Abstract: This disclosure relates generally to computer network, and more particularly to a system and method for providing computer network security. In one embodiment, a method is provided for providing computer network security. The method comprises gathering threat information from one or more sources, deriving security intelligence based on the threat information, determining a security measure based on the security intelligence, and dynamically applying the security measure to a computer network using a set of virtual appliances and a set of virtual switches. Figure 3.
Claims:WE CLAIM:
1. A method for providing computer network security, the method comprising:
gathering, via a processor, threat information from one or more sources;
deriving, via the processor, security intelligence based on the threat information;
determining, via the processor, a security measure based on the security intelligence; and
dynamically applying, via the processor, the security measure to a computer network using a set of virtual appliances and a set of virtual switches.
2. The method of claim 1, wherein deriving the security intelligence comprises determining one or more potential security threats by applying at least one of a filter, an analytics, and a reputation based heuristic on the threat information.
3. The method of claim 2, wherein determining the security measure comprises determining a corresponding security measure for each of the one or more potential security threats.
4. The method of claim 1, further comprising triggering an alert based on the security intelligence.
5. The method of claim 1, wherein dynamically applying comprises mapping the security measure to the set of virtual appliances and the set of virtual switches.
6. The method of claim 5, wherein dynamically applying comprises dynamically deploying the set of virtual appliances based on the mapping.
7. The method of claim 5, wherein dynamically applying comprises dynamically programming the set of virtual switches using a plurality of packet filters to steer network traffic based on the mapping.
8. The method of claim 1, wherein each of the set of virtual appliances is a virtual machine for performing a pre-defined task and is implemented using network function virtualization.
9. The method of claim 1, wherein each of the set of virtual switches is programmed using software defined networking.
10. The method of claim 1, wherein each of the set of virtual appliances emulates at least one of a firewall, an intrusion prevention system (IPS), a deep packet inspection (DPI), and a network traffic shaper.
11. A system for providing computer network security, the system comprising:
at least one processor; and
a computer-readable medium storing instructions that, when executed by the at least one processor, cause the at least one processor to perform operations comprising:
gathering threat information from one or more sources;
deriving security intelligence based on the threat information;
determining a security measure based on the security intelligence; and
dynamically applying the security measure to a computer network using a set of virtual appliances and a set of virtual switches.
12. The system of claim 11, wherein deriving the security intelligence comprises determining one or more potential security threats by applying at least one of a filter, an analytics, and a reputation based heuristic on the threat information.
13. The system of claim 12, wherein determining the security measure comprises determining a corresponding security measure for each of the one or more potential security threats.
14. The system of claim 11, wherein dynamically applying comprises mapping the security measure to the set of virtual appliances and the set of virtual switches.
15. The system of claim 14, wherein dynamically applying comprises:
dynamically deploying the set of virtual appliances based on the mapping; and
dynamically programming the set of virtual switches using a plurality of packet filters to steer network traffic based on the mapping.
16. The system of claim 11, wherein each of the set of virtual appliances is a virtual machine for performing a pre-defined task, is implemented using network function virtualization, and emulates at least one of a firewall, an intrusion prevention system (IPS), a deep packet inspection (DPI), and a network traffic shaper.
17. The system of claim 11, wherein each of the set of virtual switches is programmed using software defined networking.
18. A non-transitory computer-readable medium storing computer-executable instructions for:
gathering threat information from one or more sources;
deriving security intelligence based on the threat information;
determining a security measure based on the security intelligence; and
dynamically applying the security measure to a computer network using a set of virtual appliances and a set of virtual switches.
Dated this 5th day of October, 2015
Swetha SN
Of K&S Partners
Agent for the applicant
, Description:TECHNICAL FIELD
This disclosure relates generally to computer network, and more particularly to a system and method for providing computer network security.
| Section | Controller | Decision Date |
|---|---|---|
| # | Name | Date |
|---|---|---|
| 1 | 5315-CHE-2015-IntimationOfGrant31-07-2023.pdf | 2023-07-31 |
| 1 | Form 9 [05-10-2015(online)].pdf | 2015-10-05 |
| 2 | 5315-CHE-2015-PatentCertificate31-07-2023.pdf | 2023-07-31 |
| 2 | Form 5 [05-10-2015(online)].pdf | 2015-10-05 |
| 3 | Form 3 [05-10-2015(online)].pdf | 2015-10-05 |
| 3 | 5315-CHE-2015-FORM 3 [18-05-2023(online)].pdf | 2023-05-18 |
| 4 | Form 18 [05-10-2015(online)].pdf | 2015-10-05 |
| 4 | 5315-CHE-2015-Written submissions and relevant documents [18-05-2023(online)].pdf | 2023-05-18 |
| 5 | Drawing [05-10-2015(online)].pdf | 2015-10-05 |
| 5 | 5315-CHE-2015-AMENDED DOCUMENTS [10-04-2023(online)].pdf | 2023-04-10 |
| 6 | Description(Complete) [05-10-2015(online)].pdf | 2015-10-05 |
| 6 | 5315-CHE-2015-Correspondence to notify the Controller [10-04-2023(online)].pdf | 2023-04-10 |
| 7 | REQUEST FOR CERTIFIED COPY [07-10-2015(online)].pdf | 2015-10-07 |
| 7 | 5315-CHE-2015-FORM 13 [10-04-2023(online)].pdf | 2023-04-10 |
| 8 | abstract 5315-CHE-2015.jpg | 2015-10-14 |
| 8 | 5315-CHE-2015-POA [10-04-2023(online)].pdf | 2023-04-10 |
| 9 | 5315-CHE-2015-US(14)-HearingNotice-(HearingDate-03-05-2023).pdf | 2023-03-31 |
| 9 | REQUEST FOR CERTIFIED COPY [02-03-2016(online)].pdf | 2016-03-02 |
| 10 | 5315-CHE-2015-FER_SER_REPLY [08-08-2020(online)].pdf | 2020-08-08 |
| 10 | REQUEST FOR CERTIFIED COPY [23-03-2016(online)].pdf | 2016-03-23 |
| 11 | 5315-CHE-2015-FORM 3 [08-08-2020(online)].pdf | 2020-08-08 |
| 11 | 5315-CHE-2015-Power of Attorney-170316.pdf | 2016-07-11 |
| 12 | 5315-CHE-2015-Form 1-170316.pdf | 2016-07-11 |
| 12 | 5315-CHE-2015-PETITION UNDER RULE 137 [08-08-2020(online)].pdf | 2020-08-08 |
| 13 | 5315-CHE-2015-Correspondence-F1-PA-170316.pdf | 2016-07-11 |
| 13 | 5315-CHE-2015-FER.pdf | 2020-02-10 |
| 14 | 5315-CHE-2015-Correspondence-F1-PA-170316.pdf | 2016-07-11 |
| 14 | 5315-CHE-2015-FER.pdf | 2020-02-10 |
| 15 | 5315-CHE-2015-Form 1-170316.pdf | 2016-07-11 |
| 15 | 5315-CHE-2015-PETITION UNDER RULE 137 [08-08-2020(online)].pdf | 2020-08-08 |
| 16 | 5315-CHE-2015-FORM 3 [08-08-2020(online)].pdf | 2020-08-08 |
| 16 | 5315-CHE-2015-Power of Attorney-170316.pdf | 2016-07-11 |
| 17 | REQUEST FOR CERTIFIED COPY [23-03-2016(online)].pdf | 2016-03-23 |
| 17 | 5315-CHE-2015-FER_SER_REPLY [08-08-2020(online)].pdf | 2020-08-08 |
| 18 | 5315-CHE-2015-US(14)-HearingNotice-(HearingDate-03-05-2023).pdf | 2023-03-31 |
| 18 | REQUEST FOR CERTIFIED COPY [02-03-2016(online)].pdf | 2016-03-02 |
| 19 | 5315-CHE-2015-POA [10-04-2023(online)].pdf | 2023-04-10 |
| 19 | abstract 5315-CHE-2015.jpg | 2015-10-14 |
| 20 | 5315-CHE-2015-FORM 13 [10-04-2023(online)].pdf | 2023-04-10 |
| 20 | REQUEST FOR CERTIFIED COPY [07-10-2015(online)].pdf | 2015-10-07 |
| 21 | 5315-CHE-2015-Correspondence to notify the Controller [10-04-2023(online)].pdf | 2023-04-10 |
| 21 | Description(Complete) [05-10-2015(online)].pdf | 2015-10-05 |
| 22 | 5315-CHE-2015-AMENDED DOCUMENTS [10-04-2023(online)].pdf | 2023-04-10 |
| 22 | Drawing [05-10-2015(online)].pdf | 2015-10-05 |
| 23 | 5315-CHE-2015-Written submissions and relevant documents [18-05-2023(online)].pdf | 2023-05-18 |
| 23 | Form 18 [05-10-2015(online)].pdf | 2015-10-05 |
| 24 | 5315-CHE-2015-FORM 3 [18-05-2023(online)].pdf | 2023-05-18 |
| 24 | Form 3 [05-10-2015(online)].pdf | 2015-10-05 |
| 25 | Form 5 [05-10-2015(online)].pdf | 2015-10-05 |
| 25 | 5315-CHE-2015-PatentCertificate31-07-2023.pdf | 2023-07-31 |
| 26 | Form 9 [05-10-2015(online)].pdf | 2015-10-05 |
| 26 | 5315-CHE-2015-IntimationOfGrant31-07-2023.pdf | 2023-07-31 |
| 1 | search_30-01-2020.pdf |