US 11,706,239 B2
Systems and methods for detecting vulnerabilities in network processes during runtime
Hai Vu, San Jose, CA (US); Thanh Nhan Nguyen, Mountain View, CA (US); Vaishali Palkar, San Jose, CA (US); Varun Malhotra, Sunnyvale, CA (US); Shih-Chun Chang, San Jose, CA (US); and Xin Liu, San Mateo, CA (US)
Assigned to Cisco Technology, Inc., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Aug. 26, 2020, as Appl. No. 17/3,450.
Prior Publication US 2022/0070197 A1, Mar. 3, 2022
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1433 (2013.01) 15 Claims
OG exemplary drawing
 
1. A method comprising:
obtaining, at a network controller and from one or more sensors running on one or more endpoints, real-time process information associated with at least one process executing on at least one of the one or more endpoints, wherein the network controller is communicatively connected to the one or more endpoints over a communication network;
determining, at the network controller, package information for a corresponding package associated with the at least one process based on the real-time process information; and
identifying, at the network controller and during runtime of the at least one process on the at least one of the one or more endpoints, at least one vulnerability associated with the package information using a database of vulnerabilities available only to the network controller.