-
公开(公告)号:US11570213B2
公开(公告)日:2023-01-31
申请号:US16788999
申请日:2020-02-12
Applicant: Cisco Technology, Inc.
Inventor: Jianxin Wang , Nancy Cam-Winget , Donovan O'Hara , Richard Lee Barnes, II
IPC: H04L9/40
Abstract: A non-transitory computer readable medium comprising instructions stored thereon, the instructions effective to cause at least one processor to: establish trustworthiness of an application installed on a endpoint, the established trustworthiness is sufficient for an enterprise security infrastructure to treat the application installed on the endpoint and the endpoint as a trusted application and a trusted endpoint; negotiate with the trusted endpoint to determine a traffic inspection method for traffic flows originating at the trusted application that is destined for a service, the traffic inspection method is determined based on at least the trusted application, and the service; and instruct the trusted application of the determined traffic inspection method.
-
2.
公开(公告)号:US20210218771A1
公开(公告)日:2021-07-15
申请号:US16741794
申请日:2020-01-14
Applicant: Cisco Technology, Inc.
Inventor: Michel Khouderchah , Jayaraman Iyer , Kent K. Leung , Jianxin Wang , Donovan O'Hara , Saman Taghavi Zargar , Subharthi Paul
Abstract: Presented herein are methodologies for implementing application security. A method includes generating an extraction vector based on a plurality of application security rules to be enforced, transmitting the extraction vector to a first agent operating on a first network device and to a second agent operating on a second network device; receiving, separately, from the first agent and from the second agent, first metadata generated by the first agent and second metadata generated by the second agent by the agents applying the extraction vector to network traffic passing, respectively, through the first network device and the second network device. The first metadata includes a transaction ID assigned by the first agent, and the second metadata includes the same transaction ID. The method further includes correlating the first metadata with the second metadata based on the transaction ID to construct a transactional service graph for the network traffic.
-
公开(公告)号:US10305928B2
公开(公告)日:2019-05-28
申请号:US14820265
申请日:2015-08-06
Applicant: Cisco Technology, Inc.
Inventor: David McGrew , Andrew Zawadowskiy , Donovan O'Hara , Saravanan Radhakrishnan , Tomas Pevny , Daniel G. Wing
IPC: H04L29/06
Abstract: A method comprises receiving, at a network infrastructure device, a flow of packets, determining, using the network infrastructure device and for a first subset of the packets, that the first subset corresponds to a first datagram and determining a first length of the first datagram, determining, using the network infrastructure device and for a second subset of the packets, that the second subset corresponds to a second datagram that was received after the first datagram, and determining a second length of the second datagram, determining, using the network infrastructure device, a duration value between a first arrival time of the first datagram and a second arrival time of the second datagram, sending, to a collector device that is separate from the network infrastructure device, the first length, the second length, and the duration value for analysis.
-
公开(公告)号:US11057420B2
公开(公告)日:2021-07-06
申请号:US16370853
申请日:2019-03-29
Applicant: Cisco Technology, Inc.
Inventor: David McGrew , Andrew Zawadowskiy , Donovan O'Hara , Saravanan Radhakrishnan , Tomas Pevny , Daniel G. Wing
IPC: H04L29/06
Abstract: A method comprises receiving, at a network infrastructure device, a flow of packets, determining, using the network infrastructure device and for a first subset of the packets, that the first subset corresponds to a first datagram and determining a first length of the first datagram, determining, using the network infrastructure device and for a second subset of the packets, that the second subset corresponds to a second datagram that was received after the first datagram, and determining a second length of the second datagram, determining, using the network infrastructure device, a duration value between a first arrival time of the first datagram and a second arrival time of the second datagram, sending, to a collector device that is separate from the network infrastructure device, the first length, the second length, and the duration value for analysis.
-
公开(公告)号:US10187414B2
公开(公告)日:2019-01-22
申请号:US15214905
申请日:2016-07-20
Applicant: Cisco Technology, Inc.
Inventor: Vincent E. Parla , Andrey Zawadowskiy , Donovan O'Hara
IPC: H04L29/06
Abstract: A method is disclosed in which a system compares a first set of reports characterizing network traffic flows originating from an endpoint device with a second set of reports characterizing network traffic flows originating from the endpoint device and stored at an external network device to determine whether the first set and second set of reports characterizing network traffic flows originating from an endpoint device are different. In response to determining that the first and second reports characterizing network traffic flows are different, the system identifies the network traffic flows originating from the endpoint device and reported by an external network device, but not reported by the endpoint device, as possibly indicative of malware and forwards the network traffic flows originating from the endpoint device to an analyzer for further processing. Thus, an observed difference between network traffic flows originating from an endpoint device and stored at the endpoint device and network traffic flows originating from the endpoint device and stored on an external network device are compared to detect the presence of malware residing on the endpoint device.
-
公开(公告)号:US20150326486A1
公开(公告)日:2015-11-12
申请号:US14274220
申请日:2014-05-09
Applicant: Cisco Technology, Inc.
Inventor: Andrew Zawadowskiy , Vincent E. Parla , Donovan O'Hara
IPC: H04L12/805 , H04L12/26
CPC classification number: H04L12/6418 , H04L43/026 , H04L43/0876 , H04L47/36
Abstract: In one embodiment, a method is provided for improving data center and endpoint network visibility and security. The method comprises detecting a communication flow of a plurality of packets over a network, and generating a flow identifier that uniquely identifies the communication flow. After determining an application associated with the communication flow, a flow record is generated. The flow record includes the flow identifier and an indication of the application associated with the communication flow. The indication of the application may be, for example, a hash of the application binary file.
Abstract translation: 在一个实施例中,提供了一种用于改进数据中心和端点网络可见性和安全性的方法。 该方法包括通过网络检测多个分组的通信流,并且生成唯一地标识通信流的流标识符。 在确定与通信流相关联的应用之后,生成流记录。 流记录包括流标识符和与通信流相关联的应用的指示。 应用程序的指示可以是例如应用程序二进制文件的散列。
-
公开(公告)号:US11700275B2
公开(公告)日:2023-07-11
申请号:US17360910
申请日:2021-06-28
Applicant: Cisco Technology, Inc.
Inventor: David McGrew , Andrew Zawadowskiy , Donovan O'Hara , Saravanan Radhakrishnan , Tomas Pevny , Daniel G. Wing
CPC classification number: H04L63/145 , H04L63/1408 , H04L63/166 , H04L69/16 , H04L2463/121
Abstract: A method comprises receiving, at a network infrastructure device, a flow of packets, determining, using the network infrastructure device and for a first subset of the packets, that the first subset corresponds to a first datagram and determining a first length of the first datagram, determining, using the network infrastructure device and for a second subset of the packets, that the second subset corresponds to a second datagram that was received after the first datagram, and determining a second length of the second datagram, determining, using the network infrastructure device, a duration value between a first arrival time of the first datagram and a second arrival time of the second datagram, sending, to a collector device that is separate from the network infrastructure device, the first length, the second length, and the duration value for analysis.
-
8.
公开(公告)号:US11412000B2
公开(公告)日:2022-08-09
申请号:US16741794
申请日:2020-01-14
Applicant: Cisco Technology, Inc.
Inventor: Michel Khouderchah , Jayaraman Iyer , Kent K. Leung , Jianxin Wang , Donovan O'Hara , Saman Taghavi Zargar , Subharthi Paul
Abstract: Presented herein are methodologies for implementing application security. A method includes generating an extraction vector based on a plurality of application security rules to be enforced, transmitting the extraction vector to a first agent operating on a first network device and to a second agent operating on a second network device; receiving, separately, from the first agent and from the second agent, first metadata generated by the first agent and second metadata generated by the second agent by the agents applying the extraction vector to network traffic passing, respectively, through the first network device and the second network device. The first metadata includes a transaction ID assigned by the first agent, and the second metadata includes the same transaction ID. The method further includes correlating the first metadata with the second metadata based on the transaction ID to construct a transactional service graph for the network traffic.
-
公开(公告)号:US20200322382A1
公开(公告)日:2020-10-08
申请号:US16788999
申请日:2020-02-12
Applicant: Cisco Technology, Inc.
Inventor: Jianxin Wang , Nancy Cam-Winget , Donovan O'Hara , Richard Lee Barnes, II
IPC: H04L29/06
Abstract: A non-transitory computer readable medium comprising instructions stored thereon, the instructions effective to cause at least one processor to: establish trustworthiness of an application installed on a endpoint, the established trustworthiness is sufficient for an enterprise security infrastructure to treat the application installed on the endpoint and the endpoint as a trusted application and a trusted endpoint; negotiate with the trusted endpoint to determine a traffic inspection method for traffic flows originating at the trusted application that is destined for a service, the traffic inspection method is determined based on at least the trusted application, and the service; and instruct the trusted application of the determined traffic inspection method.
-
公开(公告)号:US20180026993A1
公开(公告)日:2018-01-25
申请号:US15214905
申请日:2016-07-20
Applicant: Cisco Technology, Inc.
Inventor: Vincent E. Parla , Andrey Zawadowskiy , Donovan O'Hara
IPC: H04L29/06
CPC classification number: H04L63/1425
Abstract: A method is disclosed in which a system compares a first set of reports characterizing network traffic flows originating from an endpoint device with a second set of reports characterizing network traffic flows originating from the endpoint device and stored at an external network device to determine whether the first set and second set of reports characterizing network traffic flows originating from an endpoint device are different. In response to determining that the first and second reports characterizing network traffic flows are different, the system identifies the network traffic flows originating from the endpoint device and reported by an external network device, but not reported by the endpoint device, as possibly indicative of malware and forwards the network traffic flows originating from the endpoint device to an analyzer for further processing. Thus, an observed difference between network traffic flows originating from an endpoint device and stored at the endpoint device and network traffic flows originating from the endpoint device and stored on an external network device are compared to detect the presence of malware residing on the endpoint device.
-
-
-
-
-
-
-
-
-