of firewall rules based on a source and destination of each network identifier, automatically generating a second set of firewall rules based on firewall data including a source and destination of address, and generating a revised set of firewall rules based on the first set of firewall rules and the second set of firewall rules, where the revised set of firewall rules is also based on a detection of a number of times at least one of the second set of rules is invoked at the firewall.

    HYBRID EXECUTION OF CUSTOM PLAYBOOK CODEBLOCKS

    公开(公告)号:US20250132993A1

    公开(公告)日:2025-04-24

    申请号:US19001194

    申请日:2024-12-24

    Abstract: Techniques are described for enabling a cloud-based IT and security operations application to execute playbooks containing custom code in a manner that mitigates types of risk related to the misuse of cloud-based resources and security of user data. Users use a client application to create and modify playbooks and, upon receiving input to save a playbook, the client application determines whether the playbook includes custom code. If the client application determines that the playbook includes custom code, the client application establishes a connection with a proxy application (also referred to as an “automation broker”) running in the user's own on-premises network and sends a representation of the playbook to the proxy application. The client application further sends to the IT and security operations application an identifier of the playbook and an indication that the playbook (or the custom code portions of the playbook) is stored within the user's on-premises network.

    TELEMETRY-BASED MACHINE LEARNING OF INTER-NETWORK

    公开(公告)号:US20250131241A1

    公开(公告)日:2025-04-24

    申请号:US18493728

    申请日:2023-10-24

    Abstract: Methods and devices provide machine learning of mappings between test script endpoints and network configuration and state differences described according to YANG models. Such machine learning is implemented in a network environment by a training workflow and a production workflow, each implemented across a network device and a machine learning computing system, and each utilizing a learning model which includes an encoder-decoder architecture. The learning model is trained on training datasets which include mappings of executable endpoints to YANG model differences, generated by telemetry capture in network environments to generate training datasets.

    DECENTRALIZED DATA PROVENANCE AND LINEAGE TRACKING

    公开(公告)号:US20250130983A1

    公开(公告)日:2025-04-24

    申请号:US18381279

    申请日:2023-10-18

    Abstract: In one embodiment, a device executing a first portion of a distributed application extracts label information from sensor data sent to the device by a sensor that indicates the sensor as a source of the sensor data and one or more data governance policies applicable to the sensor data. The device performs, based on the label information, a first data transformation of the distributed application on the sensor data using stored data, to form transformed data. The device forms combined label information for the transformed data by appending the label information with additional label information associated with the stored data and adding an indication of the first data transformation. The device provides the transformed data and combined label information to a remote device executing another portion of the distributed application.

Patent Agency Ranking