The subject matter described herein relates to processing network flow metadata. More particularly, the subject matter described herein relates to processing network flow metadata at a network packet broker.
Network packet brokers are used to aggregate packets from multiple sources, deduplicate packets, since the same packet may be captured in different places, filter packets, redirect packets to final destination, possibly replicate the packets to multiple destinations, and filter to selectively send packets. However, the input to network packet brokers has been limited to packets, and the processing performed by network packet brokers has been limited to processing packets.
In addition to packet flows, another type of network data generated by network devices is network flow metadata, one example of which is NetFlow. NetFlow is a statistical, flow-by-flow summary of packet data at a higher level than raw packet data. If two network hosts communicate with each other, instead of generating a copy of every packet, NetFlow provides statistics about the overall conversation. NetFlow is a collection of conversations and reporting statistics about each conversation.
Many network devices can produce NetFlow statistics. Typically, a network operator configures a NetFlow collector as a destination, and sets the NetFlow collector as the destination for NetFlow data generated by a device that generates NetFlow records. This configuration is analogous to the configuration of a switch port analyzer (SPAN) port on a network device, such as a router. A SPAN port is typically configured with a destination for network packets copied by the router to the SPAN port.
Configuring a NetFlow generator or a SPAN port to forward packets to a single destination has a number of limitations. For example, it may be desirable to forward the same NetFlow statistics or packet copies to multiple destinations, which is not allowed by a device that allows only a single NetFlow or SPAN port destination to be configured. In another example, it may be desirable to feed two NetFlow collectors with NetFlow data from different switches. If the two switches see the same packet flow, NetFlow records will be duplicated, which may result in wasting of storage and processing resources of network tools that utilize data in NetFlow records. In another example, it may be desirable to redirect NetFlow records to a different destination when a primary NetFlow destination fails. Such redirection must be performed manually in a device that allows only a single configured NetFlow destination. These problems are magnified when NetFlow records are provided by multiple switches, requiring manual reconfiguration of the destination on each switch.
In light of these and other difficulties, there exists a need for methods, systems, and computer readable media for providing for network flow metadata processing at a network packet broker.
A method for network flow metadata processing at a network packet broker includes receiving, as input at the network packet broker, network flow metadata, the network flow metadata including a network flow statistic generated by a network device regarding packets in the network flow. The method further includes accessing, by the network packet broker, a network flow metadata processing rules database and identifying a network flow metadata processing rule to apply to the network flow metadata. The method further includes processing, by the network packet broker, the network flow metadata using the network flow metadata processing rule. The method further includes forwarding, by the network packet broker and based on results of the processing, egress network flow metadata to a network tool.
According to another aspect of the subject matter described herein, receiving the network flow metadata includes receiving at least two copies of the same network flow metadata record, identifying a network flow metadata processing rule includes identifying a network flow metadata deduplication processing rule to apply to the at least two copies of the same network flow metadata record, processing the network flow metadata includes performing deduplication processing of the at least two copies of the same network flow metadata record, and forwarding the egress network flow metadata includes forwarding a single copy of the same network flow metadata processing record to a single tool port.
According to another aspect of the subject matter described herein, receiving the network flow metadata includes receiving a single network flow metadata record, identifying a network flow metadata processing rule includes identifying a network flow metadata replication rule to apply to the single network flow metadata record, processing the network flow metadata record includes replicating the single network flow metadata record, and forwarding the egress network flow metadata includes forwarding at least two copies of the single network flow metadata record to at least two different network tools.
According to another aspect of the subject matter described herein, receiving the network flow metadata includes receiving an encrypted network flow metadata record, identifying the network flow metadata processing rule includes identifying a network flow metadata decryption, processing, and re-encryption rule to apply to the network flow metadata, processing the network flow metadata includes decrypting the network flow metadata record a decryption key obtained via a secure backchannel interface to produce a decrypted network metadata record, performing at least one operation on the decrypted network flow metadata record, re-encrypting the decrypted network flow metadata record to produce a re-encrypted network flow metadata record, and forwarding the egress network flow metadata includes forwarding the re-encrypted network metadata flow record to the network tool.
According to another aspect of the subject matter described herein, performing at least one operation on the decrypted network flow metadata record includes performing at least one of: network flow metadata deduplication, replication, aggregation, and format translation processing on the decrypted network flow metadata record.
According to another aspect of the subject matter described herein, receiving packet copies and network flow log data, wherein identifying a network flow metadata processing rule includes identifying a network flow metadata aggregation rule to apply to the network flow metadata, the packet copies, and the network flow log data, wherein processing the network flow metadata includes aggregating the network flow metadata with at least one of the packet copies and the network flow log data to create an aggregated network flow metadata record, and wherein forwarding the egress network flow metadata includes forwarding the aggregated network flow metadata record to the network tool.
According to another aspect of the subject matter described herein, receiving the network flow metadata includes receiving a network flow metadata record formatted according to a first network flow metadata format, identifying the network flow metadata processing rule includes identifying a network flow metadata format translation rule to apply to the network flow metadata record, processing the network flow metadata includes translating a format of the network flow metadata from the first network flow metadata format to a second network flow metadata format different from the first network flow metadata format to produce a translated network flow metadata record, and forwarding the egress network flow metadata includes forwarding the translated network flow metadata record to the network tool.
According to another aspect of the subject matter described herein, the first network flow metadata format comprises a first network flow metadata record format and the second network flow metadata format includes a second network flow metadata record format different from the first network flow metadata record format and wherein translating the format of the network flow metadata includes translating the format of the network flow metadata from first network flow metadata record format to the second network flow metadata record format.
According to another aspect of the subject matter described herein, receiving the network flow metadata from a network device includes receiving network flow metadata records from a network tap or a tap or span port on a router or switch.
According to yet another aspect of the subject matter described herein, forwarding the network flow metadata to a network tool includes forwarding the network flow metadata to a network flow metadata collector.
According to another aspect of the subject matter described herein, a system for network flow metadata processing includes a network packet broker including at least one processor and a memory. The system further includes a network flow metadata processing rules database stored in the memory and containing rules for processing network flow metadata. The system further includes a network flow metadata processing engine implemented by the at least one processor for receiving network flow metadata as input, the network flow metadata including a network flow statistic generated by a network device regarding packets in the network flow, for accessing the network flow metadata processing rules database and identifying a network flow metadata processing rule to apply to the network flow metadata, for processing the network flow metadata using the network flow metadata processing rule, and for forwarding, based on results of the processing, egress network flow metadata to a network tool.
According to another aspect of the subject matter described herein, the network flow metadata processing engine is configured to receive at least two copies of the same network flow metadata record, identify a network flow metadata deduplication processing rule to apply to the at least two copies of the same network flow metadata record, perform deduplication processing of the at least two copies of the same network flow metadata record, and forward a single copy of the same network flow metadata processing record to a single tool port.
According to another aspect of the subject matter described herein, the network flow metadata processing engine is configured to receive a single network flow metadata record, identify a network flow metadata replication rule to apply to the single network flow metadata record, replicate the single network flow metadata record, and forward at least two copies of the single network flow metadata record to at least two different network tools.
According to another aspect of the subject matter described herein, the network flow metadata processing engine is configured to receive an encrypted network flow metadata record, identify a network flow metadata decryption, processing, and re-encryption rule to apply to the network flow metadata, decrypt the network flow metadata record a decryption key obtained via a secure backchannel interface to produce a decrypted network metadata record, perform at least one operation on the decrypted network flow metadata record, re-encrypt the decrypted network flow metadata record to produce a re-encrypted network flow metadata record, and forward the re-encrypted network metadata flow record to the network tool.
According to another aspect of the subject matter described herein, the network flow metadata processing engine is configured to perform at least one of: network flow metadata deduplication, replication, aggregation, enrichment, and format translation processing on the decrypted network flow metadata record.
According to another aspect of the subject matter described herein, the network flow metadata processing engine is configured to receive packet copies and network flow log data, identify a network flow metadata aggregation rule to apply to the network flow metadata, the packet copies, and the network flow log data, aggregate the network flow metadata with at least one of the packet copies and the network flow log data to create an aggregated network flow metadata record, and forward the aggregated network flow metadata record to the network tool.
According to another aspect of the subject matter described herein, the network flow metadata processing engine is configured to receive a network flow metadata record formatted according to a first network flow metadata format, identify a network flow metadata format translation rule to apply to the network flow metadata record, translate a format of the network flow metadata from the first network flow metadata format to a second network flow metadata format different from the first network flow metadata format to produce a translated network flow metadata record, and forward the translated network flow metadata record to the network tool.
According to another aspect of the subject matter described herein, the first network flow metadata format comprises a first network flow metadata record format and the second network flow metadata format includes a second network flow metadata record format different from the first network flow metadata record, and the network flow metadata processing engine is configured to translate the network flow metadata from the first network flow metadata record format to the second network flow metadata record format.
According to another aspect of the subject matter described herein, the network flow metadata processing engine is configured to receive NetFlow records from a network tap or a tap or SPAN port on a router or switch and to forward the network flow metadata to a NetFlow collector.
According to another aspect of the subject matter described herein, a non-transitory computer readable medium having stored thereon executable instructions that when executed by a processor of a computer control the computer to perform steps is provided. The steps include receiving, as input at the network packet broker, network flow metadata, the network flow metadata including a network flow statistic generated by a network device regarding packets in the network flow. The steps further include accessing, by the network packet broker, a network flow metadata processing rules database and identifying a network flow metadata processing rule to apply to the network flow metadata. The steps further include processing, by the network packet broker, the network flow metadata using the network flow metadata processing rule. The steps further include forwarding, by the network packet broker and based on results of the processing, egress network flow metadata to a network tool.
The subject matter described herein can be implemented in software in combination with hardware and/or firmware. For example, the subject matter described herein can be implemented in software executed by a processor. In one exemplary implementation, the subject matter described herein can be implemented using a non-transitory computer readable medium having stored thereon computer executable instructions that when executed by the processor of a computer control the computer to perform steps. Exemplary computer readable media suitable for implementing the subject matter described herein include non-transitory computer-readable media, such as disk memory devices, chip memory devices, programmable logic devices, and application specific integrated circuits. In addition, a computer readable medium that implements the subject matter described herein may be located on a single device or computing platform or may be distributed across multiple devices or computing platforms.
Some network devices, such as switches, routers, and network taps, include a client/process that generates and exports NetFlow records to a single destination. These records are sent to a NetFlow collector, which then provides the records to analyzers and users (e.g., via a front-end user interface (UI), etc.).
One problem with the architecture illustrated in
Export of NetFlow Records
A network device, such as a router, will output a NetFlow record when the router determines that the flow is finished. The router does this by flow aging: when the router sees new traffic for an existing flow it resets the aging counter. Also, transmission control protocol (TCP) session termination in a TCP flow causes the router to expire the flow. Routers can also be configured to output a flow record at a fixed interval even if the flow is still ongoing.
NetFlow Packet Transport Protocol
NetFlow records are traditionally exported using user datagram protocol (UDP) and collected using a NetFlow collector. The IP address of the NetFlow collector and the destination UDP port must be configured on the sending router. A common value is UDP port 2055, but other values like 9555 or 9995, 9025, 9026 etc. can also be used. As stated above, however, most routers only allow a single NetFlow destination to be configured, and the configuration is static, requiring manual reconfiguration to change the destination for NetFlow records.
NetFlow records are carried in export packets (which are carried in UDP datagrams).
The NetFlow packet header includes a version identifier that identifies the NetFlow version, a system uptime field that indicates how long the NetFlow exporter has been running, a Unix seconds field that indicates the number of seconds that have elapse since the start of coordinated universal time, a package sequence field stores a sequence number for the NetFlow packet, and a source ID field, which stores an identifier of the source of the NetFlow export packet.
For efficiency reasons, the router traditionally does not keep track of flow records already exported, so if a NetFlow packet is dropped due to network congestion or packet corruption, all contained records are lost forever. The UDP protocol does not inform the router of the loss so it can send the packets again. This can be a real problem, especially with NetFlow v8 or v9 that can aggregate a lot of packets or flows into a single record. A single UDP packet loss can cause a huge impact on the statistics of some flows. That is why some modern implementations of NetFlow use the stream control transmission protocol (SCTP) to export packets so as to provide some protection against packet loss, and make sure that NetFlow v9 templates are received before any related record is exported. Note that TCP would not be suitable for NetFlow because a strict ordering of packets would cause excessive buffering and delays.
The problem with SCTP is that it requires interaction between each NetFlow collector and each router exporting NetFlow. There may be performance limitations if a router has to deal with many NetFlow collectors, and a NetFlow collector has to deal with lots of routers, especially when some of them are unavailable due to failure or maintenance.
SCTP may not be efficient if NetFlow must be exported toward several independent collectors, some of which may be test servers that can go down at any moment. UDP allows simple replication of NetFlow packets using Network taps or L2 or L3 Mirroring. Simple stateless equipment can also filter or change the destination address of NetFlow UDP packets if necessary. Since NetFlow export almost only use network backbone links, packet loss will often be negligible. If it happens, it will mostly be on the link between the network and the NetFlow collectors.
NetFlow Record
A NetFlow record can contain a wide variety of information about the traffic in a given flow.
NetFlow version 5 (one of the most commonly used versions, followed by version 9) contains the following:
NetFlow version 9 can include all of these fields and can optionally include additional information such as multiprotocol label switching (MPLS) labels and IPv6 addresses and ports.
By analyzing flow data, a picture of traffic flow and traffic volume in a network can be built.
The exemplary nomenclature may be used in describing NetFlow records:
Version
Count
System Uptime
UNIX Seconds
Sequence Number
Source ID
All NetFlow packets begin with version-dependent header that contains at least the following fields:
The subject matter described herein includes network packet broker (NPB) that provides network packet broker features related to the processing of typical user plane packet traffic (e.g., mobile IP packet traffic transiting a cellular network, GTP packet traffic, etc.)—aggregate, deduplicate, replicate to multiple network tool destinations, on-the-fly changes to different network tool destinations, filter what each network tool destination gets, etc. The network packet broker described herein provides processing on NetFlow and other network flow metadata records. In one embodiment, the network packet broker described herein may emulate a NetFlow collector element.
The network packet broker may receive copies of NetFlow export records that are obtained from network taps, probes or SPAN ports in a monitored network. The network packet broker, in one processing example, may examine the received NetFlow records and determine whether a received NetFlow record is a duplicate of a NetFlow record previously received at the network packet broker. If the NetFlow record is determined to be a duplicate, then the duplicate NetFlow record is filtered out/dropped, as shown in
More particularly,
In the illustrated example, duplicate copies 418 and 420 of the same NetFlow record are received on different network ports 422 and 424 of network packet broker 400. NetFlow records 418 and 420 may be generated by network taps or other network devices located in different locations but that produce the same NetFlow record. Network flow metadata processing engine 406 receives NetFlow records 418 and 420 and accesses database 408 to determine that deduplication processing is required. Network flow metadata processing engine 406 performs the deduplication processing and identifies that NetFlow records 418 and 420 are duplicates of the same record. Accordingly, network flow metadata processing engine 406 configures egress filters 414 and 416 such that only a single egress NetFlow record 426 is output on tool ports 428 or 430 of network packet broker 400. Egress NetFlow record 426 may be forwarded to a network tool, such as a NetFlow collector.
Network packet broker 400 may implement and enforce various filtering criteria that are applied to received NetFlow records. Exemplary filtering criteria may include, but are not limited to, NetFlow version, count, system uptime, timestamp, sequence number, etc. These criteria may be provisioned by a human operator or may be dynamically provisioned via a machine-to-machine interface, where a network tool sends NetFlow filter criteria to network packet broker 400, and network packet broker 400 installs and implements the new NetFlow record filter criteria on the fly without human intervention.
Network packet broker 400 may receive multiple NetFlow records and to aggregate these NetFlow records and or consolidate or “stitch” NetFlow records with other NetFlow records and/or other network data. Examples of such aggregation will be described below with regard to
Network packet broker 400 may receive a NetFlow record that is addressed to a first NetFlow collector and redirect the NetFlow record to a second NetFlow collector different from the first NetFlow collector. Such redirection may be done for the purposes of load balancing, failover, or recovery after a failover. For example, network packet broker 400 replicates NetFlow records to a single destination, as illustrated in
Network packet broker 400 may include the ability to receive and temporarily decrypt NetFlow records that are, for instance, being communicated securely via secure sockets layer/transport layer security (SSL/TLS) or other encryption protocols (
It will be appreciated that although most of the examples described herein are based on the use of the NetFlow protocol, network packet broker 400 may receive as input and process other network flow metadata record formats, including jFlow (produced by Juniper Networks-compatible devices), rFlow (produced by Ericsson-compatible devices), sampled flow (sFlow), IPFIX, NetStream, etc. jFlow and rFlow are proprietary network metadata record formats generated by network devices of Juniper Networks, and Ericsson, respectively. sFlow is an industry standard for exporting packets. sFlow is standardized by the sFlow consortium at www.sFlow.org.
In
In general, network packet broker 400 may receive any flow data in any format (e.g., VPC flow logs), and merge or combine two or more different sources of data. Such combining can be referred to as flow enrichment. Flow enrichment can be in the form of combining two or more NetFlow streams, one NetFlow stream and other source of network metadata (e.g., Zeek/Bro logs). Network packet broker 400 may take packets/packet copies and network flow metadata as input, or VPC flow logs and an extended Berkeley packet filter (eBPF) agent metadata stream and output flow records (e.g., IxFlow, NetFlow, etc.).
In the architecture illustrated in
In one example, when translating from NetFlow to sFlow, network packet broker 400 may extract the network statistics in the NetFlow packets and insert the network statistics into sFlow datagrams.
In step 902, the process includes, accessing, by the network packet broker, a network metadata processing rules database and identifying a network flow metadata processing rule to apply to network flow metadata. For example, network flow metadata processing engine 406 may perform a lookup in network metadata processing rules database 408 to identify one or more network metadata processing rules to apply to ingress network flow metadata. The lookup may be performed based on one or more parameters in the received network metadata record. For example, the source address and destination address may be used to extract a network metadata processing rule for a particular packet flow.
In step 904, the process includes processing, by the network packet broker, network flow metadata using the NetFlow flow metadata processing rules. For example, network flow metadata processing engine 406 may perform one or more of deduplication, replication, aggregation, enrichment, decryption and encryption, or other processing on ingress NetFlow data based on the rule or rules accessed in database 408.
In step 906, the process includes, forwarding, by the network packet broker and based on the results of the processing, egress network flow metadata to a network tool. For example, a network packet broker 400 may output deduplicated, replicated, aggregated, decrypted and re-encrypted, and/or enriched network metadata records to one or more network tools.
By placing network metadata processing functionality at a network packet broker, the inflexibility of the conventional NetFlow distribution architecture illustrated in
It will be understood that various details of the subject matter described herein may be changed without departing from the scope of the subject matter described herein. Furthermore, the foregoing description is for the purpose of illustration only, and not for the purpose of limitation, as the subject matter described herein is defined by the claims as set forth hereinafter.
Number | Name | Date | Kind |
---|---|---|---|
6240416 | Immon | May 2001 | B1 |
6480488 | Huang | Nov 2002 | B1 |
7340744 | Chandwadkar et al. | Mar 2008 | B2 |
7363353 | Ganesan et al. | Apr 2008 | B2 |
7373412 | Colas et al. | May 2008 | B2 |
7421506 | Ni et al. | Sep 2008 | B2 |
7562213 | Timms | Jul 2009 | B1 |
7634650 | Shah et al. | Dec 2009 | B1 |
8270942 | Zabawskyj et al. | Sep 2012 | B2 |
8457126 | Breslin et al. | Jun 2013 | B2 |
8514756 | Ramachandra et al. | Aug 2013 | B1 |
8566247 | Nagel et al. | Oct 2013 | B1 |
8595835 | Kolton et al. | Nov 2013 | B2 |
8654974 | Anderson et al. | Feb 2014 | B2 |
8881282 | Aziz et al. | Nov 2014 | B1 |
8929356 | Pandey et al. | Jan 2015 | B2 |
8964537 | Brolin | Feb 2015 | B2 |
9065642 | Zaverucha et al. | Jun 2015 | B2 |
9298560 | Janakiraman et al. | Mar 2016 | B2 |
9380002 | Johansson et al. | Jun 2016 | B2 |
9392010 | Friedman et al. | Jul 2016 | B2 |
9660913 | Newton | May 2017 | B2 |
9680869 | Buruganahalli et al. | Jun 2017 | B2 |
9800560 | Guo et al. | Oct 2017 | B1 |
9807121 | Levy et al. | Oct 2017 | B1 |
9860154 | Balabine | Jan 2018 | B2 |
9882929 | Ettema et al. | Jan 2018 | B1 |
9893883 | Chaubey et al. | Feb 2018 | B1 |
9998955 | MacCarthaigh | Jun 2018 | B1 |
10079843 | Friedman et al. | Sep 2018 | B2 |
10116553 | Penno | Oct 2018 | B1 |
10291651 | Chaubey | May 2019 | B1 |
10326741 | Rothstein et al. | Jun 2019 | B2 |
10404597 | Bakshi | Sep 2019 | B2 |
10419965 | Kadosh | Sep 2019 | B1 |
10482239 | Liu et al. | Nov 2019 | B1 |
10516532 | Taub et al. | Dec 2019 | B2 |
10749808 | MacCarthaigh | Aug 2020 | B1 |
10903985 | Bergeron | Jan 2021 | B2 |
10931797 | Ahn et al. | Feb 2021 | B2 |
10951660 | Rogers et al. | Mar 2021 | B2 |
10992652 | Putatunda et al. | Apr 2021 | B2 |
11075886 | Paul | Jul 2021 | B2 |
20020116485 | Black et al. | Aug 2002 | A1 |
20030004688 | Gupta et al. | Jan 2003 | A1 |
20030161335 | Fransdonk | Aug 2003 | A1 |
20030163684 | Fransdonk | Aug 2003 | A1 |
20030165241 | Fransdonk | Sep 2003 | A1 |
20040268148 | Karjala et al. | Dec 2004 | A1 |
20050050362 | Peles | Mar 2005 | A1 |
20050111437 | Maturi | May 2005 | A1 |
20060259579 | Beverly | Nov 2006 | A1 |
20070043940 | Gustave et al. | Feb 2007 | A1 |
20070078929 | Beverly | Apr 2007 | A1 |
20070156726 | Levy | Jul 2007 | A1 |
20070169190 | Kolton et al. | Jul 2007 | A1 |
20070179995 | Prahlad | Aug 2007 | A1 |
20080005782 | Aziz | Jan 2008 | A1 |
20080031141 | Lean et al. | Feb 2008 | A1 |
20100250769 | Barreto et al. | Sep 2010 | A1 |
20110286461 | Ichino et al. | Nov 2011 | A1 |
20120082073 | Andreasen et al. | Apr 2012 | A1 |
20120210318 | Sanghvi et al. | Aug 2012 | A1 |
20120236823 | Kompella et al. | Sep 2012 | A1 |
20120304244 | Xie et al. | Nov 2012 | A1 |
20130054761 | Kempf et al. | Feb 2013 | A1 |
20130070777 | Hutchison | Mar 2013 | A1 |
20130117847 | Friedman | May 2013 | A1 |
20130204849 | Chacko | Aug 2013 | A1 |
20130239119 | Garg et al. | Sep 2013 | A1 |
20130265883 | Henry et al. | Oct 2013 | A1 |
20130272136 | Ali et al. | Oct 2013 | A1 |
20130301830 | Bar-El et al. | Nov 2013 | A1 |
20140010083 | Hamdi | Jan 2014 | A1 |
20140059200 | Nguyen | Feb 2014 | A1 |
20140082348 | Chandrasekaran et al. | Mar 2014 | A1 |
20140115702 | Li et al. | Apr 2014 | A1 |
20140189093 | Du Toit et al. | Jul 2014 | A1 |
20140189961 | He | Jul 2014 | A1 |
20140226820 | Chopra et al. | Aug 2014 | A1 |
20140351573 | Martini | Nov 2014 | A1 |
20150026313 | Chawla | Jan 2015 | A1 |
20150039889 | Andoni | Feb 2015 | A1 |
20150052345 | Martini | Feb 2015 | A1 |
20150113132 | Srinivas | Apr 2015 | A1 |
20150124622 | Kovvali | May 2015 | A1 |
20150172219 | Johansson et al. | Jun 2015 | A1 |
20150264083 | Prenger | Sep 2015 | A1 |
20150281954 | Warren | Oct 2015 | A1 |
20150288679 | Ben-Nun et al. | Oct 2015 | A1 |
20150295780 | Hsiao et al. | Oct 2015 | A1 |
20150319030 | Nachum | Nov 2015 | A1 |
20150341212 | Hsiao et al. | Nov 2015 | A1 |
20150379278 | Thota | Dec 2015 | A1 |
20160014016 | Guichard | Jan 2016 | A1 |
20160019232 | Lambright | Jan 2016 | A1 |
20160080502 | Yadav et al. | Mar 2016 | A1 |
20160105469 | Galloway et al. | Apr 2016 | A1 |
20160105814 | Hurst | Apr 2016 | A1 |
20160127517 | Shcherbakov et al. | May 2016 | A1 |
20160142440 | Qian et al. | May 2016 | A1 |
20160248685 | Pignataro | Aug 2016 | A1 |
20160277321 | Johansson et al. | Sep 2016 | A1 |
20160277971 | Hamdi | Sep 2016 | A1 |
20160294784 | Hopkins et al. | Oct 2016 | A1 |
20160344754 | Rayapeta | Nov 2016 | A1 |
20170048328 | Korotaev et al. | Feb 2017 | A1 |
20170070531 | Huston, III et al. | Mar 2017 | A1 |
20170237640 | Stocker | Aug 2017 | A1 |
20170237719 | Schwartz et al. | Aug 2017 | A1 |
20170302554 | Chandrasekaran | Oct 2017 | A1 |
20170339022 | Hegde | Nov 2017 | A1 |
20170364794 | Mahkonen et al. | Dec 2017 | A1 |
20180091421 | Ma | Mar 2018 | A1 |
20180091427 | Kumar | Mar 2018 | A1 |
20180097787 | Murthy et al. | Apr 2018 | A1 |
20180097788 | Murthy | Apr 2018 | A1 |
20180097840 | Murthy | Apr 2018 | A1 |
20180124025 | Lam et al. | May 2018 | A1 |
20180176192 | Davis et al. | Jun 2018 | A1 |
20180198838 | Murgia et al. | Jul 2018 | A1 |
20180241699 | Raney | Aug 2018 | A1 |
20180278419 | Higgins et al. | Sep 2018 | A1 |
20180332078 | Kumar et al. | Nov 2018 | A1 |
20190028376 | Ganapathy | Jan 2019 | A1 |
20190058714 | Joshi | Feb 2019 | A1 |
20190068564 | Putatunda | Feb 2019 | A1 |
20190104437 | Bartfai-Walcott | Apr 2019 | A1 |
20190116111 | Izard | Apr 2019 | A1 |
20190166049 | Bakshi | May 2019 | A1 |
20190205151 | Suzuki | Jul 2019 | A1 |
20190205244 | Smith | Jul 2019 | A1 |
20190260794 | Woodford | Aug 2019 | A1 |
20190303385 | Ching et al. | Oct 2019 | A1 |
20190373052 | Pollitt | Dec 2019 | A1 |
20200036610 | Indiresan | Jan 2020 | A1 |
20200053064 | Oprisan et al. | Feb 2020 | A1 |
20200067700 | Bergeron | Feb 2020 | A1 |
20200076773 | Monat et al. | Mar 2020 | A1 |
20200104052 | Vijayan | Apr 2020 | A1 |
20200137021 | Janakiraman | Apr 2020 | A1 |
20200137115 | Janakiraman | Apr 2020 | A1 |
20210083857 | Bergeron | Mar 2021 | A1 |
20210111975 | Raney | Apr 2021 | A1 |
20210160275 | Anderson | May 2021 | A1 |
20210194779 | Punj | Jun 2021 | A1 |
Number | Date | Country |
---|---|---|
2777226 | Aug 2019 | EP |
3528430 | Aug 2019 | EP |
WO-2016176070 | Nov 2016 | WO |
Entry |
---|
Elsen et al., “goProbe: A Scalable Distributed Network Monitoring Solution”, 2015 (Year: 2015). |
Hardegen et al., “Flow-based Throughput Predication using Deep Learning and Real-World Network Traffic”, 2019 (Year: 2019). |
Lee et al., “Towards Scalable Internet Traffic Measurement and Analysis with Dadoop”, 2013 (Year: 2013). |
Zou et al., “An Enhanced Netflow Data Collection System”, 2012 (Year: 2012). |
He et al., “Data deduplication techniques”, 2010 (Year: 2010). |
Stankovic, “How to solve duplicated NetFlow caused by multiple exporters,” https://www.netvizura.com/blog/how-to-solve-duplicated-netflow-caused-by-multiple-exporters, pp. 1-4 (Accessed Jan. 15, 2020). |
“Jumbo Frame,” Wikipedia, https://en.wikipedia.org/wiki/Jumbo_frame, pp. 1-4 (Jan. 15, 2020). |
“How is the MTU is 65535 in UDP but ethernet does not allow frame size more that 1500 bytes,” ServerFault, TCPIP, pp. 1-9 (Accessed Jan. 15, 2020). |
“Network Monitoring Step 2: The Next-Generation of Packet Brokers,” MantisNet, pp. 1-6 (2020). |
“cPacket cVu 2440NG/3240NG,” https://www.cpacket.com/resources/cvu-3240-2440-datasheet/, pp. 1-4 (Accessed Jan. 15, 2020). |
“What are Microservices,” An Introduction to Microservices, https://opensource.com/resources/what-are-microservices, pp. 1-8 (Accessed Jan. 15, 2020). |
“IPv6,” Wikipedia, https://en.wikipedia.org/wiki/IPv6, pp. 1-15 (Jan. 8, 2020). |
“About NetFlow,” Watchguard Technologies, Inc., pp. 1-3 (2019). |
Non-Final Office Action for U.S. Appl. No. 15/980,699 (dated Dec. 9, 2019). |
“Multiprotocol Label Switching,” Wikipedia, https://en.wikipedia.org/wiki/multiprotocol_label_switching, pp. 1-7 (Dec. 6, 2019). |
“Netflow,” Wikipedia, https://en.wikipedia.org/wiki/NetFlow, pp. 1-9 (Dec. 3, 2019). |
“NetFlow Collector,” Kentipedia, Kentik, pp. 1-4 (Sep. 17, 2019). |
Nubeva, “Nubeva TLS Decrypt: Out-of-Band Decrypted Visibility for the Cloud,” www.nubeva.com/decryption, pp. 1-8 (Sep. 2019). |
Nubeva, “What is Symmetric Key Intercep Architecture?” https://www.nubeva.com/blog/what-is-symmetric-key-intercept-architecture, pp. 1-4 (Aug. 8, 2019). |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 15/826,787 (dated Apr. 25, 2019). |
Petryschuk, “NetFlow Basics: An Introduction to Monitoring Network Traffic,” Auvik, https://www.auvik.com/, pp. 1-8 (Mar. 19, 2019). |
“Automatic versus Manual NetFlow Deduplication,” Noction, https://www.noction.com/blog/automatic-manual-netflow-deduplication, pp. 1-7 (Feb. 1, 2019). |
Non-Final Office Action for U.S. Appl. No. 15/826,787 (dated Jan. 3, 2019). |
Leskiw, “Understanding Syslog: Servers, Messages & Security,” https://www.networkmanagementsoftware.com/what-is-syslog/, pp. 1-7 (Oct. 2018). |
Commonly-assigned, co-pending U.S. Appl. No. 16/113,360 for “Monitoring Encrypted Network Traffic Flows in a Virtual Environment Using Dynamic Session Key Acquisition Techniques,” (Unpublished, filed Aug. 27, 2018). |
McGillicuddy, “Next-Generation Network Packet Brokers: Defining the Future of Network Visibility Fabrics,” Enterprise Management Associates (EMA) Research, Niagara Networks, pp. 1-27 (Aug. 2018). |
Schulist et al., “Linux Socket Filtering aka Berkeley Packet Filter (BPF),” Wayback Machine, https://www.kernel.org/doc/Documentation/networking/filter.txt, pp. 1-25 (Jun. 8, 2018). |
Commonly-assigned, co-pending U.S. Appl. No. 15/980,699 for “Methods, Systems, and Computer Readable Media for Monitoring Encrypted Network Traffic Flows,” (Unpublished, filed May 15, 2018). |
“Principles of Chaos Engineering,” https://principlesofchaos.org/?lang=ENcontent, pp. 1-3 (May 2018). |
Solution Brief, “Smart Packet Brokering for Mobile Network Operators,” Brocade, pp. 1 (Jul. 19, 2017). |
“Network Visibility Network Packet Broker Comparison Table,” Ixia, pp. 1-10 (2017). |
Michael, “NetFlow Deduplication or Flow Deduplication,” Plixer, pp. 1-5 (Dec. 3, 2016). |
“Feature Brief: FlowVUE Application,” Gigamon, pp. 1-3 (2016). |
Vavilapalli et al., Cord Design Notes, “Cord Monitoring Service,” pp. 1-14 (Mar. 14, 2016). |
ACG Research, “Business Case for Brocade Network Analytics for Mobile Network Operators,” pp. 1-11 (2015). |
Starovoitov, “[PATCH net-next 6/6] samples: bpf: large eBPF program in C,” lkml.org, https://lkml.org/lkml/2014/11/27/10, pp. 1-5 (Nov. 26, 2014). |
Andreyev, “Introducing data center fabric, the next-generation Facebook data center network,” Data Center Engineering, Networking & Traffic, Production Engineering, https://code.fb.com/production-engineering/introducing-data-center-fabric-the-next-generation-facebook-data-center-network/, pp. 1-10 (Nov. 14, 2014). |
Corbet, “Extending extended BPF,” LWN.net, https://lwn.net/Articles/603983/, pp. 1-4 (Jul. 2014). |
Corbet, “BPF: the universal in-kernel virtual machine,” LWN.net, https://lwn.net/Articles/599755/, pp. 1-3 (May 2014). |
Git, “Linux Kernel Source Tree,” https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/samples/bpf/sockex2_kern.c, pp. 1-4 (2018). |
Ixia Anue GTP Session Controller, Take Control of GTP Monitoring to Improve Customer QoE and Maximize Network ROI, Solution Brief, Document No. 915-6606-01 Rev. A, pp. 1-2 (Sep. 2013). |
Ixia Network Visibility Solutions, Anue GTP Session Controller 7433, Product Specifications, Document No. 915-6504-01 Rev. B, pp. 1-3 (May 2013). |
“cPacket Radically Simplifies How Data Center and Cloud Professionals Pinpoint Problems,” BusinessWire, pp. 1-3 (Jan. 28, 2013). |
Hale, “Netflow V9 Datagram Knowledge Series: Part 2—Netflow V9 Packet Header,” Geek Speak, pp. 1-3 (Sep. 7, 2012). |
“Understanding Flow and Packet Deduplication,” Riverbed Technology, pp. 1-5 (2012). |
“NetFlow Version 9 Flow-Record Format,” Cisco Systems, pp. 1-12 (May 2011). |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 15/608,369 (dated Aug. 19, 2020). |
Advisory Action and AFCP 2.0 Decision for U.S. Appl. No. 15/608,369 (dated Jul. 1, 2020). |
Advisory Action and AFCP 2.0 Decision for U.S. Appl. No. 15/980,699 (dated Jun. 30, 2020). |
Non-Final Office Action for U.S. Appl. No. 16/113,360 (dated May 19, 2020). |
Non-Final Office Action for U.S. Appl. No. 16/103,598 (dated May 11, 2020). |
Final Office Action for U.S. Appl. No. 15/608,369 (dated Apr. 22, 2020). |
Final Office Action for U.S. Appl. No. 15/980,699 (dated Apr. 20, 2020). |
Paul, Santanu, “Network Visibility Component with Netflow Jumbo Frame Support,” The IP.com Journal, pp. 1-8 (Aug. 2019). |
Paul, Santanu, “Methods and Systems for Session-Aware Collection of Netflow Statistics,” The IP.com Journal, pp. 1-5 (Jul. 2019). |
Pandey, Shardendu; Johansson, Stefan Jan, “Network Packet Broker with Flow Segmentation Capability,” The IP.com Journal, pp. 1-6 (Jul. 2019). |
Paul, Santanu,“Network Packet Broker with Flow Segmentation Capability,” The IP.com Journal, pp. 1-6 (Aug. 2019). |
Paul, Santanu, “Custom Key Performance Indicator (KPI) Network Visibility System,” The IP.com Journal, pp. 1-4 (Jul. 2019). |
Paul, Santanu, “Self-Healing Network Visibility System,” The IP.com Journal, pp. 1-5 (Jun. 2019). |
Paul, Santanu, “Network Visibility System with Integrated Netflow Over Syslog Reporting Capability” The IP.com Journal, pp. 1-7 (Jan. 28, 2019). |
Evans, David, “Network Packet Broker with Dynamic Filter Rules,” The IP.com Journal, pp. 1-8 (Jun. 2018). |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 15/980,699 (dated Feb. 8, 2021). |
Notice of Allowance and Fee(s) Due and Examiner-Initiated Interview Summary for U.S. Appl. No. 16/113,360 (dated Oct. 15, 2020). |
Non-Final Office Action for U.S. Appl. No. 15/980,699 (dated Sep. 22, 2020). |
“The ABCs of Network Visibility,” Ixia, pp. 1-57 (2017). |
Sanchez, “Extended BPF and Data Plane Extensibility: An overview of networking and Linux,” PLUMgrid, pp. 1-37 (2014). |
Number | Date | Country | |
---|---|---|---|
20210243091 A1 | Aug 2021 | US |