H04L2101/622

Agent-based network scanning in software-defined networking (SDN) environments

Example methods are provided for a network scanning controller to perform agent-based network scanning in a software-defined networking (SDN) environment. In one example, the method may comprise identifying multiple networks for which network scanning is required, performing a first network scan using a first agent to obtain first address mapping information associated with multiple first workloads, and performing a second network scan using a second agent to obtain second address mapping information associated with multiple second workloads. The first agent and the multiple first workloads may be located in a first network, and the second agent and the multiple second workloads in a second network. The method may also comprise generating aggregated address information based on the first address mapping information and the second address mapping information.

System and method of acquiring network-centric information for customer premises equipment (CPE) management

A method, device, and computer-readable medium are provided for sending, by a customer-premises equipment (CPE) device to a wireless access device via a CPE network interface, an Internet protocol (IP) address lease request, wherein the wireless access device terminates a wireless backhaul connection to a service provider network; receiving, responsive to the IP address lease request, an acknowledge message that includes a requested IP address and a protocol configuration option (PCO) providing identification information for the wireless access device; connecting, via the wireless access device and using the requested IP address, to a bootstrap server device associated with the service provider network; receiving, via the wireless access device, attachment information associated with a network management server and the service provider network; and sending, via the wireless access device, the identification information to the network management server in an attachment procedure using the attachment information.

Systems and methods for profiling and clustering network-connected devices

A network device determines when multiple users each connect to a network using one or more devices. The network device obtains device or network-related parameters associated with the one or more devices and generates profiling vectors for each of the multiple users, that connects to the network using the one or more devices, to produce multiple profiling vectors. The network device clusters the multiple profiling vectors to identify cluster centers associated with a plurality of user groups, and determines first users of the multiple users for, or with, whom to perform certain actions or activities based on the first users' affinity with one or more of the plurality of user groups. The network device performs the certain actions or activities with respect to the determined first users.

Method and device for intrusion detection in a computer network

A device and method for intrusion detection in a computer network. A data packet is received at an input of a hardware switch unit, an output of the hardware switch unit is selected for sending the data packet or a copy as a function of security layer information from the data packet and of a hardware address, context information for the data packet being determined, an actual value from a field being compared in a comparison by a hardware filter with a setpoint value for values from this field, the field including security layer data or mediation layer data, and an interrupt for a computing device being triggered as a function of a result of the comparison, an analysis for detecting an intrusion pattern in a network traffic in the computer network, triggered by the interrupt, being carried out as a function of the context information for the data packet.

EXTENDED INTER-KERNEL COMMUNICATION PROTOCOL FOR THE REGISTER SPACE ACCESS OF THE ENTIRE FPGA POOL IN NON-STAR MODE
20220382944 · 2022-12-01 ·

Methods and apparatus for an extended inter-kernel communication protocol for discovery of accelerator pools configured in a non-star mode. Under a discovery algorithm, discovery requests are sent from a root node to non-root nodes in the accelerator pool using an inter-kernel communication protocol comprising a data transmission protocol built over a Media Access Control (MAC) layer and transported over links coupled between IO ports on accelerators. The discovery requests are used to discover each of the nodes in the accelerator pool and determine the topology of the nodes. During this process, MAC address table entries are generated at the various nodes comprising (key, value) pairs of MAC IO port addresses identifying destination nodes and that may be reached by each node and the shortest path to reach such destination nodes. The discovery algorithm may also be used to discover storage related information for the accelerators. The accelerators may comprise FPGAs or other processing units, such as GPUs and Vector Processing Units (VPUs).

ADDRESS ROTATION AWARE DYNAMIC HOST CONTROL PROTOCOL
20220385623 · 2022-12-01 ·

A method comprises, at a wireless network controller of wireless access points through which wireless client devices that are wireless communicate with the controller: upon receiving, from a wireless client device, a dynamic host configuration protocol (DHCP) request having a media access control (MAC) address, determining whether the wireless client device rotated its MAC address from a previous MAC address to the MAC address; when the wireless client device rotated its MAC address, forwarding, to a DHCP service, the DHCP request with a notification of a MAC address rotation to cause the DHCP service to reassign a previously assigned Internet Protocol (IP) address to the wireless client device; and upon receiving, from the DHCP service, a DHCP offer asserting the previously assigned IP address, forwarding the DHCP offer to the wireless client device.

METHOD AND APPARATUS FOR CONFIGURING MEDIUM ACCESS CONTROL (MAC) ADDRESS FOR ULTRA-WIDEBAND (UWB) COMMUNICATION
20220385332 · 2022-12-01 ·

Disclosed is a method of a first ultra-wideband (UWB) device, including identifying an extended MAC address of the first UWB device, generating a short MAC address of the first UWB device based on the extended MAC address, selecting one of the short MAC address and the extended MAC address as a MAC address identifying the first UWB device, and performing UWB communication with a second UWB device, using the MAC address, wherein the second UWB device operates as a controller defining and controlling a control message for UWB ranging, and wherein the first UWB device operates as a controlee using information included in the control message.

METHOD OF CHANGING A MAC ADDRESS OF A WLAN AFFILIATED STA OF A MULTI-LINK DEVICE
20220386109 · 2022-12-01 ·

A method of changing a MAC address of a WLAN affiliated STA of a multi-link device (MLD) and related system, device and non-transitory machine-readable storage medium. A new MAC address is generated for an affiliated non-AP STA of a non-AP MLD. A request to change the MAC address of the affiliated non-AP STA to the new MAC address is sent from the non-AP MLD to an AP MLD. An acknowledgement that the new MAC address for the affiliated non-AP STA of the non-AP MLD has been successfully applied by the AP MLD is received by the non-AP MLD from the AP MLD. The MAC address for the affiliated non-AP STA of the non-AP MLD is changed to the new MAC address in response to the acknowledgment.

COLLABORATIVE DEVICE ADDRESS ROTATION
20220386110 · 2022-12-01 ·

Embodiments are presented for collaborative device address generation between a wireless client device and a network infrastructure component, such as a wireless access point. The wireless client device and network infrastructure component share information to facilitate collaborative generation of a sequence of device addresses. This shared information includes, in some embodiments, key information and moving factor information. The key information and moving factor information is used to generate a token. A sequence of tokens is generated by updating the moving factor as each token is generated. A corresponding sequence of device addresses are then derived based on the sequence of tokens. Since the wireless client device and the network infrastructure device apply equivalent methods to generate respective sequences of addresses, the network infrastructure is able to efficiently identify a source wireless client device when observing a new device address on a wireless network.

PROACTIVE NOTIFICATION OF WIRELESS CLIENT ADDRESS ROTATION
20220386111 · 2022-12-01 ·

A network controller provides proactive notification of a wireless client device's address rotation to layer 2 (L2) and/or layer 3 (L3) devices. Traditional methods of device address discovery rely on broadcasting of address queries across a plurality of links until a path to a device having the queried address responds. As device address changes become more frequent in an effort to improve user privacy, traditional methods of address discovery impose a large burden on networks, reducing their performance and efficiency. By proactively propagating address changes to upstream devices, the need for broadcast oriented address discovery techniques is reduced, resulting in improved network performance.