-
公开(公告)号:WO2016196683A1
公开(公告)日:2016-12-08
申请号:PCT/US2016/035348
申请日:2016-06-01
Applicant: CISCO TECHNOLOGY, INC.
Inventor: YADAV, Navindra , SINGH, Abhishek Ranjan , GANDHAM, Shashidhar , SCHEIB, Ellen Christine , MADANI, Omid , PARANDEHGHEIBI, Ali , PANG, Jackson Ngoc Ki , JEYAKUMAR, Vimalkumar , WATTS, Michael Standish , NGUYEN, Hoang Viet , DEEN, Khawar , PRASAD, Rohit Chandra , GUPTA, Sunil Kumar , RAO, Supreeth Hosur Nagesh , GUPTA, Anubhav , KULSHRESHTHA, Ashutosh , SPADARO, Roberto Fernando , VU, Hai Trong , MALHOTRA, Varun Sagar , CHANG, Shih-Chun , VISWANATHAN, Bharathwaj Sankara , RACHITA AGASTHY, Fnu , BARLOW, Duane Thomas
CPC classification number: H04L63/1408 , H04L43/04 , H04L43/062 , H04L43/0894 , H04L63/02 , H04L63/1425
Abstract: An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.
Abstract translation: 示例性方法包括在整个数据中心中检测,使用传感器分组。 然后,传感器可以将数据包日志发送到各种收集器,然后可以识别和汇总数据中心中的数据流。 然后,收集器可以将流日志发送到分析模块,分析模块可以识别数据中心的状态并检测攻击。
-
公开(公告)号:EP3304858A1
公开(公告)日:2018-04-11
申请号:EP16732049.8
申请日:2016-06-01
Applicant: Cisco Technology, Inc.
Inventor: YADAV, Navindra , SINGH, Abhishek Ranjan , GANDHAM, Shashidhar , SCHEIB, Ellen Christine , MADANI, Omid , PARANDEHGHEIBI, Ali , PANG, Jackson Ngoc Ki , JEYAKUMAR, Vimalkumar , WATTS, Michael Standish , NGUYEN, Hoang Viet , DEEN, Khawar , PRASAD, Rohit Chandra , GUPTA, Sunil Kumar , RAO, Supreeth Hosur Nagesh , GUPTA, Anubhav , KULSHRESHTHA, Ashutosh , SPADARO, Roberto Fernando , VU, Hai Trong , MALHOTRA, Varun Sagar , CHANG, Shih-Chun , VISWANATHAN, Bharathwaj Sankara , RACHITA AGASTHY, Fnu , BARLOW, Duane Thomas
CPC classification number: H04L63/1408 , H04L43/04 , H04L43/062 , H04L43/0894 , H04L63/02 , H04L63/1425
Abstract: An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.
-
公开(公告)号:EP3849154A1
公开(公告)日:2021-07-14
申请号:EP21156151.9
申请日:2016-06-01
Applicant: Cisco Technology, Inc.
Inventor: YADAV, Navindra , SINGH, Abhishek Ranjan , GANDHAM, Shashidhar , SCHEIB, Ellen Christine , MADANI, Omid , PARANDEHGHEIBI, Ali , PANG, Jackson Ngoc Ki , JEYAKUMAR, Vimalkumar , WATTS, Michael Standish , NGUYEN, Hoang Viet , DEEN, Khawar , PRASAD, Rohit Chandra , GUPTA, Sunil Kumar , RAO, Supreeth Hosur Nagesh , GUPTA, Anubhav , KULSHRESHTHA, Ashutosh , SPADARO, Roberto Fernando , VU, Hai Trong , MALHOTRA, Varun Sagar , CHANG, Shih-Chun , VISWANATHAN, Bharathwaj Sankara , RACHITA AGASTHY, Fnu , BARLOW, Duane Thomas
Abstract: Evaluating network flow data and generating a graph corresponding to network application components. The nodes correspond to the application components, the edges to network flows. A model of normal application behavior is created and used to evaluate second flow data. A user is alerted if the second flow deviates from the normal behavior.
-
公开(公告)号:EP3840328A1
公开(公告)日:2021-06-23
申请号:EP21150804.9
申请日:2016-06-01
Applicant: Cisco Technology, Inc.
Inventor: YADAV, Navindra , SINGH, Abhishek Ranjan , GANDHAM, Shashidhar , SCHEIB, Ellen Christine , MADANI, Omid , PARANDEHGHEIBI, Ali , PANG, Jackson Ngoc Ki , JEYAKUMAR, Vimalkumar , WATTS, Michael Standish , NGUYEN, Hoang Viet , DEEN, Khawar , PRASAD, Rohit Chandra , GUPTA, Sunil Kumar , RAO, Supreeth Hosur Nagesh , GUPTA, Anubhav , KULSHRESHTHA, Ashutosh , SPADARO, Roberto Fernando , VU, Hai Trong , MALHOTRA, Varun Sagar , CHANG, Shih-Chun , VISWANATHAN, Bharathwaj Sankara , RACHITA AGASTHY, Fnu , BARLOW, Duane Thomas
Abstract: An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.
-
-
-