throbber
Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 1 of 114 PageID #: 1933
`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 1 of 114 PagelD #: 1933
`
`EXHIBIT A
`
` EXHIBIT A
`
`

`

`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 2 of 114 PageID #: 1934
`sessseTTTTATA
`
`US011722554B2
`
`US 11,722,554 B2
`(10) Patent No:
`a2) United States Patent
`Kerenet al.
`(45) Date of Patent:
`*Aug. 8, 2023
`
`
`(54) SYSTEM AND METHOD FOR ANALYZING
`NETWORK OBJECTS IN A CLOUD
`ENVIRONMENT
`
`(72)
`
`(71) Applicant: Wiz, Inc., Palo Alto, CA (US)
`,
`.
`Inventors: Shai Keren, Tel Aviv (IL); Danny
`Shemesh, Tel Aviv (IL); Roy Reznik,
`Tel Aviv (IL); Ami Luttwak,
`Binyamina (IL); Avihai Berkovitz, Tel
`Aviv (IL)
`
`.
`:
`(73) Assignee: WIZ, INC., New York, NY (US)
`.
`.
`.
`.
`.
`(*) Notice:
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(58) Field of Classification Search
`CPC ... HO4L 67/10; HO4L 41/046; HO4L 41/5096;
`HO4L 49/70; HO4L 63/1433
`USPC ....... 709/201, 204, 205, 217, 218, 219, 223,
`709/224
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`7,392,539 B2*
`6/2008 Brooks ........0..... HO4L 63/0263
`709/224
`1/2019 Eggen wo... HO4L 41/0896
`2/2021 Newian ee HO4L 47/12
`(Continued)
`
`10,171,300 B2*
`10,924,347 BL*
`
`This patent is subject to a terminal dis-
`claimer.
`(21) Appl. No.: 17/819,442
`R
`.
`No.:
`
`Primary Examiner — Liang Che A Wang
`Assistant Examiner — Liangche A Wang
`(74) Attorney, Agent, or Firm — M&B IP Analysts, LLC
`
`Filed:
`
`Aug. 12, 2022
`
`(57)
`
`ABSTRACT
`
`(22)
`
`(65)
`
`Prior Publication Data
`US 2022/0394082 Al
`Dec.
`8. 2022
`
`Related U.S. Application Data
`(63) Continuation of application No. 17/109,883,filedon
`Dec. 2, 2020, now Pat. No. 11,431,786.
`
`(51)
`
`Int. Cl.
`GO6F 15/173
`HOAL 67/10
`HOAL 49/00
`HOAL 9/40
`HOAL 41/50
`HOAL 41/046
`(52) U.S. Cl.
`CPC wee HOAL 67/10 (2013.01); HO4E 41/046
`(2013.01); HO4E 41/5096 (2013.01); HO4L
`49/70 (2013.01); HO4E 63/1433 (2013.01)
`
`(2006.01)
`(2022.01)
`(2022.01)
`(2022.01)
`(2022.01)
`(2022.01)
`
`A method and system for determining abnormal configura-
`tion of network objects deployed in a cloud computing
`environment are provided. The method includes collecting
`network object data on a plurality of network objects
`deployed in the cloud computing environment; constructing
`a network graph basedon the collected network object data,
`wherein the network graph includes a visual representation
`of network objects identified in the cloud computing envi-
`ronment; determining relationships between the identified
`network objects in the network graph, wherein the deter-
`mined relationships between the identified network objects
`includes descriptions of connections between the identified
`network objects; and analyzing the network graph and the
`determined relationships to generate insights, wherein the
`generated insights include at least a list of abnormal con-
`nections between the identified network objects.
`
`21 Claims, 6 Drawing Sheets
`
`200
`
`
`$210
`
`Identify and collect network object data
`$220
`
`
`
`
`
`
`Construct network graph
`
`$230
`
`Determine objectrelationships
`
`$240
`
`Generate insights
`
`v
`$250
`Tag objects
`
`End
`
`

`

`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 3 of 114 PageID #: 1935
`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 3 of 114 PagelD #: 1935
`
`US 11,722,554 B2
`
`Page 2
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`2004/0019803 Al
`2014/0157417 Al*
`
`2016/0044057 Al
`2016/0048556 AL*
`
`1/2004 Jahn
`6/2014 Grubel oe. HO4L 63/20
`726/25
`
`2/2016 Chenette et al.
`2/2016 Kelly we G06Q 10/10
`707/767
`. HO4L 63/1425
`2016/0359872 AL* 12/2016 Yadav ..
`2016/0373944 AL* 12/2016 Jain wee HO4L 43/08
`
`2017/0075981 Al*
`3/2017 Carlsson
`. HO4AL 41/0826
`1/2018 Kia wee GO6F 40/18
`2018/0024981 AL*
`715/215
`3/2019 Booker... GO6F 16/9024
`2019/0095530 AL*
`8/2020 Atighetchi et al.
`2020/0267175 Al
`2020/0322227 Al* 10/2020 Janakiraman ......... HO4L 41/147
`2020/0374343 Al* 11/2020 Novotny.....
`iraman2020/0382539 Al* 12/2020 Janakiraman
`
`
`* cited by examiner
`
` . GO6F 16/9024
`
`....... HO4L 63/0428
`
`

`

`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 4 of 114 PageID #: 1936
`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 4 of 114 PagelD #: 1936
`
`Sheet 1 of 6
`
`US 11,722,554 B2
`
`ddy
`
`901
`
`U.S. Patent
`
`Aug.8, 2023
`
`
`
`UNOReidPROD
`
`U-POL
`
`
`
`
`
`JUSWUOJIAUSPNOjD
`
` eOL
`
`cOL
`
`
`
`UNOPefdpnojyo
`
`tPOl
`
`
`
`pealqoyolgo
`
`
`
`
`
`U-GOLb-GOL
`
`Ayunses
`
`Wwa}shS
`
`OSL
`
`YIOMISN
`
`VESid
`
`sagh 801
`
`
`
`
`
`
`
`

`

`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 5 of 114 PageID #: 1937
`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 5 of 114 PagelD #: 1937
`
`U.S. Patent
`
`Aug.8, 2023
`
`Sheet 2 of 6
`
`US 11,722,554 B2
`
`YIOMION
`
`
`
`yelqouuosje|dpnojo
`
`yIOMION
`
`yoalgo
`
`YIOMION
`
`yoalgo
`
`
`
`OLE[-SOL
`
`ab“Sls
`
`YIOMION
`
`yoalgo
`
`e-SOL
`
`yougns
`
`L-OL
`
`YIOMJON
`
`palgo
`
`~-“caeasommeomwo
`
`.~soywenseuaQg/Yx.~
`
`
`
`
`
`
`
`
`
`

`

`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 6 of 114 PageID #: 1938
`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 6 of 114 PagelD #: 1938
`
`U.S. Patent
`
`Aug.8, 2023
`
`Sheet 3 of6
`
`US 11,722,554 B2
`
`200
`
`RORQNOteiOiO
`aOoinNNNcnaNKoon)oOiO
`
`Start
`
`Identify and collect network object data
`
`Construct network graph
`
`Determine object relationships
`
`Generate insights
`
`Tag objects
`
`End
`
`FIG, 2
`
`

`

`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 7 of 114 PageID #: 1939
`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 7 of 114 PagelD #: 1939
`
`Sheet 4 of6
`
`US 11,722,554 B2
`
`340
`
`U.S. Patent
`
`315
`
`Aug.8, 2023
`
`FIG.3A
`
`

`

`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 8 of 114 PageID #: 1940
`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 8 of 114 PagelD #: 1940
`
`U.S. Patent
`
`Aug.8, 2023
`
`Sheet 5 of6
`
`US 11,722,554 B2
`
`
`
`:
`age
` nodePort/Mower-sve
`
` AES
`
`cortral-~i: 984 1859 187SSin
`
`gee Scab itetei bee regiyPeagoes
`
`£3
`byternest
`
`FIG. 3B
`
`

`

`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 9 of 114 PageID #: 1941
`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 9 of 114 PagelD #: 1941
`
`U.S. Patent
`
`Aug.8, 2023
`
`Sheet 6 of 6
`
`US 11,722,554 B2
`
`150
`
`Processing
`Circuitry
`
`Storage
`430
`
`410
`
`Network
`
`Interface
`
`440
`
`FIG, 4
`
`

`

`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 10 of 114 PageID #: 1942
`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 10 of 114 PagelD #: 1942
`
`US 11,722,554 B2
`
`1
`SYSTEM AND METHOD FOR ANALYZING
`NETWORK OBJECTS IN A CLOUD
`ENVIRONMENT
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`This application is a continuation of U.S. patent applica-
`tion Ser. No. 17/109,883 filed Dec. 2, 2020, the contents of
`which are hereby incorporated by reference.
`
`TECHNICAL FIELD
`
`The present disclosure relates generally to network
`administration,
`in particular,
`to systems and methods for
`analyzing networks.
`
`BACKGROUND
`
`As businesses, governments, and other organizations
`expand and increase their digital presence through various
`computer, network, and web technologies, the sameparties
`may be increasingly vulnerable to developing cyber-threats.
`While updated solutions provide for management of prior
`cyber-threats, the same systems may include new vulner-
`abilities, which attackers may seek to identify and exploit to
`gain access to sensitive systems and data. Specifically, as
`organizationstransition into multi-level computing systems,
`implementing computing solutions at the individual, group,
`team, and cloudlevels, these systems, and the links between
`the elements of the layers, as well as the links between
`elements of different layers, include vulnerabilities which
`prior solutions fail to address.
`Due to the distributed nature of large, multi-layered
`network systems, management of network access and use
`may be difficult or impossible for lone administrators or
`teams of administrators. Managementof such code-to-cloud
`systems, and protection of the same, may require monitoring
`of large numbers of devices, systems, and components.
`Further, as each device, system, or component of a network
`system may be variously connected with the other elements
`of the system,
`including connections with multiple other
`devices via multiple protocols, management and monitoring
`of individual devices and connections may be untenable.
`To address the need to managelarge, distributed network
`systems, operators and administrators may employ various
`solutions to provide for network analysis. Certain network
`analysis solutions include manual review of devices, con-
`nections, and networks, providing for thorough, specific
`analysis of individual elements of a network. However, such
`manual solutions may require prohibitive outlays of time
`and effort
`to successfully review every component and
`connection of a large, multi-layer network, thus failing to
`provide a solution for analysis of modern network systems.
`In addition, various analysis solutions include solutions
`directed to the monitoring of specific device types, such as,
`for example, firewall control systems, which may provide
`for managementofall firewalls installed in a given network.
`Sunilarly, protocol-specific analysis solutions may provide
`for monitoring ofall traffic occurring over given protocols,
`within the network. However, such specialized solutions
`may fail to provide for streamlined monitoring and man-
`agement of all components and connections of a network,
`where the network includes multiple types of devices com-
`municating via multiple protocols. Further, protocol-agnos-
`tic solutions may provide for overall traffic management,
`providing monitoring and management solutions for all
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`traffic arising within a network. However, such protocol-
`agnostic solutions may be over-broad, providing irrelevant
`or redundant information, and may require specification of
`connections to monitor, reducing efficacy in network-man-
`agement contexts, while failing to provide device-specific
`insights, thereby failing to provide for integrated device and
`connection analysis within a complex, multi-layer network.
`In addition, certain solutions providing for the manage-
`ment of large, distributed network systems may fail
`to
`provide for agentless management, non-logging solutions,
`and the like. Agentless management, whereby such large,
`distributed network systems are managed without the use of
`a dedicated management agent system or device, may pro-
`vide for reduced maintenance requirements, as a manage-
`ment agent may require operation and maintenance in addi-
`tion to the efforts required by the remainder of the network.
`In addition to failing to provide for agentless management,
`various solutions for the management of large, distributed
`network systems fail to provide for non-logging manage-
`ment of the same. Non-logging management, where network
`analyses and other management processes are executed
`withoutreference to netflow logs, provides for reductions in
`management computing requirements and resource depen-
`dency when compared with logging solutions, which may
`require, without limitation, the execution of additional pro-
`cessing steps or tasks to analyze or process netflow logs, the
`dependency of the management solution or process on
`various netflow log resources or repositories, and thelike. In
`addition to the shortcomings described above, current solu-
`tions for managementof large, distributed network systems
`mayfail to provide for agentless, non-logging management.
`It would therefore be advantageousto provide a solution
`that would overcome the challenges noted above.
`
`SUMMARY
`
`A summary of several example embodiments of the
`disclosure follows. This summary is provided for the con-
`venience of the reader to provide a basic understanding of
`such embodiments and does not wholly define the breadth of
`the disclosure. This summary is not an extensive overview
`of all contemplated embodiments and is intended to neither
`identify key or critical elements of all embodiments nor to
`delineate the scope of anyor all aspects. Its sole purpose is
`to present some concepts of one or more embodiments in a
`simplified form as a prelude to the more detailed description
`that is presented later. For convenience, the terms “some
`embodiments” or “certain embodiments” may be used
`herein to refer to a single embodiment or multiple embodi-
`ments of the disclosure.
`Certain embodiments disclosed herein include a for deter-
`mining abnormal configuration of network objects deployed
`in a cloud computing environment. The method comprising:
`collecting network object data on a plurality of network
`objects deployed in the cloud computing environment; con-
`structing a network graph based on the collected network
`object data, wherein the network graph includes a visual
`representation of network objects identified in the cloud
`computing environment; determining relationships between
`the identified network objects in the network graph, wherein
`the determined relationships between the identified network
`objects includes descriptions of connections between the
`identified network objects; and analyzing the network graph
`and the determined relationships to generate insights,
`wherein the generated insights include at least a list of
`abnormal connections between the identified network
`
`objects.
`
`

`

`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 11 of 114 PageID #: 1943
`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 11 of 114 PagelD #: 1943
`
`US 11,722,554 B2
`
`3
`In addition, certain embodiments disclosed herein include
`a system for determining abnormal configuration of network
`objects deployed in a cloud computing environment, com-
`prising: a processing circuitry; and a memory, the memory
`containing instructions that, when executed by the process-
`ing circuitry, configure the system to: collect network object
`data on a plurality of network objects deployed in the cloud
`computing environment; construct a network graph based on
`the collected network object data, wherein the network
`graph includes a visual representation of network objects
`identified in the cloud computing environment; determine
`relationships between the identified network objects in the
`network graph, wherein the determined relationships
`between the identified network objects includes descriptions
`of connections between the identified network objects; and
`analyze the network graph and the determinedrelationships
`to generate insights, wherein the generated insights include
`at least a list of abnormal connections between the identified
`
`network objects.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The subject matter disclosed herein is particularly pointed
`out and distinctly claimed in the claimsat the conclusion of
`the specification. The foregoing and other objects, features,
`and advantagesof the disclosed embodiments will be appar-
`ent from the following detailed description taken in con-
`junction with the accompanying drawings.
`FIG. 1A is a diagram of a cloud environmentutilized to
`describe the various embodiments.
`
`FIG.1B is a network diagram depicting a network system
`and various associated network and external objects, accord-
`ing to an embodiment.
`FIG.2 is a flowchart depicting a method for constructing
`a network graph for a network system, according to an
`embodiment.
`FIG. 3A is an example network graph schema, according
`to an embodiment.
`FIG. 3B is a network graph object list, configured to
`provide information describing object-to-object
`routing
`within a network graph, according to an embodiment.
`FIG. 4 is a hardware block diagram depicting a code
`compliance system, according to an embodiment.
`
`DETAILED DESCRIPTION
`
`It is important to note that the embodiments disclosed
`herein are only examples of the many advantageous uses of
`the innovative teachings herein.In general, statements made
`in the specification of the present application do not neces-
`sarily limit any of the various claimed embodiments. More-
`over, some statements may apply to someinventive features
`but not to others. In general, unless otherwise indicated,
`singular elements may be in plural and vice versa with no
`loss of generality. In the drawings, like numeralsreferto like
`parts through several views.
`The systems and methods described herein may beappli-
`cable to various systems, devices, networks, environments,
`layers, and the like, as well as cross-connections or multi-
`entity connections as may be established therebetween. The
`disclosed systems and methods maybeapplicable to provide
`support for various network features including, without
`limitation, application-layer communications, cloud-native
`constructs, cross-cloud and Kubernetes-to-cloud communi-
`cations, third-party features, such as third-party containers
`and objects, container-management systems, such as Kuber-
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`netes, as may be virtualized as cloud objects, and thelike, as
`well as any combination thereof.
`FIG. 1A is an example diagram 100 of a cloud environ-
`ment 103 utilized to describe the various embodiments. A
`cloud environment 103 represents an organization’s cloud-
`based resources, and the various connections between such
`resources. The cloud environment 103 may include a num-
`ber of cloud computing platforms, 104-1 through 104-n
`(hereinafter, “cloud platforms” 104 or “cloud platform”
`104), where a cloud platform may include multiple network
`objects, 105-1 through 105-7 (hereinafter, “network objects”
`105 or “network object” 105), one or more applications
`(collectively referred to as applications or apps 106), and the
`like, as well as any combination thereof. Further, the cloud
`environment may be configured to connect, via a network
`108, with a cyber-security system 150 for one or more
`purposesincluding, without limitation, those described here-
`inbelow. As is applicable to the cloud platforms 104 and
`network objects 105, “n”is an integer having a value greater
`than or equal to two. Further, it may be understood that,
`while a single configuration of a cloud environment 103 is
`shown for purposes of simplicity, a cloud environment 103
`may include various combinationsof platforms 104, objects
`105, applications 106, and the like, as well as any combi-
`nation thereof, without loss of generality or departure from
`the scope of the disclosure.
`A cloud platform 104 is a platform, architecture, or other,
`like, configuration providing for connectivity of the various
`objects 106, applications 106, and other,
`like, elements
`included in a cloud platform 104, as well as the execution of
`various processes, instructions, and the like. A cloud plat-
`form 104 may be a commercially-available cloud system,
`provided on a service basis, such as, as examples and
`without limitation, Amazon AWS®, Microsoft Azure®, and
`the like. A cloud platform 104 may be a private cloud, a
`public cloud, a hybrid cloud, and the like. In addition, a
`cloud platform 104 may include, without limitation, con-
`tainer orchestration or management systems or platforms
`such as, as an example and without limitation, a Kuber-
`netes® deployment, andthe like, as well as any combination
`thereof.
`A cloudplatform 104 may be implemented as a physical
`network of discrete, interconnected objects, and the like, a
`virtual network, providing for interconnection of various
`virtual systems and devices, as well as a hybrid physical-
`virtual network,
`including both physical and virtualized
`components. A cloud platform 104 may be, or may replicate
`or otherwise simulate or emulate, as examples, and without
`limitation, a local area network, a wide area network, the
`Internet, the World-Wide Web (WWW), andthelike, as well
`as any combination thereof. Further, a cloud platform 104
`mayinclude one or more subnets, such as the subnets, 130,
`of FIG. 1B, below, wherein each subnet may be configured
`to serve as a cloud platform 104 for the various network
`objects which maybeincludedin the subnet, while retaining
`the connectivity and functionalities provided by the cloud
`platform 104.
`Network objects 105, as may be included in a cloud
`platform 104, are objects, systems, devices, components,
`applications, entities, and the like, configured to operate
`within the cloud platform 104 and provide various function-
`alities therein. Specifically, the network objects 105 may be
`objects configured to send, receive, or both send andreceive,
`network data. The network objects 105 may be configured to
`connect with various other network objects 105, various
`external objects, and the like, as well as any combination
`thereof, for purposes including, without limitation, sending
`
`

`

`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 12 of 114 PageID #: 1944
`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 12 of 114 PagelD #: 1944
`
`US 11,722,554 B2
`
`5
`data, receiving data, monitoring data transmissions, moni-
`toring network status and activity, and the like, as well as
`any combination thereof.
`Examples of network objects 105, as may be relevant to
`the methods, processes, and descriptions provided herein
`include, without limitation, objects providing support for
`application-layer communications and systems,
`including
`application-layer communications and systems relevant to
`layer seven of the open systems interconnection (OSI)
`model. Further examples of network objects 105, relevant to
`the methods, processes, and descriptions provided herein,
`include, without limitation, cloud-native constructs, such as
`private endpoints, transit gateways, tag-based rulesets and
`objects configured to apply such rules, Kubernetes Istio and
`Calico services and applications, and the like. In addition,
`examples of network objects 105 may include, without
`limitation, third-party containers and images, such as Nginx,
`web-access firewall (WAF), and firewall implementations,
`multi-object or cross-object connections, such as cross-
`cloud connections and Kubernetes-to-cloud connections, as
`well as container managers, such as Kubernetes, and con-
`nections therewith. It may also be understood that network
`objects 105 may include other objects similar to those
`described hereinabove, as well as any combination thereof.
`As another example, network objects may include virtual
`entities, devices, and the like, to process layer-7 (application
`layer) traffic, such as objects relevant to Amazon AWS®
`layer seven services and applications, Amazon Load Bal-
`ancer® (ALB) layer seven services and applications, Kuber-
`netes ingress, and thelike.
`The network objects 105 may be configured to include
`one or more communication ports, where the included
`communication ports provide for connection of various
`objects according to one or more protocols, and at different
`communication layers of the OSI model.
`In an example configuration, the network objects 105 are
`virtual entities or instances of systems, devices, or compo-
`nents, including virtual systems, devices, or components, or
`any combination thereof. Examples of network objects 105
`include, without limitation, virtual networks, firewalls, net-
`work interface cards, proxies, gateways, containers, con-
`tainer management objects, virtual machines, subnets 130,
`hubs, virtual private networks (VPNs), and the like, as well
`as any combination thereof.
`The applications 106, as may be executed in one or more
`cloud platforms 104, are services, processes, and the like,
`configured to provide one or more functionalities by execu-
`tion of various commandsandinstructions. The applications
`106 maybe part of a software project of an enterprise or
`organization. The applications 160 may interact or commu-
`nicate with other applications, regardless of the platform 104
`in which the applications 106 are deployed. It should be
`understood that a single application,
`including the same
`application, may be both present and executed in multiple
`cloud platforms 104, including multiple cloud platforms 104
`of the same cloud environment 103, without loss of gener-
`ality or departure from the scope of the disclosure.
`The network 108 is a communication system providing
`for the connection of the cloud environment 103, and its
`various components and sub-parts, with a cyber-security
`system 150, as well as other,
`like, systems, devices, and
`components, and any combination thereof. The network 108
`may be implemented as a physical network of discrete,
`systems, devices, components, objects, andthe like, a virtual
`network, providing for interconnection of various virtual
`systems and devices, as well as a hybrid physical-virtual
`network,
`including both physical and virtualized compo-
`
`5
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`nents. The network 108 may be, as examples, and without
`limitation, a local area network, a wide area network, the
`Internet, the World-Wide Web (WWW), andthelike, as well
`as any combination thereof.
`The cyber-security system 150 is a system, device, or
`component, configured to provide one or more network
`analysis functionalities including, without limitation, net-
`work analysis, traffic analysis, object querying, graph gen-
`eration, and the like, as well as any combination thereof. The
`cyber-security system 150 may be configured to execute one
`or more instructions, methods, processes, and the like,
`including, without limitation,
`the process described with
`respect to FIG.2, other, like, processes, and any combination
`thereof.
`
`The cyber-security system 150 may be configured as a
`physical system, device, or component, as a virtual system,
`device, or component, or in a hybrid physical-virtual con-
`figuration. A detailed description of a cyber-security system,
`150, according to an embodiment, is provided with respect
`to FIG. 4, below. It may be understood that, while the
`cyber-security system 150 is depicted in FIG. 1A as a
`discrete element external to the cloud environment 103, the
`cyber-security system 150 maybe included within any of the
`various elements of the network system 102, including the
`cloud environment 103, the various cloud platforms 104,
`and subparts thereof, and the network 108, without loss of
`generality or departure from the scope of the disclosure.
`FIG. 1B is an example diagram depicting a network
`system 100 and various associated network and external
`objects, according to an embodiment. The depicted network
`system 100 includes a cloud platform 110, where the cloud
`platform 110 may be a cloud platform similar or identical to
`a cloud platform, 104, of FIG. 1A, above. The cloud
`platform 110 includes various subnets, 130-1 through 130-n
`(hereinafter, “subnets” 130 or “subnet” 130), and various
`network objects, 105-1 through 105-m (hereinafter, “net-
`work objects” 105 or “network object” 105). As applicable
`to the subnets 130, “n” is an integer having a value greater
`than or equal to two. Further, as applicable to the network
`objects 105, “m”is an integer having a value greater than or
`equal to five. In addition, while the network system 100 of
`FIG. 1B includes certain elements and combinations of
`
`elements, as well as connections therebetween, it may be
`understood that the depiction is provided for illustrative
`purposes, and that other,
`like, elements, combinations of
`elements, and connections therebetween may be imple-
`mented without loss of generality or departure from the
`scope of the disclosure. Other, like, network systems 100
`may further include multiple cloud platforms 110, including
`variously-interconnected cloud platforms 110, and other,
`like, variations and configurations, without loss of generality
`or departure from the scope of the disclosure.
`As described with respect to FIG. 1A, above, the cloud
`platform 110 is a platform, architecture, or other,
`like,
`configuration providing for connectivity of the various sys-
`tems, devices, and components described with respect to
`FIG. 1B. The cloud platform 110 may be a commercially-
`available cloud system, provided on a service basis, such as,
`as examples and without
`limitation, Amazon AWS®,
`Microsoft Azure®, andthe like. The cloud platform 110 may
`be a private cloud, a public cloud, a hybrid cloud, and the
`like. The cloud platform 110 may be implemented as a
`physical networkof discrete, interconnected objects, and the
`like, a virtual network, providing for interconnection of
`various virtual systems and devices, as well as a hybrid
`physical-virtual network, including both physical and virtu-
`alized components. The cloud platform 110 may be, or may
`
`

`

`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 13 of 114 PageID #: 1945
`Case 1:23-cv-00758-JLH Document 70-1 Filed 06/04/24 Page 13 of 114 PagelD #: 1945
`
`US 11,722,554 B2
`
`7
`replicate or otherwise simulate or emulate, as examples, and
`without limitation, a local area network, a wide area net-
`work, the Internet, the World-Wide Web (WWW), and the
`like, as well as any combination thereof. Further, as
`described with respect to FIG. 1A, above, the cloud platform
`110 may include one or more subnets 130, wherein each
`subnet 130 may be configured to serve as a cloud platform
`110 for the various network objects 105 included in the
`subnet 130, while retaining the connectivities and function-
`alities provided by the cloud platform 110.
`The cloud platform 110 may be configured to include an
`orchestrator 115. The orchestrator 115 is configured to
`provide for management of the cloud platform 110. The
`orchestrator 115 may be configured to provide one or more
`functionalities including, without limitation, monitoring of
`elements or components of the cloud platform 110, logging
`and reporting data relating to the cloud platform 110, man-
`aging cloud platform 110 updates and maintenance, gener-
`ating cloud platform 110 alerts, as well as other,
`like,
`functionalities, and any combination thereof. The orchestra-
`tor 115 may be configured to report one or more data
`features related to the cloud platform 110, such as may be
`requested during the execution of network analysis pro-
`cesses, such as those described hereinbelow.
`The network objects 105 are network objects similar or
`identical to those network objects, 105, of FIG. 1A, above.
`As described with respect to FIG. 1A, the network objects
`105 are virtual entities or instances of systems, devices, or
`components, including virtual systems, devices, or compo-
`nents, or any combination thereof. Examples of network
`objects 105 include, without limitation, virtual networks,
`firewalls, network interface cards, proxies, gateways, con-
`tainers, container management objects, virtual machines,
`subnets 130, hubs, virtual private networks (VPNs), peering
`connections, load balancers, route tables, and the like, as
`well as any combination thereof.
`External objects, as may be adjacentor relevant to a cloud
`platform 110, are objects similar or identical to the network
`objects 105. The external objects may be configured to
`communicate with one or more network objects 105, with
`other, various, external objects, and the like, as well as any
`combination thereof.
`
`FIG.2 is an example flowchart 200 depicting a method for
`constructing a network graph for a network system, accord-
`ing to an embodiment.
`At S210, network objects are identified, and network
`object data is collected. In one embodiment, network objects
`maybe identified by querying a cloud platform, through, for
`example, an orchestrator (e.g., orchestrator 115, of FIG. 1B,
`above), and the like. In an embodiment, $210 may include
`submitting one or more requests to each cloud platform and
`collecting responses therefrom. The requests may include
`instructions directing the orchestrator to report information
`including, without limitation, the number of devices con-
`nected to or included in the cloud platform, the names of
`such devices, the types of such devices, other, like, infor-
`mation, and any combination thereof.
`In an embodiment, identification of network objects and
`collection of network object data at S210 includes querying
`each cloud platform, where such querying may include
`generation of one or more queries through an application
`programming interface (API), such asa REST API. Through
`the API, network objects’ identities and description data are
`provided in response to such API queries. API queries may
`be pre-configured data requests, specified in the API, and
`configured to cause, for example, an orchestrator to return
`the one or more data features described herein. API queries
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`8
`may be generated based on one or more APIs, or the like,
`including generic APIs, such as REST, as well as platform-
`specific APIs, where such platform-specific APIs may be
`configured to provide for one or more predefined interac-
`tions with a cloud platform, such as Amazon AWS®,
`Microsoft Azure®, and the like, where such predefined
`interactions may include, wit

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket