US Patent Application 17752987. Systems and Methods for Application Clustering Based on Included Libraries and Observed Events simplified abstract

From WikiPatents
Jump to navigation Jump to search

Systems and Methods for Application Clustering Based on Included Libraries and Observed Events

Organization Name

Cisco Technology, Inc.

Inventor(s)

Ashutosh Kulshreshtha of Cupertino CA (US)

Dhruv Raithatha of San Francisco CA (US)

Walter T. Hulick, Jr. of Pearland TX (US)

Systems and Methods for Application Clustering Based on Included Libraries and Observed Events - A simplified explanation of the abstract

This abstract first appeared for US patent application 17752987 titled 'Systems and Methods for Application Clustering Based on Included Libraries and Observed Events

Simplified Explanation

- The patent application describes a system that suggests proactive security policies for applications based on their software composition and runtime behavior. - The system includes a memory and a processor, and it can access data representing the features of an application running on a computer network. - The features represent the application libraries of the nodes in the network. - The system applies a clustering algorithm to the data to generate multiple cluster sets. - It then determines a security policy to apply to a cluster set and applies it to an application whose features are represented by the data in that cluster set.

  • The system provides proactive security policy suggestions for applications.
  • It considers the software composition and runtime behavior of the applications.
  • It can analyze the features of an application running on a computer network.
  • It clusters the data representing the features to generate multiple cluster sets.
  • It determines and applies a security policy to each cluster set.
  • The security policy is applied to the applications whose features are represented by the data in the cluster set.


Original Abstract Submitted

A system of one embodiment that provides proactive security policy suggestions for applications based on the applications' software composition and runtime behavior. The system includes a memory and a processor. The system is operable to access data that represents one or more features of an application. The application is running on one or more nodes in a computer network, and a feature indicates an application library of the node. The system is operable to apply a clustering algorithm to the data to generate a plurality of cluster sets. The system is operable to determine a security policy to apply to a cluster set of the plurality of cluster sets and apply the security policy to an application whose features are represented by the data in the cluster set.