-
公开(公告)号:US11765046B1
公开(公告)日:2023-09-19
申请号:US16188979
申请日:2018-11-13
Applicant: Cisco Technology, Inc.
Inventor: Weifei Zeng , Omid Madani , Varun Malhotra , Paul Mach , Yash Vipul Doshi , Sayeed Mohammed Tasnim , Thanh Nhan Thi Nguyen , Navindra Yadav , Shashi Gandham
IPC: H04L41/16 , H04L41/0893 , G06N20/00 , G06F16/9532
CPC classification number: H04L41/16 , G06F16/9532 , G06N20/00 , H04L41/0893
Abstract: This disclosure provides solutions for automatically grouping network devices (e.g., endpoints) into clusters based on device characteristics. In some aspects, the disclosed technology also provides solutions for generating user selectable queries based on cluster characteristics. A process of the disclosed technology can include steps for identifying one or more device characteristics associated with a first network device, identifying one or more cluster characteristics for each of a first cluster and a second cluster, and comparing the device characteristics associated with the first network device with the one or more cluster characteristics for the first cluster and the second cluster. The process can further include steps for adding the first network device to the first cluster based on the cluster characteristics for the first cluster and the device characteristics for the first network device. Systems and machine-readable media are also provided.
-
公开(公告)号:US20220006842A1
公开(公告)日:2022-01-06
申请号:US16921184
申请日:2020-07-06
Applicant: Cisco Technology, Inc.
Inventor: Alok Lalit Wadhwa , James Gabriel Fontenot , Ashutosh Kulshreshtha , Navindra Yadav , Shashidhar Gandham , Weifei Zeng
IPC: H04L29/06
Abstract: Disclosed herein are methods, systems, and non-transitory computer-readable storage media for scoring network segmentation policies in order to determine their effectiveness before, during and after enforcement. In one aspect, a method includes identifying one or more applications within an enterprise network; identifying at least one network security policy in association with the one or more applications within the enterprise network; determining a score of the network security policy based on information corresponding to exposure of each of the one or more applications within the enterprise network; and executing the network security policy based on the score
-
公开(公告)号:US20220109701A1
公开(公告)日:2022-04-07
申请号:US17063864
申请日:2020-10-06
Applicant: Cisco Technology, Inc.
Inventor: Weifei Zeng , Sai Ankith Averineni , Omid Madani , Paul Mach , Yash Vipul Doshi , Sasidhar Evuru , Sayeed Mohammed Tasnim , Sameer Salim Mahomed Ali Ladiwala , Chakradhar Reddy Vangeti , Thanh Nhan Nguyen , Varun Malhotra , Shashidhar Gandham , Navindra Yadav , Thanh Trung Ngo , Maxwell Aaron Mechanic
IPC: H04L29/06 , H04L12/851 , H04L12/24
Abstract: The present disclosure relates to methods, systems, and non-transitory computer readable media for discovering policy scopes within an enterprise network and managing network policies for discovered policy scopes. In one aspect, a method includes identifying one or more communities of devices in an enterprise network; defining, from the one or more communities of devices, policy scopes in the enterprise network; generating a hierarchical representation of the policy scopes; identifying, based on the hierarchical representation of the policy scopes, one or more policies governing traffic flow between devices associated with each of the policy scopes; and managing application of the one or more policies at the devices.
-
公开(公告)号:US20180278498A1
公开(公告)日:2018-09-27
申请号:US15467814
申请日:2017-03-23
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Weifei Zeng , Ali Parandehgheibi , Vimal Jeyakumar , Omid Madani , Navindra Yadav
IPC: H04L12/26
CPC classification number: H04L43/045 , H04L43/026 , H04L43/08
Abstract: A application and network analytics platform can capture telemetry (e.g., flow data, server data, process data, user data, policy data, etc.) within a network. The application and network analytics platform can determine flows between servers (physical and virtual servers), server configuration information, and the processes that generated the flows from the telemetry. The application and network analytics platform can compute feature vectors for the processes. The application and network analytics platform can utilize the feature vectors to assess various degrees of functional similarity among the processes. These relationships can form a hierarchical graph providing different application perspectives, from a coarse representation in which the entire data center can be a “root application” to a fine representation in which it may be possible to view the individual processes running on each server.
-
公开(公告)号:US11627166B2
公开(公告)日:2023-04-11
申请号:US17063864
申请日:2020-10-06
Applicant: Cisco Technology, Inc.
Inventor: Weifei Zeng , Sai Ankith Averineni , Omid Madani , Paul Mach , Yash Vipul Doshi , Sasidhar Evuru , Sayeed Mohammed Tasnim , Sameer Salim Mahomed Ali Ladiwala , Chakradhar Reddy Vangeti , Thanh Nhan Nguyen , Varun Malhotra , Shashidhar Gandham , Navindra Yadav , Thanh Trung Ngo , Maxwell Aaron Mechanic
IPC: H04L9/40 , H04L41/0893 , H04L41/14 , H04L47/2483
Abstract: The present disclosure relates to methods, systems, and non-transitory computer readable media for discovering policy scopes within an enterprise network and managing network policies for discovered policy scopes. In one aspect, a method includes identifying one or more communities of devices in an enterprise network; defining, from the one or more communities of devices, policy scopes in the enterprise network; generating a hierarchical representation of the policy scopes; identifying, based on the hierarchical representation of the policy scopes, one or more policies governing traffic flow between devices associated with each of the policy scopes; and managing application of the one or more policies at the devices.
-
公开(公告)号:US11463483B2
公开(公告)日:2022-10-04
申请号:US16921184
申请日:2020-07-06
Applicant: Cisco Technology, Inc.
Inventor: Alok Lalit Wadhwa , James Gabriel Fontenot , Ashutosh Kulshreshtha , Navindra Yadav , Shashidhar Gandham , Weifei Zeng
Abstract: Disclosed herein are methods, systems, and non-transitory computer-readable storage media for scoring network segmentation policies in order to determine their effectiveness before, during and after enforcement. In one aspect, a method includes identifying one or more applications within an enterprise network; identifying at least one network security policy in association with the one or more applications within the enterprise network; determining a score of the network security policy based on information corresponding to exposure of each of the one or more applications within the enterprise network; and executing the network security policy based on the score.
-
-
-
-
-