The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Nov. 19, 2024

Filed:

Oct. 29, 2021
Applicant:

Cisco Technology, Inc., San Jose, CA (US);

Inventors:

Lele Zhang, Shanghai, CN;

Li Zhao, Shanghai, CN;

Chuanwei Li, Shanghai, CN;

Feiliang Wang, Shanghai, CN;

Assignee:

Cisco Technology, Inc., San Jose, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/40 (2022.01); G06F 18/214 (2023.01); G06N 20/00 (2019.01); H04L 45/00 (2022.01); H04L 45/02 (2022.01); H04W 12/121 (2021.01); H04W 12/00 (2021.01);
U.S. Cl.
CPC ...
H04L 63/1425 (2013.01); G06F 18/214 (2023.01); G06N 20/00 (2019.01); H04L 45/02 (2013.01); H04L 45/20 (2013.01); H04L 63/0227 (2013.01); H04L 63/0236 (2013.01); H04L 63/1408 (2013.01); H04L 63/1416 (2013.01); H04L 63/20 (2013.01); H04W 12/121 (2021.01); H04W 12/009 (2019.01);
Abstract

The present disclosure provides a hierarchical method of identifying unauthorized network traffic in a network by applying, at one of a first plurality of nodes of a network, a first level of network traffic analysis to identify received network traffic as one of authorized or suspicious network traffic, the one of the first plurality of nodes having a first path for traffic routing and a second path to one of a second plurality of nodes of the network, the second path being used for forwarding the suspicious network traffic to the one of the second plurality of nodes; tagging the received network traffic as the suspicious network traffic; and sending the suspicious network traffic to the one of the second plurality of nodes over the second path, the second network node applying a second level of network analysis to determine if the received network traffic is authorized, unauthorized or remains suspicious.


Find Patent Forward Citations

Loading…