-
公开(公告)号:US11075947B2
公开(公告)日:2021-07-27
申请号:US16018257
申请日:2018-06-26
Applicant: Cisco Technology, Inc.
Inventor: Samir Dilipkumar Saklikar , Vishnu V P , Srivatsa M S , Pujitha Venkata Saranya Eedupalli , Hrvoje Dogan
Abstract: A network security method is provided. The method includes obtaining, at a network security device, first network traffic from a network device destined for a potential attacker; determining if the first network traffic is suspicious; when the first network traffic is determined to be suspicious: generating second network traffic based on the context of the network device and the first network traffic; providing the second network traffic to the potential attacker; obtaining, from the potential attacker, third network traffic in response to the second network traffic; and designating the potential attacker as malicious based on the third network traffic is disclosed. An apparatus and one or more non-transitory computer readable storage media are also disclosed.
-
公开(公告)号:US20210135995A1
公开(公告)日:2021-05-06
申请号:US16674693
申请日:2019-11-05
Applicant: Cisco Technology, Inc.
Inventor: Samir Dilipkumar Saklikar , Jayaraman Iyer , Robin Edgard Martherus , Morteza Ansari , Jyoti Verma
IPC: H04L12/813 , H04L12/26 , H04L12/24
Abstract: One or more lower-level attributes of a first network policy are translated to one or more higher-level attributes of the first network policy, and one or more lower-level attributes of a second network policy are translated to one or more higher-level attributes of the second network policy. The first network policy controls how first network traffic is handled, and the second network policy controls how second network traffic is handled. The one or more higher-level attributes of the first network policy are compared with the one or more higher-level attributes of the second network policy. Based on the comparing, it is determined whether the first network traffic and the second network traffic are handled in a functionally equivalent manner. If not, the first network policy is dynamically updated to generate an updated first network policy that causes the first network traffic to be handled in the functionally equivalent manner.
-
公开(公告)号:US11233742B2
公开(公告)日:2022-01-25
申请号:US16674693
申请日:2019-11-05
Applicant: Cisco Technology, Inc.
Inventor: Samir Dilipkumar Saklikar , Jayaraman Iyer , Robin Edgard Martherus , Morteza Ansari , Jyoti Verma
IPC: H04L12/813 , H04L12/24 , H04L12/26 , H04L29/08
Abstract: One or more lower-level attributes of a first network policy are translated to one or more higher-level attributes of the first network policy, and one or more lower-level attributes of a second network policy are translated to one or more higher-level attributes of the second network policy. The first network policy controls how first network traffic is handled, and the second network policy controls how second network traffic is handled. The one or more higher-level attributes of the first network policy are compared with the one or more higher-level attributes of the second network policy. Based on the comparing, it is determined whether the first network traffic and the second network traffic are handled in a functionally equivalent manner. If not, the first network policy is dynamically updated to generate an updated first network policy that causes the first network traffic to be handled in the functionally equivalent manner.
-
公开(公告)号:US20190394237A1
公开(公告)日:2019-12-26
申请号:US16018257
申请日:2018-06-26
Applicant: Cisco Technology, Inc.
Inventor: Samir Dilipkumar Saklikar , Vishnu V P , Srivatsa M S , Pujitha Venkata Saranya Eedupalli , Hrvoje Dogan
IPC: H04L29/06
Abstract: A network security method is provided. The method includes obtaining, at a network security device, first network traffic from a network device destined for a potential attacker; determining if the first network traffic is suspicious; when the first network traffic is determined to be suspicious: generating second network traffic based on the context of the network device and the first network traffic; providing the second network traffic to the potential attacker; obtaining, from the potential attacker, third network traffic in response to the second network traffic; and designating the potential attacker as malicious based on the third network traffic is disclosed. An apparatus and one or more non-transitory computer readable storage media are also disclosed.
-
-
-