US 12,316,684 B2
System and method for managing communication paths responsive to compromise events
Ofir Ezrielev, Be'er Sheva (IL); Yehiel Zohar, Sderot (IL); and Lee Serfaty, Be'er Sheva (IL)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Apr. 27, 2023, as Appl. No. 18/308,233.
Prior Publication US 2024/0364751 A1, Oct. 31, 2024
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/205 (2013.01) [H04L 63/0823 (2013.01); H04L 63/1433 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for managing security of a distributed system comprising data processing systems, the method comprising:
identifying an ejection of a data processing system of the data processing systems from the distributed system, the data processing system being ejected due to a likelihood of the data processing system being compromised;
based on the ejection, performing a communication topology analysis of the distributed system to identify any critical links of the distributed system;
making a determination regarding whether any of the critical links are served by the data processing system;
in a first instance of the determination where at least one of the critical link is served by the data processing system:
remodeling the distributed system to eliminate the at least one of the critical links served by the data processing system; and
deprioritizing redundant links of the distributed system served by the data processing system.