-
公开(公告)号:US10142290B1
公开(公告)日:2018-11-27
申请号:US15085608
申请日:2016-03-30
Applicant: Amazon Technologies, Inc.
Abstract: Customers of a computing resource service provider may utilize computing resources of the computing resources service provided to implement one or more computer systems. Furthermore, the customer may cause a host-based firewall to be executed by the one or more computer systems. The host-based firewall may collect network traffic information. The customer may then be provided with the network traffic information and be prompted to provide decisions associated with the network traffic information. The decisions may be used to generate a set of rules which may be enforced by the host-based firewall.
-
公开(公告)号:US10148675B1
公开(公告)日:2018-12-04
申请号:US15085585
申请日:2016-03-30
Applicant: Amazon Technologies, Inc.
Abstract: A computing resource service provider may provide customers with a block-level forensics service. Volume images of computing resource associated with customer may be generated and provided to the block-level forensics service. The block-level forensics service or component thereof may generate a volume based at least in part on the volume image and may perform forensics analysis of the volume. A result of the forensic analysis may be provided to the customer.
-
公开(公告)号:US10079842B1
公开(公告)日:2018-09-18
申请号:US15085708
申请日:2016-03-30
Applicant: Amazon Technologies, Inc.
IPC: H04L29/06
CPC classification number: H04L63/1416 , G06F21/552 , G06F21/80 , H04L63/1425 , H04L63/1441
Abstract: A computing resource service provider may provide customers with a block-level forensics service. Logical volumes associated a customer may be used to instantiate computing resources provided by a computing resource service provide for use by the customer. The block-level forensics service or component thereof may monitor the logical volume based at least in part on a log generated as a result of the logical volume being implemented as a log-structured storage system. Operations to the log may be collected by the block-level forensics service and malicious activity may be detected based at least in part on operations to the log.
-
公开(公告)号:US09935937B1
公开(公告)日:2018-04-03
申请号:US14533395
申请日:2014-11-05
Applicant: Amazon Technologies, Inc.
Inventor: Nachiketh Rao Potlapally , Alexander Robin Gordon Lucas
CPC classification number: H04L63/0823 , H04L63/0853 , H04L63/20
Abstract: A method for implementing network security policies in a multi-tenant network environment may include receiving a request for implementation of at least one network security policy on one or more computing devices of a service provider cloud environment. The network security policy identified by the request may be retrieved. The network security policy may be encrypted using encrypting credentials of the one or more computing devices. Decrypting credentials corresponding to the encrypting credentials are stored in a Trusted Platform Module (TPM) within the one or more computing devices. The encrypted network security policy may be pushed to the one or more computing devices, for decryption and implementation at the one or more computing devices.
-
公开(公告)号:US11159554B2
公开(公告)日:2021-10-26
申请号:US16449280
申请日:2019-06-21
Applicant: Amazon Technologies, Inc.
IPC: H04L29/06
Abstract: Customers of a computing resource service provider may operate computing resources provided by the computing resource service provider. Operational information from customer operated computing resources may be correlated with operational information from computing resources operated by the computing resource service provider or other entities, and correlated threat information may be generated.
-
公开(公告)号:US10333962B1
公开(公告)日:2019-06-25
申请号:US15085554
申请日:2016-03-30
Applicant: Amazon Technologies, Inc.
Abstract: Customers of a computing resource service provider may operate one or more computing resources provided by the computing resource service provider. In addition, the customers may implement security applications and/or devices using the one or more computing resources provided by the computing resource service provider. Operational information from customer operated computing resources may be correlated with operational information from computing resources operated by the computing resource service provider or other entities and correlated threat information may be generated. Anomalous activity may be detected based at least in part on the correlated threat information.
-
公开(公告)号:US10320750B1
公开(公告)日:2019-06-11
申请号:US15085257
申请日:2016-03-30
Applicant: Amazon Technologies, Inc.
IPC: H04L29/06
Abstract: Customers of a computing resource service provider may operate one or more computing resources, provided by the computing resource service provider, within a virtual network. The customers may request network scans of the computing resources with the virtual network. Scanning packets may be generated and encapsulated to ensure delivery to an appropriate destination within the virtual network. The information in the scanning packet may appear to be generated by a source within the virtual network.
-
公开(公告)号:US10178119B1
公开(公告)日:2019-01-08
申请号:US15085271
申请日:2016-03-30
Applicant: Amazon Technologies, Inc.
Abstract: Customers of a computing resource service provider may operate one or more computing resource provided by the computing resource service provider. In addition, the customers may implement security applications and/or devices using the one or more computing resources provided by the computing resource service provider. Operational information from customer operated computing resources may be correlated with operational information from computing resources operated by the computing resource service provider or other entities and correlated threat information may be generated. Anomalous activity may be detected based at least in part on the correlated threat information.
-
-
-
-
-
-
-