H04L2101/663

Apparatus having engine using artificial intelligence for detecting anomalies in a computer network
11057409 · 2021-07-06 · ·

A system comprises an enterprise network system and engine. The engine has a discovery module coupled to a switch device, an AI and machine learning based monitoring and detection module coupled to the switch device, and a remediation module coupled to the switch device. The remediation module is configured to initiate a remediation process based upon the detection of at least one of the anomalies from the flow of data.

Cloud policy enforcement based on network trust

Systems and methods include obtaining trusted network rules for a plurality of networks, wherein the trusted network rules include whether a network is untrusted or one of a plurality of trusted networks; obtaining policy configurations for each of the trusted network rules, wherein the policy configurations define configurations for a cloud-based system to use with a user device based on a corresponding network where the user device is connected; communicating with the user device and determining which network of the plurality of network the user device is connected; and applying the configurations in the cloud-based system for the user device based on the network the user device is connected. The steps can further include obtaining forwarding policies for each of the plurality of networks; and providing the forwarding policies to a connector application executed on the user device.

PER-APPLICATION SPLIT-TUNNELED PROXY
20210021518 · 2021-01-21 ·

Disclosed are various embodiments for providing split-tunneled network connectivity on a per-application basis. A request to make a connection, such as a transmission control protocol (TCP) or a universal datagram protocol (UDP) connection, to a remote host specified by an internet protocol (IP) address in the request is received from a network driver. A hostname lookup table is queried to determine a hostname associated with the IP address for the remote host. A policy is identified based on the hostname associated with the IP address for the remote host. Then, the connection is routed based on the policy.

Managing port connections

A system in accordance with an example includes a plurality of ports and a port manager. The port manager is to monitor quality of each of the plurality of ports. The port manager is to receive a connection request from a client device at a first port. The port manager is further to determine whether to instruct the client device to connect to a second port that is more suitable for the client device than the first port, based on the quality of the plurality of ports.

REAL TIME DYNAMIC CLIENT ACCESS CONTROL

A system and method for facilitating controlled access by a client device to one or more services provided by a server are disclosed. The client device's access to the services provided by the server may be dynamically controlled by a controller, which may generate instructions to an agent to effectuate the access control. The agent may be configured to control one or more access components associated with the server. The instructions generated by the controller may instruct the agent to cause the access control components to grant or remove the client device's access to the services provided by the server. In some implementations, the controller may generate such instructions based on a status of a session established between the controller and the client device.

LOGICAL ROUTER WITH MULTIPLE ROUTING COMPONENTS

Some embodiments provide a method for handling failure at one of several peer centralized components of a logical router. At a first one of the peer centralized components of the logical router, the method detects that a second one of the peer centralized components has failed. In response to the detection, the method automatically identifies a network layer address of the failed second peer. The method assumes responsibility for data traffic to the failed peer by broadcasting a message on a logical switch that connects all of the peer centralized components and a distributed component of the logical router. The message instructs recipients to associate the identified network layer address with a data link layer address of the first peer centralized component.

DIRECT FILE SEND FROM STORAGE TO END CLIENT BY TRANSFERRING SOCKET INFORMATION TO THE STORAGE
20200412804 · 2020-12-31 ·

A method begins by sending, by a user computing device of a storage network, a read request regarding data to a host computing device of the storage network in accordance with a transport layer protocol, where the read request includes data retrieval information associated the data. The method continues with determining, by the host computing device, a storage entity of the storage network that is storing the data based on the data retrieval information. The method continues with sending, by the host computing device, socket information and data retrieval information to the storage entity. The method continues with sending, by the storage entity, the data directly to the user computing device in accordance with the socket information and using the session identifier.

USING DNS TO COMMUNICATE MP-TCP CAPABILITY OF SERVER DEVICES
20200396200 · 2020-12-17 ·

This disclosure is related to devices, systems, and techniques for using a Domain Name System (DNS) server to identify one or more network devices capable of operating according to a protocol. For example, a DNS system device includes a memory and one or more processors implemented in circuitry. The one or more processors are configured to receive, from a client device, a DNS query including a specification of a hostname and a request for an MP-TCP capability, determine, using the memory, at least one IP address corresponding to the hostname and corresponding to one of the devices that is MP-TCP capable, and send, to the client device, a DNS response including an indication of the at least one of the IP addresses.

PEEPHOLE OPTIMIZATION OF LIGHTWEIGHT PROTOCOLS AT LOWER LAYERS
20200396178 · 2020-12-17 ·

Techniques are described to provide a peephole optimization for processing traffic for lightweight protocols at lower layers by executing them inside a virtual switch rather than using the network stack of a host node. In one example, a method includes determining by forwarding logic of a virtual switch that a received packet is associated with a query for one of domain information or address information. Based on such a determination, the virtual switch determines whether the query is contained within a single Ethernet frame and is answerable. Based on a positive determination for both, the virtual switch determines whether a response to the query can be transmitted in a single packet within a single Ethernet frame. Based on a positive determination of a single packet response, a response packet for the query is formed and injected into the forwarding logic for the virtual switch for transmitting to a destination.

System and method for detecting a compromised computing system
10862923 · 2020-12-08 · ·

A digital security threat management system is disclosed. The system detects the presence of a computing system, on a network, that has been compromised by an undetected and/or unknown digital security threat. The digital security threat management system recognizes characteristic emanations from a computer system that has been compromised. Because the characteristic emanations that result from a known threat can be the same as the characteristic emanations that result from an undetected and/or unknown threat, the digital security threat management system can learn to detect a computing system that has been compromised by an unknown threat if the security threat management system recognizes characteristic emanations from a previous attack, based on a known threat, of the computing system. In this way, the system can detect the presence of a compromised computing system, even if the cause of the compromise remains undetected and/or unknown. Appropriate remedial action may be taken upon detection.