DETERMINING NETWORK SECURITY POLICIES DURING DATA CENTER MIGRATION AND DETECTING SECURITY VIOLATION
First Claim
Patent Images
1. A method comprising:
- receiving input data from a source environment wherein the source environment comprises a plurality of servers and one or more applications running on at least one of the servers;
discovering from the received data one or more patterns wherein the patterns comprise information regarding one or more of the plurality of servers running one or more of the applications that collectively perform a service;
analyzing the patterns to learn a recurring pattern;
determining a security policy for the recurring pattern; and
storing the recurring pattern and the security policy determined for the recurring pattern in a database.
1 Assignment
0 Petitions
Accused Products
Abstract
Input data are received from a source environment comprising a plurality of servers and one or more applications running on at least one of the servers. One or more patterns are discovered from the received data comprising information regarding the plurality of servers running applications that collectively perform a service. The patterns are analyzed to learn a recurring pattern. A security policy is designed for the recurring pattern. The recurring pattern and the security policy designed for the recurring pattern is stored in a database.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving input data from a source environment wherein the source environment comprises a plurality of servers and one or more applications running on at least one of the servers; discovering from the received data one or more patterns wherein the patterns comprise information regarding one or more of the plurality of servers running one or more of the applications that collectively perform a service; analyzing the patterns to learn a recurring pattern; determining a security policy for the recurring pattern; and storing the recurring pattern and the security policy determined for the recurring pattern in a database. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus, comprising:
-
a memory; and a processor operatively coupled to the memory and configured to; receive input data from a source environment wherein the source environment comprises a plurality of servers and one or more applications running on at least one of the servers; discover from the received data one or more patterns wherein the patterns comprise information regarding one or more of the plurality of servers running one or more of the applications that collectively perform a service; analyze the patterns to learn a recurring pattern; determine a security policy for the recurring pattern; and store the recurring pattern and the security policy determined for the recurring pattern in a database. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An article of manufacture comprising a computer readable storage medium for storing computer readable program code which, when executed, causes a computer to:
-
receive input data from a source environment wherein the source environment comprises a plurality of servers and one or more applications running on at least one of the servers; discover from the received data one or more patterns wherein the patterns comprise information regarding one or more of the plurality of servers running one or more of the applications that collectively perform a service; to analyze the patterns to learn a recurring pattern; to determine a security policy for the recurring pattern; and to store the recurring pattern and the security policy determined for the recurring pattern in a database. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification