×

Technologies for managing compromised sensors in virtualized environments

  • US 10,505,828 B2
  • Filed: 06/02/2016
  • Issued: 12/10/2019
  • Est. Priority Date: 06/05/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, from a first capturing agent deployed in a virtualization layer of a first device, a first data report generated by the first capturing agent based on traffic at the first device captured by the first capturing agent at the virtualization layer of the first device;

    receiving, from a second capturing agent deployed in a hardware layer of a second device different than the first device, a second data report generated by the second capturing agent based on traffic at the second device captured by the second capturing agent at the hardware layer of the second device;

    based on the first data report and the second data report, determining a first set of characteristics of the traffic captured by the first capturing agent and a second set of characteristics of the traffic captured by the second capturing agent;

    comparing the first set of characteristics of the traffic captured by the first capturing agent with the second set of characteristics captured by the second capturing agent to determine a multi-layer difference in traffic characteristics; and

    based on the multi-layer difference in traffic characteristics, determining that one of the first capturing agent or the second capturing agent is in a faulty state,wherein,the first data report and the second data report are of a plurality of data reports generated during reporting intervals based on observed data, statistics, and/or metadata about one or more packets, flows, communications, processes, events, and/or activities at the first device and the second device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×