Network telemetry collection with packet metadata filtering

    公开(公告)号:US11563771B2

    公开(公告)日:2023-01-24

    申请号:US16693885

    申请日:2019-11-25

    Abstract: In one embodiment, a telemetry exporter in a network establishes a tunnel between the telemetry exporter and a traffic analysis service. The telemetry exporter obtains packet copies of a plurality of packets sent between devices via the network. The telemetry exporter forms a set of traffic telemetry data by discarding at least a portion of one or more of the packet copies, based on a filter policy. The telemetry exporter applies compression to the formed set of traffic telemetry data. The telemetry exporter sends, via the tunnel, the compressed set of traffic telemetry data to the traffic analysis service for analysis.

    BINDING A TRUST ANCHOR AND AN ASIC
    72.
    发明申请

    公开(公告)号:US20220382866A1

    公开(公告)日:2022-12-01

    申请号:US17335156

    申请日:2021-06-01

    Abstract: According to certain embodiments, a method comprises performing a posture assessment at a trust anchor in order to determine whether a hardware component is authorized to run on a product. Performing the posture assessment comprises determining a random value (K), encrypting the random value (K) using a long-term key associated with the hardware component in order to yield an encrypted value, communicating the encrypted value to the hardware component, and determining whether the hardware component is authorized to run on the product based at least in part on whether the trust anchor receives, from the hardware component, a response encrypted using the random value (K). The method further comprises allowing or preventing the hardware component from running on the product based on whether the hardware component is authorized to run on the product.

    ENDPOINT-ASSISTED INSPECTION OF ENCRYPTED NETWORK TRAFFIC

    公开(公告)号:US20220239678A1

    公开(公告)日:2022-07-28

    申请号:US17722131

    申请日:2022-04-15

    Abstract: In one embodiment, a traffic inspection service executed by an intermediary device obtains, from a monitoring agent executed by an endpoint device, keying information for an encrypted traffic session between the endpoint device and a remote entity. The traffic inspection service provides a notification to the monitoring agent that acknowledges receipt of the keying information. The traffic inspection service uses the keying information to decrypt encrypted traffic from the encrypted traffic session. The traffic inspection service applies a policy to the encrypted traffic session between the endpoint device and the remote entity, based on the decrypted traffic from the session.

    IDENTIFYING AND USING DNS CONTEXTUAL FLOWS

    公开(公告)号:US20220210183A1

    公开(公告)日:2022-06-30

    申请号:US17696081

    申请日:2022-03-16

    Abstract: In one embodiment, a device in a network captures domain name system (DNS) response data from a DNS response sent by a DNS service to a client in the network. The device captures session data for an encrypted session of the client. The device makes a determination that the encrypted session is malicious by using the captured DNS response data and the captured session data as input to a machine learning-based or rule-based classifier. The device performs a mediation action in response to the determination that the encrypted session is malicious.

    VALIDATING A DEVICE CLASS CLAIM USING MACHINE LEARNING

    公开(公告)号:US20210297454A1

    公开(公告)日:2021-09-23

    申请号:US17330641

    申请日:2021-05-26

    Abstract: In one embodiment, a device in a network receives an access policy and a class behavioral model for a node in the network that are associated with a class asserted by the node. The device applies the access policy and class behavioral model to traffic associated with the node. The device identifies a deviation in a behavior of the node from the class behavioral model, based on the application of the class behavioral model to the traffic associated with the node. The device causes performance of a mitigation action in the network based on the identified deviation in the behavior of the node from the class behavioral model.

    Validating a device class claim using machine learning

    公开(公告)号:US11038893B2

    公开(公告)日:2021-06-15

    申请号:US15595016

    申请日:2017-05-15

    Abstract: In one embodiment, a device in a network receives an access policy and a class behavioral model for a node in the network that are associated with a class asserted by the node. The device applies the access policy and class behavioral model to traffic associated with the node. The device identifies a deviation in a behavior of the node from the class behavioral model, based on the application of the class behavioral model to the traffic associated with the node. The device causes performance of a mitigation action in the network based on the identified deviation in the behavior of the node from the class behavioral model.

Patent Agency Ranking