US 12,407,731 B2
Routing techniques for enhanced network security
Madhan Sankaranarayanan, Chinnamanur (IN); Nagendra Kumar Nainar, Morrisville, NC (US); Jaganbabu Rajamanickam, Kanata (CA); Selvam Murugesan, Chennai (IN); Monitto Pitchaimani Sebastin, Tiruchirappalli (IN); and Craig Thomas Hill, Sterling, VA (US)
Assigned to Cisco Technology, Inc., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Jul. 13, 2023, as Appl. No. 18/352,165.
Prior Publication US 2025/0023919 A1, Jan. 16, 2025
Int. Cl. H04L 9/40 (2022.01); H04L 45/24 (2022.01)
CPC H04L 63/20 (2013.01) [H04L 45/24 (2013.01); H04L 63/1425 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
receiving, using a first routing protocol, a first security metric associated with a first path to a destination node, wherein the first security metric is associated with a first weight;
determining, using a first path computation operation associated with the first routing protocol, a first routing protocol cost measure associated with the first path;
determining, based on the first security metric, a first security cost measure associated with the first path;
determining, based on the first routing protocol cost measure and the first security cost measure, that the first path is recommended by the first routing protocol for data transmission to the destination node;
receiving, using a second routing protocol, a second security metric associated with a second path to the destination node, wherein the second security metric is associated with a second weight;
determining, using a second path computation operation associated with the second routing protocol, a second routing protocol cost measure associated with the second path;
determining, based on the second security metric, a second security cost measure associated with the second path;
determining, based on the second routing protocol cost measure and the second security cost measure, that the second path is recommended by the second routing protocol for data transmission to the destination node; and
based at least in part on determining that the first path and the second path are distinct, determining a selected path to the destination node based at least in part on the first weight and the second weight.