×

Systems and methods for monitoring virtual networks

  • US 9,961,105 B2
  • Filed: 12/31/2014
  • Issued: 05/01/2018
  • Est. Priority Date: 12/31/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for monitoring virtual networks, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • identifying, within a cloud-computing environment that hosts a plurality of virtual networks, a virtual network comprising at least one virtualized edge switching device that handles, using a software-defined network protocol, all packets passed between the virtual network and at least one additional virtual network within the cloud-computing environment;

    emulating a physical wiretap within the virtualized edge switching device by;

    identifying characteristics of the physical wiretap that enable the physical wiretap to filter packets; and

    providing, within the virtualized edge switching device, a set of software-defined network rules based on the characteristics of the physical wiretap and containing criteria for identifying packets having at least one predetermined property associated with a security policy that;

    is defined by a tenant of the virtual network; and

    comprises a data loss prevention policy applied to packets distributed from a source port of the virtualized edge switching device to outside the virtual network;

    intercepting, at the source port of the virtualized edge switching device, a packet destined for a destination port that resides outside of the virtual network;

    determining that at least one characteristic of the packet satisfies at least one of the software-defined network rules; and

    in response to determining that the characteristic of the packet satisfies at least one of the software-defined network rules;

    creating a copy of the packet;

    forwarding, via a tunneling mechanism, the copy of the packet to a virtual tap port that is located outside of the virtual network and performs a security analysis on the copy of the packet that is invisible to the tenant of the virtual network, wherein the tunneling mechanism encapsulates the copy of the packet at the source port and decapsulates the copy of the packet at the destination port; and

    forwarding the packet to the destination port along an intended network path of the packet.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×