Detection of malware and malicious applications

    公开(公告)号:US10305928B2

    公开(公告)日:2019-05-28

    申请号:US14820265

    申请日:2015-08-06

    Abstract: A method comprises receiving, at a network infrastructure device, a flow of packets, determining, using the network infrastructure device and for a first subset of the packets, that the first subset corresponds to a first datagram and determining a first length of the first datagram, determining, using the network infrastructure device and for a second subset of the packets, that the second subset corresponds to a second datagram that was received after the first datagram, and determining a second length of the second datagram, determining, using the network infrastructure device, a duration value between a first arrival time of the first datagram and a second arrival time of the second datagram, sending, to a collector device that is separate from the network infrastructure device, the first length, the second length, and the duration value for analysis.

    Inspection of traffic via SDN
    93.
    发明授权

    公开(公告)号:US10205641B2

    公开(公告)日:2019-02-12

    申请号:US14802033

    申请日:2015-07-17

    Abstract: A method and related apparatus for performing inspection of flows within a software defined network includes identifying a security appliance within a software defined network, identifying candidate traffic flows flowing in the software defined network to be inspected, selecting one of the candidate traffic flows for security inspection, and communicating with a software defined network controller to cause the one of the candidate traffic flows to be redirected towards the security appliance for inspection or to cause the one of the candidate traffic flows to be copied and a resulting copy thereof forwarded to the security appliance for inspection.

    Intrusion detection to prevent impersonation attacks in computer networks

    公开(公告)号:US09699202B2

    公开(公告)日:2017-07-04

    申请号:US14717127

    申请日:2015-05-20

    CPC classification number: H04L63/1416 H04L63/1425 H04L63/1483

    Abstract: In an embodiment, a central computer performs a data processing method. The central computer receives telemetry data from intrusion sensors. The central computer stores authentication records in a hosts database. Each authentication record is based on the telemetry data and comprises a thumbprint of a public key certificate and a host identifier of a sender computer. The central computer receives a suspect record that was sent by a first intrusion sensor. The suspect record has a first particular thumbprint of a first particular public key certificate and a first particular host identifier of a suspect sender. From the hosts database, the central computer searches for a matching record having a same host identifier as the first particular host identifier of the suspect record and a same thumbprint as the first particular thumbprint of the suspect record. The central computer generates an intrusion alert when no matching record is found.

    Network security using encrypted subfields
    97.
    发明授权
    Network security using encrypted subfields 有权
    使用加密子字段的网络安全

    公开(公告)号:US09288186B2

    公开(公告)日:2016-03-15

    申请号:US13909735

    申请日:2013-06-04

    Inventor: David McGrew

    CPC classification number: H04L63/0245

    Abstract: In one embodiment, a method includes receiving from a secure device, an encrypted rule at a first network device, receiving at the first network device, a packet containing at least one encrypted subfield from a second network device, the subfield encrypted based on a key received at the second network device from the secure device, and determining if the encrypted subfield matches the encrypted rule. An apparatus and logic are also disclosed herein.

    Abstract translation: 在一个实施例中,一种方法包括从安全设备接收第一网络设备的加密规则,在第一网络设备处接收包含来自第二网络设备的至少一个加密子场的分组,基于密钥加密的子域 在所述第二网络设备处从所述安全设备接收,以及确定所述加密的子字段是否匹配所述加密的规则。 本文还公开了一种装置和逻辑。

    Techniques to Classify Virtual Private Network Traffic Based on Identity
    98.
    发明申请
    Techniques to Classify Virtual Private Network Traffic Based on Identity 审中-公开
    基于身份分类虚拟专用网络流量的技术

    公开(公告)号:US20150067337A1

    公开(公告)日:2015-03-05

    申请号:US14532131

    申请日:2014-11-04

    Abstract: Techniques are provided for obtaining first and second digital certificates from a certificate authority database for establishing a secure exchange between network devices. The first digital certificate contains identity information of a first network device, and the second digital certificate contains classification information of the first network device. In one embodiment, a secure key exchange is initiated with the second network device, and the first and second digital certificates are transmitted as a part of the secure key exchange to the second network device. In another embodiment, the first and second digital certificates are received by an intermediate network device. The first digital certificate is encrypted and is not evaluated by the intermediate network device. The second digital certificate is evaluated for classification information of the first network device. Source information associated with the first network device is stored, and encrypted traffic is processed between the network devices.

    Abstract translation: 提供了用于从证书机构数据库获得第一和第二数字证书以建立网络设备之间的安全交换的技术。 第一数字证书包含第一网络设备的身份信息,第二数字证书包含第一网络设备的分类信息。 在一个实施例中,与第二网络设备一起发起安全密钥交换,并且将第一和第二数字证书作为安全密钥交换的一部分被发送到第二网络设备。 在另一个实施例中,第一和第二数字证书由中间网络设备接收。 第一个数字证书是加密的,不被中间网络设备评估。 对第一个网络设备的分类信息进行第二个数字证书的评估。 存储与第一网络设备相关联的源信息,并且在网络设备之间处理加密流量。

Patent Agency Ranking