Detecting domain fronting through correlated connections

    公开(公告)号:US11916887B2

    公开(公告)日:2024-02-27

    申请号:US18160820

    申请日:2023-01-27

    IPC分类号: H04L9/40

    CPC分类号: H04L63/0428 H04L63/166

    摘要: According to an embodiment, a method receives one or more messages associated with connecting a client and a first host. At least one of the messages comprises an encrypted portion indicating the first host and at least one of the messages comprises a cleartext portion indicating a second host. The method determines first and second sets of links associated with the first and second host, respectively. The first set is determined based on monitoring a result of connecting the client and the first host. The second set is determined based on observing behavior associated with connecting to the second host. The method detects domain fronting in response to determining, based on comparing the first set of links and the second set of links, that the first host differs from the second host.

    NETWORK TELEMETRY COLLECTION WITH PACKET METADATA FILTERING

    公开(公告)号:US20230239319A1

    公开(公告)日:2023-07-27

    申请号:US18100502

    申请日:2023-01-23

    IPC分类号: H04L9/40 G06N20/00 G06N5/04

    摘要: In one embodiment, a telemetry exporter in a network establishes a tunnel between the telemetry exporter and a traffic analysis service. The telemetry exporter obtains packet copies of a plurality of packets sent between devices via the network. The telemetry exporter forms a set of traffic telemetry data by discarding at least a portion of one or more of the packet copies, based on a filter policy. The telemetry exporter applies compression to the formed set of traffic telemetry data. The telemetry exporter sends, via the tunnel, the compressed set of traffic telemetry data to the traffic analysis service for analysis.

    DETECTING DOMAIN FRONTING THROUGH CORRELATED CONNECTIONS

    公开(公告)号:US20230179581A1

    公开(公告)日:2023-06-08

    申请号:US18160820

    申请日:2023-01-27

    IPC分类号: H04L9/40

    CPC分类号: H04L63/0428 H04L63/166

    摘要: According to an embodiment, a method receives one or more messages associated with connecting a client and a first host. At least one of the messages comprises an encrypted portion indicating the first host and at least one of the messages comprises a cleartext portion indicating a second host. The method determines first and second sets of links associated with the first and second host, respectively. The first set is determined based on monitoring a result of connecting the client and the first host. The second set is determined based on observing behavior associated with connecting to the second host. The method detects domain fronting in response to determining, based on comparing the first set of links and the second set of links, that the first host differs from the second host.

    Detecting domain fronting through correlated connections

    公开(公告)号:US11582208B1

    公开(公告)日:2023-02-14

    申请号:US17498392

    申请日:2021-10-11

    IPC分类号: H04L29/06 H04L9/40

    摘要: According to an embodiment, a method receives one or more messages associated with connecting a client and a first host. At least one of the messages comprises an encrypted portion indicating the first host and at least one of the messages comprises a cleartext portion indicating a second host. The method determines first and second sets of links associated with the first and second host, respectively. The first set is determined based on monitoring a result of connecting the client and the first host. The second set is determined based on observing behavior associated with connecting to the second host. The method detects domain fronting in response to determining, based on comparing the first set of links and the second set of links, that the first host differs from the second host.

    Automatically generating a fingerprint prevalence database without ground truth

    公开(公告)号:US11558424B2

    公开(公告)日:2023-01-17

    申请号:US17307677

    申请日:2021-05-04

    IPC分类号: H04L29/06 H04L9/40 G06K9/62

    摘要: Techniques and mechanisms for using passively collected network data to automatically generate a fingerprint prevalence database without the need for endpoint ground truth. The process first clusters all observations with the same fingerprint string and similar source and destination context. The process then annotates each cluster with descriptive information and uses a rule-based system to derive an informative name from that descriptive information, e.g., “winnt amp client” or “cross-platform browser”. Optionally, the learned database may be augmented by a user to clarify custom process labels. Additionally, the generated database may be used to report the inferred processes in the same way as databases generated with endpoint ground truth.