Patent classifications
H04L41/085
Alarm monitoring system, alarm monitoring method, and program
A warning monitoring system includes: a warning information generation unit configured to receive a warning and a ripple warning generated due to the warning, each including a device name and sent by a device configuring a network, determine respective types of the warning and the ripple warning based on messages included in the warning and the ripple warning, and generate warning information in which the warning and the ripple warning are associated with the types; a network configuration database in which configuration information about the network is accumulated; and an interrelation analysis unit including a prior rule that indicates a generation manner of the ripple warning different depending on the type, and configured to acquire specific connection destination information by searching the network configuration database by using target information defined by the prior rule and the device name as keys, and relate the warning and the ripple warning.
SECURITY CAPABILITY DETERMINATION
An approach for improving endpoint security. The approach requests security capabilities from endpoints of communications. The approach can analyze the differences between the security capabilities of the endpoints. The approach can negotiate a security capability supported by the endpoints of the communication. The approach can determine if the negotiation succeeded. If the negotiation failed, then the approach can create a report describing capabilities of the endpoints and suggesting changes to improve the endpoint security. The approach can send the report to the appropriate interested personnel.
MIGRATION OF USER AUTHENTICATION FROM ON-PREMISE TO THE CLOUD
According to examples, an apparatus may include a processor and a memory on which is stored machine-readable instructions that when executed by the processor, may cause the processor to identify configuration information to be used by an on-premise access management service to provide authentication services to applications by users. The processor may also transform the identified configuration information into a transformed set of configuration information to be used by a cloud-based access management service to provide authentication services to the applications by users. In addition, the processor may store the transformed set of configuration information for use by the cloud-based access management service to provide authentication services to the applications by users to migrate authentication of the users from the on-premise access management service to the cloud-based access management service.
AUTOMATIC IDENTIFICATION OF POLICY MISCONFIGURATION
Some embodiments provide a method for identifying policy misconfiguration in a datacenter. Based on flow data received for a plurality of data compute nodes (DCNs) in the datacenter, the method determines that an anomalous amount of data traffic relating to a particular DCN has been dropped. The method uses (i) the received flow data for the particular DCN and (ii) a set of recent policy configuration changes to determine policy configuration changes that contributed to the anomalous amount of dropped data traffic relating to the particular DCN. The method generates an alert for presentation to a user indicating the anomalous amount of data traffic and the contributing policy configuration changes.
TRANSACTION-BASED MESSAGING AND LOGGING INFRASTRUCTURE FOR NETWORKING SYSTEMS AND COMPUTING DEVICES
Devices, methods, and systems that provide transmitting of messages between different units of a multi-unit system in response to instantiated multi-unit transactions. For example, a method may include: identifying, by a first unit of a multi-unit system of computing devices, an event has occurred that triggers initiation of a transaction; generating, by the first unit, a transaction identifier associated with the transaction, the transaction identifier comprising a unit identifier of the first unit and an application identifier of an application associated with the event; and transmitting, from the first unit and to a second unit of the multi-unit system, the transaction identifier as part of an inter-unit message.
TRANSACTION-BASED MESSAGING AND LOGGING INFRASTRUCTURE FOR NETWORKING SYSTEMS AND COMPUTING DEVICES
Devices, methods, and systems that provide transmitting of messages between different units of a multi-unit system in response to instantiated multi-unit transactions. For example, a method may include: identifying, by a first unit of a multi-unit system of computing devices, an event has occurred that triggers initiation of a transaction; generating, by the first unit, a transaction identifier associated with the transaction, the transaction identifier comprising a unit identifier of the first unit and an application identifier of an application associated with the event; and transmitting, from the first unit and to a second unit of the multi-unit system, the transaction identifier as part of an inter-unit message.
Time-sensitive networking communication method and apparatus for configuring virtual switching node
A time-sensitive networking communication method and an apparatus, where the method may include: determining, by an application function network element, a virtual switching node identifier corresponding to a port identifier of a user plane function network element; determining a virtual port identifier of a virtual switching node identified by the virtual switching node identifier; obtaining attribute information of the virtual switching node, where the attribute information includes attribute information of a port identified by the port identifier of the user plane function network element and attribute information of a virtual port identified by the virtual port identifier; and sending the attribute information of the virtual switching node to a time-sensitive network, where the attribute information of the virtual switching node is used to request the time-sensitive network to register or update the virtual switching node based on the attribute information of the virtual switching node.
Time-sensitive networking communication method and apparatus for configuring virtual switching node
A time-sensitive networking communication method and an apparatus, where the method may include: determining, by an application function network element, a virtual switching node identifier corresponding to a port identifier of a user plane function network element; determining a virtual port identifier of a virtual switching node identified by the virtual switching node identifier; obtaining attribute information of the virtual switching node, where the attribute information includes attribute information of a port identified by the port identifier of the user plane function network element and attribute information of a virtual port identified by the virtual port identifier; and sending the attribute information of the virtual switching node to a time-sensitive network, where the attribute information of the virtual switching node is used to request the time-sensitive network to register or update the virtual switching node based on the attribute information of the virtual switching node.
Network device identification and categorization using behavioral fingerprints
Network device identification is disclosed. A set of data attributes relating to at least two different data types is extracted from network traffic data associated with each user device of a set of user devices. A cluster data set of one or more known device clusters is expanded with the set of data attributes for generating an expanded cluster data set. One or more new device clusters is identified from the expanded cluster data set of the one or more known device clusters by using similarity-based metrics and a weighting factor selected based on the data types of the set of data attributes, and one or more device identification rules is generated based on the one or more new device clusters.
Network device identification and categorization using behavioral fingerprints
Network device identification is disclosed. A set of data attributes relating to at least two different data types is extracted from network traffic data associated with each user device of a set of user devices. A cluster data set of one or more known device clusters is expanded with the set of data attributes for generating an expanded cluster data set. One or more new device clusters is identified from the expanded cluster data set of the one or more known device clusters by using similarity-based metrics and a weighting factor selected based on the data types of the set of data attributes, and one or more device identification rules is generated based on the one or more new device clusters.