×

Using a flow database to automatically configure network traffic visibility systems

  • US 11,343,143 B2
  • Filed: 12/22/2016
  • Issued: 05/24/2022
  • Est. Priority Date: 12/22/2016
  • Status: Active Grant
First Claim
Patent Images

1. A network monitoring device for configuring managed objects in a monitored network having a plurality of objects comprising:

  • a storage repository for storing network traffic flow information;

    one or more network interfaces communicatively coupled to the monitored network having a plurality of network nodal devices;

    providing a Graphical User Interface (GUI) responsive to a user interfacing for interactive analysis of flow record; and

    a processor coupled to each of the storage repository, one or more network interfaces and GUI, wherein the processor upon execution of instructions is configured to;

    receive from the storage repository a plurality of flow records from the plurality of network nodal devices;

    analyze the plurality of flow records according to user-specified criteria to identify one or more network traffic patterns relating to network security violations;

    identify a plurality of network entities associated with the one or more identified network traffic patterns;

    determine a single managed data object comprising the identified plurality of network entities;

    determine if there is a pre-existing single managed data object associated with the identified plurality of network entities;

    generate a single managed data object comprising the identified plurality of network entities if it is determined there is not a pre-existing managed data object associated with the identified plurality of network entities;

    suggest configuration changes for the single managed data object having the identified plurality of network entities associated with the one or more identified network traffic patterns; and

    re-configure the single managed data object with the suggested configuration changes without user intervention to mitigate network security violations, whereby the single managed data object is split into at least two separate managed data objects, wherein each separate managed data object relates to a respective network attack vector.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×