18095536. SECURITY THREAT ANALYSIS simplified abstract (VMware, Inc.)

From WikiPatents
Jump to navigation Jump to search

SECURITY THREAT ANALYSIS

Organization Name

VMware, Inc.

Inventor(s)

Stijn Vanveerdeghem of Topanga CA (US)

Abha Mutalik of Mountain View CA (US)

Robin Manhas of Cupertino CA (US)

Geoff Shukin of Calgary (CA)

Nikhil Sangvikar of Mountain View CA (US)

Priya Joshi of San Jose CA (US)

SECURITY THREAT ANALYSIS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18095536 titled 'SECURITY THREAT ANALYSIS

The abstract describes methods and systems for security threat analysis involving the injection of a test packet with malicious content into a network path between two virtualized computing instances.

  • First computer system configures a test packet with malicious content for forwarding along a network path.
  • Test packet is injected at the first network element and forwarded towards the second network element.
  • Security checkpoint detects the test packet and applies security policies, generating report information for a management entity.
  • Report information indicates detectability of malicious content based on security policies.

Potential Applications: - Network security testing and analysis - Intrusion detection system development - Cybersecurity threat assessment

Problems Solved: - Identifying and analyzing security threats in network environments - Testing the effectiveness of security policies and measures

Benefits: - Enhanced network security through proactive threat analysis - Improved response to potential security breaches - Efficient management of security incidents

Commercial Applications: Title: Network Security Threat Analysis System This technology can be used by cybersecurity firms, IT departments, and network security companies to enhance the security posture of their systems and networks. It can also be integrated into security products and services for businesses looking to strengthen their defenses against cyber threats.

Questions about Security Threat Analysis: 1. How does this technology improve network security measures?

  - This technology enhances network security by proactively identifying and analyzing potential security threats, allowing for the implementation of effective security policies.

2. What are the key features of this security threat analysis system?

  - The key features include the injection of test packets with malicious content, detection by security checkpoints, application of security policies, and generation of report information for analysis.


Original Abstract Submitted

Example methods and systems for security threat analysis are described. One example may involve a first computer system configuring a test packet that includes malicious content for forwarding along a network path between (a) a first network element that is connected with a first virtualized computing instance and (b) a second network element that is connected with a second virtualized computing instance. The test packet may be injected at the first network element and forwarded towards the second network element. In response to a security checkpoint detecting the test packet, the security checkpoint may apply one or more security policies on the test packet; and generate and send report information towards a management entity. The report information may indicate whether the malicious content in the test packet is detectable based on the one or more security policies.