Patent classifications
H04L61/4541
NETWORK DEVICE IDENTIFICATION
An apparatus in a computer network system extracts network traffic metadata related to a client computing device of a local network. The network traffic metadata is required by a device fingerprinting process. In response to detecting a multicast DNS (mDNS) packet query in the network traffic metadata, the apparatus collects an mDNS hostname related to the client computing device from the mDNS packet query. In response to determining, at a first point in time, that a dynamic host configuration protocol (DHCP) hostname related to the client computing device is unavailable in the network traffic metadata, the apparatus assigns the mDNS hostname to the client computing device.
User-configurable dynamic DNS mapping for virtual services
Various example implementations are directed to circuits, apparatuses, and methods for providing virtual computing services. According to an example embodiment, an apparatus includes a computing server configured to provide a respective group of virtual servers for each of a plurality of accounts. Each of the accounts has a respective set of domain names and a respective settings file. The apparatus also includes a domain name server (DNS). The DNS is to dynamically map a respective set of domain names for each account to network addresses of the respective group of virtual servers, provided for the account. The DNS performs the mapping according to a mapping function indicated in the respective settings file of the account. The respective settings file of a first account accounts includes a mapping function that is different from a mapping function included in the respective settings file of a second account.
SYSTEM AND METHOD FOR DETECTION OF MALICIOUS NETWORK RESOURCES
A method and system for detection of malicious network resources in a distributed computer system are provided. The method comprises: receiving, by a first computing device, disposed inside the distributed computer system, an outbound traffic, detecting, by the first computing device, a suspicious external IP address in the outbound traffic, scanning, by the first computing device, a suspicious device located at the suspicious IP address to obtain a list of services running thereon, transmitting, by the first computing device, the suspicious IP address and the list of services to a second computing device disposed outside the distributed computer system, comparing, by the second computing device, the list of services with known malicious services, and in response to a match between at least one service from the list of services and a respective one of the known malicious services: determining the suspicious device, at the suspicious IP address, as being malicious.
SYSTEM AND METHOD FOR DETECTION OF MALICIOUS NETWORK RESOURCES
A method and system for detection of malicious network resources in a distributed computer system are provided. The method comprises: receiving, by a first computing device, disposed inside the distributed computer system, an outbound traffic, detecting, by the first computing device, a suspicious external IP address in the outbound traffic, scanning, by the first computing device, a suspicious device located at the suspicious IP address to obtain a list of services running thereon, transmitting, by the first computing device, the suspicious IP address and the list of services to a second computing device disposed outside the distributed computer system, comparing, by the second computing device, the list of services with known malicious services, and in response to a match between at least one service from the list of services and a respective one of the known malicious services: determining the suspicious device, at the suspicious IP address, as being malicious.
Cloud agnostic service discovery
A system may include a processing device and a memory storing instructions that, when executed by the processing device, causes the processing device to discover one or more endpoints of a service in view of a name that is unique to the service. In response to receiving a request to resolve the name from a client, the processing device may obtain the one or more endpoints of that service in view of the name. The processing device may filter the one or more endpoints, in view of the name and return the one or more endpoints which are filtered, to the client.
Cloud agnostic service discovery
A system may include a processing device and a memory storing instructions that, when executed by the processing device, causes the processing device to discover one or more endpoints of a service in view of a name that is unique to the service. In response to receiving a request to resolve the name from a client, the processing device may obtain the one or more endpoints of that service in view of the name. The processing device may filter the one or more endpoints, in view of the name and return the one or more endpoints which are filtered, to the client.
Method, Apparatus, and System for Sending Control Request Based on Key Value Configuration
A method, an apparatus, and a system for sending a control request based on a key value configuration. The method includes generating, by a client controller, a control request, wherein having a plurality of configuration parameters, wherein the plurality of configuration parameters comprise a flexible key value, a control object name, and a universally unique identifier (UUID), where the flexible key value identifies a requested control object, and the flexible key value is determined using at least one of the control object name or the UUID, and sending, by the client controller, the control request to a server controller, where the control request indicates to the server controller to configure the control object.
Methods, apparatus, and computer-readable media for discovery of application server and/or services for V2X communications
Embodiments include a method performed by a V2X user equipment (UE) for service discovery from a V2X application server (AS). The method includes sending, to a first address associated with the V2X AS, a first request for further address information associated with the V2X AS. The method also includes receiving, from the V2X AS via unicast signaling, a first response that includes the further address information associated with the V2X AS. The first request includes an identifier of the V2X UE but the first response does not include the identifier of the V2X UE. Other embodiments include complementary methods performed by a V2X AS, as well as V2X UE and V2X AS apparatus configured to perform such methods.
Network service discovery
Examples described herein provide network service discovery in a network. Examples herein include receiving, from a network device in the network, a set of records corresponding to a set of service advertisements indicative of capabilities of services hosted by respective host devices connected to the network device. Examples herein include determining, a set of neighbor network devices corresponding to the network device, based on radio frequency (RF) data in the network and a predefined set of policies associated with each of the set of records. Examples herein further include sending the set of records to the set of the neighbor network devices, where each of the set of neighbor network devices is to serve service discovery requests based on the set of records.
METHOD FOR IDENTIFYING NETWORK SERVICES IN A NETWORK HAVING INTERNET-OF-THINGS NETWORK SUBSCRIBERS
A method is provided for identifying network services in a network having at least one Internet-of-Things network subscriber, in particular Internet-of-Things sensors/actuators, based on domain name system service discovery DNS-SD via a multicast domain name system mDNS. A domain name system service discovery DNS-SD compliant request for a network service type is transmitted by an Internet-of-Things network subscriber to a network having at least one host that provides network services. At least one domain name system service discovery DNS-SD compliant response to the request is received from one of the hosts. The response comprises a text field having a network service identifier. A connection request is transmitted by the Internet-of-Things network subscriber to the host to which the network service identifier is assigned and which provides the desired network service.