US 11,895,156 B2
Securing network resources from known threats
Supreeth Hosur Nagesh Rao, Cupertino, CA (US); Navindra Yadav, Cupertino, CA (US); Tapan Shrikrishna Patwardhan, Mountain View, CA (US); Umamaheswaran Arumugam, San Jose, CA (US); Darshan Shrinath Purandare, Fremont, CA (US); Aiyesha Ma, San Francisco, CA (US); Hongyang Zhang, Mountain View, CA (US); and Kai Zhu, San Jose, CA (US)
Assigned to Cisco Technology, Inc., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Sep. 13, 2022, as Appl. No. 17/931,595.
Application 17/931,595 is a continuation of application No. 17/003,364, filed on Aug. 26, 2020, granted, now 11,483,351.
Prior Publication US 2023/0012641 A1, Jan. 19, 2023
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/20 (2013.01) [H04L 63/101 (2013.01); H04L 63/145 (2013.01); H04L 63/1416 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method comprising:
receiving a list of network threats;
transforming the list of network threats into a format compatible with existing exchange protocols between a server and sensors of a network;
packaging the transformed list into existing data packs exchanged between the server and the sensors;
defining policies for the threats by creating annotations to tag compromised network elements;
deploying the defined policies and the existing data packs with the transformed list of threats feeds to the sensors;
collecting continuous feedback from the sensors on various statistics collected by the sensors on performance and data traffic between their respective network elements; and
updating the policies based upon the collected statistics.