CPC H04L 63/1441 (2013.01) [H04L 63/0428 (2013.01); H04L 63/1416 (2013.01); H04L 63/1425 (2013.01); H04L 63/1433 (2013.01)] | 20 Claims |
1. A method for performing an application migration operation, the method comprising:
initiating the application migration operation to migrate an application from a source device to a target device, wherein the source device comprises a source data migration agent (SDMA) and the target device comprises a target data migration agent (TDMA);
initiating an active scan, wherein the active scan comprises:
determining a type of the application;
determining, based on the type, known vulnerabilities and performance metrics of the application;
monitoring, based on the known vulnerabilities, a network traffic of the source device; and
monitoring, based on the performance metrics of the application, source performance metrics of the source device;
establishing a secure data path between the source device and the target device by:
obtaining, by the SDMA in response to the initiation of the active scan, coordinated universal time (UTC)-based system time of the source device;
generating, by the SDMA, a secure string based on the coordinated UTC-based system time and a configuration parameter set by a user of the source device;
encrypting, by the SDMA, the secure string to generate an encrypted secure string;
appending, by the SDMA, the encrypted secure string to an application migration notification to generate an encrypted secure string-appended request;
sending, by the SDMA, the encrypted secure string-appended request to the TDMA;
receiving, from the TDMA, a confirmation that the encrypted secure string-appended request was properly received; and
initiating, by the SDMA and based on the first confirmation, the secure data path from the source device to the target device;
beginning migration of the application from the source device to the target device using the secure data path;
making a first determination, using the active scan, that the network traffic or the source performance metrics are indicative of suspicious activity;
logging information about the suspicious activity;
making a second determination that the application migration operation is complete; and
terminating the active scan and the secure data path based on the second determination.
|