Patent classifications
H04L63/0254
Firewall service insertion across secure fabric preserving security group tags end to end with dual homed firewall
Systems, methods, and computer-readable media for preserving source host context when firewall policies are applied to traffic in an enterprise network fabric. A data packet to a destination host from a source host can be received at a first border node instance in an enterprise network fabric as part of network traffic. The data packet can include a context associated with the source host. Further, the data packet can be sent to a firewall of the enterprise network fabric and can be received at a second border node instance after the firewall applies a firewall policy to the data packet. The data packet can then be selectively encapsulated with the context associated with the source host at the second border node instance for applying one or more policies to control transmission of the network traffic through the enterprise network fabric.
CONTROLLING ACCESS TO SECURED DATA VIA TIMED FILTERING OF DATA
According to certain implementations, an access control system controls access to secured data that is stored on a secured source. A requestor system may request information representing the secured data. The access control system receives the secured data from the secured source, and selects a portion of the secured data based on a lens including a filter criteria or a modification instruction. Adjusted data may be generated based on a modification of the selected portion of data, where the modification is based on the lens. The access control system provides the adjusted data to the requestor system via an access interface. In some cases, upon completion of a time period, the access control system prevents the requestor system from accessing the adjusted data, by disabling the access interface used to access the adjusted data. The adjusted data may be deleted from the access control system.
REGULATION METHODS FOR PROXY SERVICES
Systems and methods to manage and regulate the requests of multiple proxy clients are disclosed. In one aspect, the system and methods disclosed herein aids in configuring proxy server(s) with a rate-limit functionality. Configuration of the rate-limit functionality may be realized by, but not limited to, installing configuration file(s) and/or software application(s) on the proxy server(s). The configuration provides information about the list of restricted and unrestricted domains and their respective request limit specification in a given time frame. Therefore, each time before a proxy server forwards the clients' requests to a target domain, the proxy server checks and ensures that the request count to the particular target domain is well within the limit specified in the request limit specification. Thus, the embodiments described herein aid in preventing the IP addresses of proxy service providers from being blocked or denied from the target websites.
SYMMETRIC ROUTING IN VIRTUALIZED NETWORKS
Embodiments disclosed herein relate to source-based symmetric routing of network traffic in virtual networks. In particular, a source of network traffic in the virtual network is equipped with a routing table that causes the source of the network traffic to route the network traffic symmetrically across zones of the virtual network.
Tracking usage of corporate credentials
Phishing attacks attempt to solicit valuable information such as personal information, account credentials, and the like from human users by disguising a malicious request for information as a legitimate inquiry, typically in the form of an electronic mail or similar communication. By tracking a combination of outbound web traffic from an endpoint and inbound electronic mail traffic to the endpoint, improved detection of phishing attacks or similar efforts to wrongly obtain sensitive information can be achieved.
STATEFUL MANAGEMENT OF STATE INFORMATION ACROSS EDGE GATEWAYS
Described herein are systems, methods, and software to manage state information and failover between edge gateways (edges) in a computing environment. In one example, a first edge receives state information associated with one or more logical routers on a second edge. The first edge further identifies a failure in association with the second edge and, in response to the failure, make one or more logical routers available in the first edge to operate in place of the one or more logical routers in the second edge based on the state information.
COMMUNICATION SYSTEM, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR AUTHENTICATION SERVER, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR PRINTER
An authentication server may, in a case where a communication state between the authentication server and a management server is a non-connecting state, send first authentication information to an external device. A printer may, in a case where a communication state between the printer and the management server changes from a communication-enabled state to a communication-disabled state, shift a state of the printer from a first permission state to a first prohibition state, while the state of the printer is the first prohibition state, accept an input of second authentication information from a user; and, in a case where the input of the second authentication information is accepted and the second authentication information matches the first authentication information, shift the state of the printer from the first prohibition state to a second permission state.
DATA PACKET PROCESSING METHOD, APPARATUS, AND ELECTRONIC DEVICE, COMPUTER-READABLE STORAGE MEDIUM, AND COMPUTER PROGRAM PRODUCT
This application discloses a data packet processing method performed by an electronic device. The data packet processing method includes: obtaining a target network data packet; generating data packet fingerprints of the target network data packet, the data packet fingerprints including a target traffic attribute fingerprint and a target traffic payload fingerprint; determining a type of the target network data packet according to an occurrence frequency of the target traffic payload fingerprint in a fingerprint database and the target traffic attribute fingerprint, the fingerprint database including historical traffic payload fingerprints of a plurality of historical network data packets; and blocking a network connection of the target network data packet when the type of the target network data packet is an abnormal type.
Reliable firewall
Various example embodiments of a reliable firewall are presented herein. Various example embodiments of a reliable firewall may be configured to provide a single, stateful firewall spanning multiple routers. Various example embodiments of a reliable firewall spanning multiple routers may be configured to provide a reliable firewall configured to protect high-availability network services, network services using multipath routing, or the like, as well as various combinations thereof. Various example embodiments of a reliable firewall spanning multiple routers may be configured to provide a reliable firewall by supporting synchronization of firewall synchronization information (e.g., firewall policy information, firewall session state information, or the like, as well as various combinations thereof) across the multiple routers.
UNSUPERVISED ENCODER-DECODER NEURAL NETWORK SECURITY EVENT DETECTION
A method may include a processing system having at least one processor obtaining a first plurality of domain name system traffic records, generating an input aggregate vector from the first plurality of domain name system traffic records, where the input aggregate vector comprises a plurality of features derived from the first plurality of domain name system traffic records, and applying an encoder-decoder neural network to the input aggregate vector to generate a reconstructed vector, where the encoder-decoder neural network is trained with a plurality of aggregate vectors generated from a second plurality of domain name system traffic records. In one example, the processing system may then calculate a distance between the input aggregate vector and the reconstructed vector, and apply at least one remedial action associated with the first plurality of domain name system traffic records when the distance is greater than a threshold distance.