Patents by Inventor NAKUL OGALE
NAKUL OGALE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12095629Abstract: Example methods and systems for a computer system to perform security threat detection during service query handling are described. In one example, a process running on a virtualized computing instance supported by the computer system may generate and send a first service query specifying a query input according to a service protocol. The first service query may be detected by a security agent configured to operate in a secure enclave that is isolated from the process. Next, the security agent may generate and send a second service query specifying the query input in the first service query. It is then determined whether there is a potential security threat based on a comparison between (a) a first reply received responsive to the first service query and (b) a second reply received responsive to the second service query.Type: GrantFiled: May 20, 2020Date of Patent: September 17, 2024Assignee: VMware LLCInventors: Nakul Ogale, Shirish Vijayvargiya, Sachin Shinde
-
Patent number: 11949651Abstract: In some embodiments, a method stores domain name system (DNS) resolution mappings from a domain name to an address in a first table. The DNS resolution mappings are intercepted from DNS responses being sent by a DNS server. The first table is sent to a manager for validation of the DNS resolution mappings. Then, a second table is received from the manager that contains validated DNS resolution mappings. The method intercepts a DNS response that includes a domain name to address resolution mapping from the DNS server and validates the domain name to address resolution mapping using a validated DNS resolution mapping in the second table.Type: GrantFiled: February 6, 2023Date of Patent: April 2, 2024Assignee: VMware LLCInventors: Shirish Vijayvargiya, Sunil Hasbe, Nakul Ogale, Sachin Shinde
-
Publication number: 20240015184Abstract: A method of applying a security policy to a virtual computing instance, according to an embodiment, includes: determining that a universally unique identifier (UUID) of the virtual computing instance does not match an identifier stored in a configuration file of the virtual computing instance; transmitting a request to register the virtual computing instance with a cloud platform for managing security policies of a virtual infrastructure that includes the virtual computing instance, the request including the UUID of the virtual computing instance and the identifier stored in the configuration file of the virtual computing instance; in response to the request, receiving an identifier of a security policy to be applied; and retrieving the security policy and applying the security policy to the virtual computing instance.Type: ApplicationFiled: September 5, 2022Publication date: January 11, 2024Inventors: SHIRISH VIJAYVARGIYA, NAKUL OGALE, SUNIL HASBE, ROSHAN KOLHE
-
Publication number: 20230188497Abstract: In some embodiments, a method stores domain name system (DNS) resolution mappings from a domain name to an address in a first table. The DNS resolution mappings are intercepted from DNS responses being sent by a DNS server. The first table is sent to a manager for validation of the DNS resolution mappings. Then, a second table is received from the manager that contains validated DNS resolution mappings. The method intercepts a DNS response that includes a domain name to address resolution mapping from the DNS server and validates the domain name to address resolution mapping using a validated DNS resolution mapping in the second table.Type: ApplicationFiled: February 6, 2023Publication date: June 15, 2023Inventors: Shirish Vijayvargiya, Sunil Hasbe, Nakul Ogale, Sachin Shinde
-
Patent number: 11575646Abstract: In some embodiments, a method stores domain name system (DNS) resolution mappings from a domain name to an address in a first table. The DNS resolution mappings are intercepted from DNS responses being sent by a DNS server. The first table is sent to a manager for validation of the DNS resolution mappings. Then, a second table is received from the manager that contains validated DNS resolution mappings. The method intercepts a DNS response that includes a domain name to address resolution mapping from the DNS server and validates the domain name to address resolution mapping using a validated DNS resolution mapping in the second table.Type: GrantFiled: May 15, 2020Date of Patent: February 7, 2023Assignee: VMWARE, INC.Inventors: Shirish Vijayvargiya, Sunil Hasbe, Nakul Ogale, Sachin Shinde
-
Patent number: 11201853Abstract: Some embodiments provide a method for detecting that a domain name service (DNS) cache on a data compute node (DCN) has been attacked. The method, during a first operational phase of an agent executing on the DCN, builds a DNS cache that stores entries that include (i) network address to domain name mappings and (ii) policies for the entries received from a centralized service. During a second operational phase of the agent, the method detects that an entry of the DNS cache has been modified by a DNS response such that the modified entry violates the policy for the entry. Based on the detection, the method sends an alert to the centralized service. The centralized service performs additional analysis on the modification to determine whether to allow the DCN to use the modified DNS cache entry.Type: GrantFiled: March 14, 2019Date of Patent: December 14, 2021Assignee: VMWARE, INC.Inventors: Nakul Ogale, Nilesh Awate
-
Patent number: 11201847Abstract: In some embodiments, a method receives a first address resolution mapping from a workload and verifies the first address resolution mapping. When the first address resolution mapping is verified, the method adds the first address resolution mapping to a list of address resolution mappings. The list of address resolution mappings includes verified address resolution mappings. The list of address resolution mappings is sent to the workload to allow the workload to verify a second address resolution mapping using the list of verified address resolution mappings.Type: GrantFiled: November 30, 2020Date of Patent: December 14, 2021Assignee: VMWARE, INC.Inventors: Shirish Vijayvargiya, Sachin Shinde, Nakul Ogale, Vasantha Kumar Dhanasekar
-
Patent number: 11182472Abstract: A process monitoring methodology is disclosed. In a computer-implemented method, a selection of a process to be monitored is received. The process is to be at least partially performed using a component of a computing environment. An expected operating parameter of the process is determined. The process is also monitored to determine an actual operating parameter of the process. The actual operating parameter of the process is compared with the expected operating parameter of the process to generate a comparison result. An operation is then automatically performed based upon the comparison result.Type: GrantFiled: September 30, 2019Date of Patent: November 23, 2021Assignee: VMware, Inc.Inventors: Nakul Ogale, Shirish Vijayvargiya, Sachin Shinde
-
Publication number: 20210314237Abstract: Example methods and systems for a computer system to perform security threat detection during service query handling are described. In one example, a process running on a virtualized computing instance supported by the computer system may generate and send a first service query specifying a query input according to a service protocol. The first service query may be detected by a security agent configured to operate in a secure enclave that is isolated from the process. Next, the security agent may generate and send a second service query specifying the query input in the first service query. It is then determined whether there is a potential security threat based on a comparison between (a) a first reply received responsive to the first service query and (b) a second reply received responsive to the second service query.Type: ApplicationFiled: May 20, 2020Publication date: October 7, 2021Inventors: NAKUL OGALE, SHIRISH VIJAYVARGIYA, SACHIN SHINDE
-
Publication number: 20210288937Abstract: In some embodiments, a method stores domain name system (DNS) resolution mappings from a domain name to an address in a first table. The DNS resolution mappings are intercepted from DNS responses being sent by a DNS server. The first table is sent to a manager for validation of the DNS resolution mappings. Then, a second table is received from the manager that contains validated DNS resolution mappings. The method intercepts a DNS response that includes a domain name to address resolution mapping from the DNS server and validates the domain name to address resolution mapping using a validated DNS resolution mapping in the second table.Type: ApplicationFiled: May 15, 2020Publication date: September 16, 2021Inventors: SHIRISH VIJAYVARGIYA, SUNIL HASBE, NAKUL OGALE, SACHIN SHINDE
-
Publication number: 20210097167Abstract: A process monitoring methodology is disclosed. In a computer-implemented method, a selection of a process to be monitored is received. The process is to be at least partially performed using a component of a computing environment. An expected operating parameter of the process is determined. The process is also monitored to determine an actual operating parameter of the process. The actual operating parameter of the process is compared with the expected operating parameter of the process to generate a comparison result. An operation is then automatically performed based upon the comparison result.Type: ApplicationFiled: September 30, 2019Publication date: April 1, 2021Applicant: VMware, Inc.Inventors: Nakul OGALE, Shirish VIJAYVARGIYA, Sachin SHINDE
-
Publication number: 20210084004Abstract: In some embodiments, a method receives a first address resolution mapping from a workload and verifies the first address resolution mapping. When the first address resolution mapping is verified, the method adds the first address resolution mapping to a list of address resolution mappings. The list of address resolution mappings includes verified address resolution mappings. The list of address resolution mappings is sent to the workload to allow the workload to verify a second address resolution mapping using the list of verified address resolution mappings.Type: ApplicationFiled: November 30, 2020Publication date: March 18, 2021Inventors: Shirish Vijayvargiya, Sachin Shinde, Nakul Ogale, Vasantha Kumar Dhanasekar
-
Patent number: 10855644Abstract: In some embodiments, a method receives one or more address resolution mappings and sends the one or more first address resolution mappings to a manager for verification of the one or more first address resolution mappings. The method receives one or more responses based on the verification of the one or more first address resolution mappings and allows or disallows use of the one or more address resolution mappings based on the one or more responses. A list of verified address resolution mappings is received from the manager based on the verification of the one or more first address resolution mappings. Then, the method receives a second address resolution mapping and verifies the second address resolution mapping using the list of verified address resolution mappings.Type: GrantFiled: October 23, 2019Date of Patent: December 1, 2020Assignee: VMWARE, INC.Inventors: Shirish Vijayvargiya, Sachin Shinde, Nakul Ogale, Vasantha Kumar Dhanasekar
-
Publication number: 20200228495Abstract: Some embodiments provide a method for detecting that a domain name service (DNS) cache on a data compute node (DCN) has been attacked. The method, during a first operational phase of an agent executing on the DCN, builds a DNS cache that stores entries that include (i) network address to domain name mappings and (ii) policies for the entries received from a centralized service. During a second operational phase of the agent, the method detects that an entry of the DNS cache has been modified by a DNS response such that the modified entry violates the policy for the entry. Based on the detection, the method sends an alert to the centralized service. The centralized service performs additional analysis on the modification to determine whether to allow the DCN to use the modified DNS cache entry.Type: ApplicationFiled: March 14, 2019Publication date: July 16, 2020Inventors: NAKUL OGALE, Nilesh Awate