US 12,294,594 B2
Intelligent quarantine on switch fabric for physical and virtualized infrastructure
Balaji Sundararajan, Fremont, CA (US); Gaurang Rajeev Mokashi, Sunnyvale, CA (US); Preety Mordani, Fremont, CA (US); and Vivek Agarwal, Campbell, CA (US)
Assigned to Cisco Technology, Inc., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Mar. 4, 2024, as Appl. No. 18/594,437.
Application 18/594,437 is a continuation of application No. 18/415,423, filed on Jan. 17, 2024.
Application 18/415,423 is a continuation of application No. 18/171,322, filed on Feb. 17, 2023, granted, now 11,888,876.
Application 18/171,322 is a continuation of application No. 16/826,082, filed on Mar. 20, 2020, granted, now 11,606,369, issued on Mar. 14, 2023.
Prior Publication US 2024/0250966 A1, Jul. 25, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06F 9/455 (2018.01); H04L 43/08 (2022.01); H04L 47/20 (2022.01); H04L 49/25 (2022.01)
CPC H04L 63/1416 (2013.01) [G06F 9/45558 (2013.01); H04L 43/08 (2013.01); H04L 47/20 (2013.01); H04L 49/25 (2013.01); H04L 63/20 (2013.01); G06F 2009/45587 (2013.01); G06F 2009/45595 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
monitoring, at a first node in a switch fabric, data traffic passing into a network environment including a plurality of virtual machines;
detecting, at the first node, a traffic pattern indicative of a denial of service (DOS) attack within the monitored data traffic passing into the virtualized network environment;
generating threat information in response to detecting the traffic pattern indicative of a DOS attack; and
at the first node, using the threat information to block transmission of the DoS attack traffic at the switch fabric prior to the DOS attack traffic entering into either or both the virtual machines and one or more hypervisors hosting the virtual machines in the virtualized network environment.