Lightweight distributed application security through programmable extraction of dynamic metadata

    公开(公告)号:US11412000B2

    公开(公告)日:2022-08-09

    申请号:US16741794

    申请日:2020-01-14

    Abstract: Presented herein are methodologies for implementing application security. A method includes generating an extraction vector based on a plurality of application security rules to be enforced, transmitting the extraction vector to a first agent operating on a first network device and to a second agent operating on a second network device; receiving, separately, from the first agent and from the second agent, first metadata generated by the first agent and second metadata generated by the second agent by the agents applying the extraction vector to network traffic passing, respectively, through the first network device and the second network device. The first metadata includes a transaction ID assigned by the first agent, and the second metadata includes the same transaction ID. The method further includes correlating the first metadata with the second metadata based on the transaction ID to construct a transactional service graph for the network traffic.

    Network policy architecture
    5.
    发明授权

    公开(公告)号:US11233742B2

    公开(公告)日:2022-01-25

    申请号:US16674693

    申请日:2019-11-05

    Abstract: One or more lower-level attributes of a first network policy are translated to one or more higher-level attributes of the first network policy, and one or more lower-level attributes of a second network policy are translated to one or more higher-level attributes of the second network policy. The first network policy controls how first network traffic is handled, and the second network policy controls how second network traffic is handled. The one or more higher-level attributes of the first network policy are compared with the one or more higher-level attributes of the second network policy. Based on the comparing, it is determined whether the first network traffic and the second network traffic are handled in a functionally equivalent manner. If not, the first network policy is dynamically updated to generate an updated first network policy that causes the first network traffic to be handled in the functionally equivalent manner.

    Hierarchical activation of scripts for detecting a security threat to a network using a programmable data plane

    公开(公告)号:US11095670B2

    公开(公告)日:2021-08-17

    申请号:US16030116

    申请日:2018-07-09

    Abstract: In one example embodiment, a network management device generates a first script defining a first function for detecting a first customizable network event in a sequence of customizable network events indicative of a security threat to a network. The network management device activates the first script at a first network device in the network so as to cause the first network device to execute the first function for detecting the first customizable network event, and obtains, from the first network device, one or more indications that the first network device has detected the first customizable network event. Based on the one or more indications, the network management device determines whether to activate a second script defining a second function for detecting a second customizable network event in the sequence at a second network device in the network capable of detecting the second customizable network event.

    HIERARCHICAL ACTIVATION OF SCRIPTS FOR DETECTING A SECURITY THREAT TO A NETWORK USING A PROGRAMMABLE DATA PLANE

    公开(公告)号:US20200014713A1

    公开(公告)日:2020-01-09

    申请号:US16030116

    申请日:2018-07-09

    Abstract: In one example embodiment, a network management device generates a first script defining a first function for detecting a first customizable network event in a sequence of customizable network events indicative of a security threat to a network. The network management device activates the first script at a first network device in the network so as to cause the first network device to execute the first function for detecting the first customizable network event, and obtains, from the first network device, one or more indications that the first network device has detected the first customizable network event. Based on the one or more indications, the network management device determines whether to activate a second script defining a second function for detecting a second customizable network event in the sequence at a second network device in the network capable of detecting the second customizable network event.

    HIERARCHICAL ACTIVATION OF BEHAVIORAL MODULES ON A DATA PLANE FOR BEHAVIORAL ANALYTICS

    公开(公告)号:US20190260776A1

    公开(公告)日:2019-08-22

    申请号:US15898915

    申请日:2018-02-19

    Abstract: In one embodiment, a centralized controller maintains a plurality of hierarchical behavioral modules of a behavioral model, and distributes initial behavioral modules to data plane entities to cause them to apply the initial behavioral modules to data plane traffic. The centralized controller may then receive data from a particular data plane entity based on its having applied the initial behavioral modules to its data plane traffic. The centralized controller then distributes subsequent behavioral modules to the particular data plane entity to cause it to apply the subsequent behavioral modules to the data plane traffic, the subsequent behavioral modules selected based on the previously received data from the particular data plane entity. The centralized controller may then iteratively receive data from the particular data plane entity and distribute subsequently selected behavioral modules until an attack determination is made on the data plane traffic of the particular data plane entity.

    Adaptive bitrate modification of a manifest file

    公开(公告)号:US09923771B2

    公开(公告)日:2018-03-20

    申请号:US14156124

    申请日:2014-01-15

    Abstract: A system includes a media optimizer that adaptively generates and transmits a modified manifest file based on an original manifest file corresponding to an associated media asset from a content provider in response to a media content request from a client for the associated media asset. The original manifest file specifies bitrates. The media optimizer extracts parameters associated with the media content request and applies bitrate policies based on the extracted parameters to adaptively modify the original manifest file to generate the modified manifest file. The media optimizer is further configured to transmit the modified manifest file to the client for selection by the client of a bitrate associated with delivery of the associated media asset.

Patent Agency Ranking