-
公开(公告)号:US12277446B2
公开(公告)日:2025-04-15
申请号:US17202447
申请日:2021-03-16
Applicant: Cisco Technology, Inc.
Inventor: John David White , Steven Joseph Rich , William Michael Hudson, Jr. , Chris Allen Shenefiel
Abstract: According to certain embodiments, a method comprises monitoring a request for use of memory requested by a container manager application on behalf of a given one of a plurality of containers during runtime of the given container. The method further comprises determining that the request for use of memory has caused an exception. The exception indicates that the request has requested an invalid operation on a memory table or that the request has requested a previously not seen memory table. In response, the method further comprises determining an action to perform. The action depends on both first trustworthiness information associated with the given container and second trustworthiness information associated with the given container. The first trustworthiness information is obtained from a Third Party Reputation Service (TPRS). The second trustworthiness information is obtained based on monitoring the runtime behavior of the given container.
-
公开(公告)号:US20220300330A1
公开(公告)日:2022-09-22
申请号:US17202447
申请日:2021-03-16
Applicant: Cisco Technology, Inc.
Inventor: John David White , Steven Joseph Rich , William Michael Hudson, JR. , Chris Allen Shenefiel
Abstract: According to certain embodiments, a method comprises monitoring a request for use of memory requested by a container manager application on behalf of a given one of a plurality of containers during runtime of the given container. The method further comprises determining that the request for use of memory has caused an exception. The exception indicates that the request has requested an invalid operation on a memory table or that the request has requested a previously not seen memory table. In response, the method further comprises determining an action to perform. The action depends on both first trustworthiness information associated with the given container and second trustworthiness information associated with the given container. The first trustworthiness information is obtained from a Third Party Reputation Service (TPRS). The second trustworthiness information is obtained based on monitoring the runtime behavior of the given container.
-