Movatterモバイル変換


[0]ホーム

URL:


Zaheer, 2019 - Google Patents

Eztrust: Network Independent Perimeterization for Microservices

Zaheer, 2019

Document ID
7309079874097973506
Author
Zaheer Z
Publication year

External Links

Snippet

Emerging microservices-based workloads introduce new security risks in today's data centers as attacks can propagate laterally within the data center relatively easily by exploiting cross-service dependencies. As countermeasures for such attacks, traditional …
Continue reading atsearch.proquest.com (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3409Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • H04L47/10Flow control or congestion control
    • H04L47/24Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
    • H04L47/2441Flow classification

Similar Documents

PublicationPublication DateTitle
Zaheer et al.eztrust: Network-independent zero-trust perimeterization for microservices
US20220103593A1 (en)Systems and methods for securing a workload
US11949656B2 (en)Network traffic inspection
Yu et al.A survey on security issues in services communication of Microservices‐enabled fog applications
US11457040B1 (en)Reverse TCP/IP stack
US7725934B2 (en)Network and application attack protection based on application layer message inspection
Goltzsche et al.Endbox: Scalable middlebox functions using client-side trusted execution
US10020941B2 (en)Virtual encryption patching using multiple transport layer security implementations
US20060123226A1 (en)Performing security functions on a message payload in a network element
WO2020015838A1 (en)Zero trust perimeterization for microservices
Beer et al.Adaptive security architecture for protecting RESTful web services in enterprise computing environment
US20250193249A1 (en)Inventory monitoring for cloud resource protection in real time
Chandramouli et al.Attribute-based access control for microservices-based applications using a service mesh
Bradatsch et al.ZTSFC: a service function chaining-enabled zero trust architecture
US20220329433A1 (en)Methods, systems, articles of manufacture and apparatus to protect distributed data
Tseng et al.A comprehensive 3‐dimensional security analysis of a controller in software‐defined networking
Walsh et al.Intra-cloud and inter-cloud authentication
Sánchez et al.Security issues and threats that may affect the hybrid cloud of FINESCE
Budigiri et al.Zero-cost in-depth enforcement of network policies for low-latency cloud-native systems
Benzidane et al.Application-based authentication on an inter-VM traffic in a cloud environment
ZaheerEztrust: Network Independent Perimeterization for Microservices
PattaranantakulMoving towards software-defined security in the era of NFV and SDN
Sanghavi et al.Software-defined networks a brief overview and survey of services
Chifor et al.IoT Cloud Security Design Patterns
Nikbakht Bideh et al.Chuchotage: In-line Software Network Protocol Translation for (D) TLS

[8]
ページ先頭

©2009-2025 Movatter.jp