Automatically generating a fingerprint prevalence database without ground truth

    公开(公告)号:US11558424B2

    公开(公告)日:2023-01-17

    申请号:US17307677

    申请日:2021-05-04

    Abstract: Techniques and mechanisms for using passively collected network data to automatically generate a fingerprint prevalence database without the need for endpoint ground truth. The process first clusters all observations with the same fingerprint string and similar source and destination context. The process then annotates each cluster with descriptive information and uses a rule-based system to derive an informative name from that descriptive information, e.g., “winnt amp client” or “cross-platform browser”. Optionally, the learned database may be augmented by a user to clarify custom process labels. Additionally, the generated database may be used to report the inferred processes in the same way as databases generated with endpoint ground truth.

    Applying security policies to web traffic while maintaining privacy

    公开(公告)号:US11368487B2

    公开(公告)日:2022-06-21

    申请号:US16416794

    申请日:2019-05-20

    Abstract: A computer system applies security policies to web traffic while maintaining privacy. A network security agent is authenticated by a client application to dynamically obtain one or more security policies, wherein the client application and the network security agent are configured to execute on a device and the network security agent is capable of communicating with a source of security policies. Connection information is obtained that includes a request to initiate an encrypted connection with a destination entity. The client application determines whether the encrypted connection between the client application and the destination entity is permitted according to the security policy and based on the connection information. The encrypted connection between the client and the destination entity is established in response to determining that the encrypted connection is permitted. Embodiments may further include a method and computer program product for applying security policies to web traffic.

    Network Telemetry with Byte Distribution and Cryptographic Protocol Data Elements

    公开(公告)号:US20210144455A1

    公开(公告)日:2021-05-13

    申请号:US17154053

    申请日:2021-01-21

    Abstract: In one embodiment, a method includes receiving a traffic flow including a plurality of packets encrypted using a cryptographic protocol, determining cryptographic protocol data of the traffic flow, and transmitting telemetry data of the traffic flow including the cryptographic protocol data. In another embodiment, a method includes receiving telemetry data of a traffic flow including a plurality of packets encrypted using a cryptographic protocol, the telemetry data including cryptographic protocol data of the traffic flow, classifying the traffic flow based on the cryptographic protocol data using a machine learning classifier; and taking a remedial action with respect to the traffic flow based on the classification of the traffic flow.

    AUTOMATICALLY GENERATING A FINGERPRINT PREVALENCE DATABASE WITHOUT GROUND TRUTH

    公开(公告)号:US20230164185A1

    公开(公告)日:2023-05-25

    申请号:US18095443

    申请日:2023-01-10

    CPC classification number: H04L63/166 H04L63/306 G06F18/22 G06F18/23

    Abstract: Techniques and mechanisms for using passively collected network data to automatically generate a fingerprint prevalence database without the need for endpoint ground truth. The process first clusters all observations with the same fingerprint string and similar source and destination context. The process then annotates each cluster with descriptive information and uses a rule-based system to derive an informative name from that descriptive information, e.g., “winnt amp client” or “cross-platform browser”. Optionally, the learned database may be augmented by a user to clarify custom process labels. Additionally, the generated database may be used to report the inferred processes in the same way as databases generated with endpoint ground truth.

    QUANTUM COMPUTER RESISTANT PRE-SHARED KEY DISTRIBUTION FOR LARGE SCALE WIDE AREA NETWORK SOLUTIONS

    公开(公告)号:US20210226782A1

    公开(公告)日:2021-07-22

    申请号:US16749299

    申请日:2020-01-22

    Abstract: Presented herein are methodologies for establishing secure communications in a post-quantum computer context. The methodology includes receiving, from a first communications device, at a second communications device, a secret seed value, or otherwise obtaining the secret seed value; initializing a session key service with the secret seed value; receiving, from the first communications device, at the second communications device, a pre-shared key identifier; querying the session key service for a pre-shared key corresponding the pre-shared key identifier; receiving, from the session key service, the pre-shared key; deriving a session key based, at least in part, on the pre-shared key; receiving from the first communications device, at the second communications device, data encrypted with the session key; and decrypting the data at the second communications device using the session key.

    APPLYING SECURITY POLICIES TO WEB TRAFFIC WHILE MAINTAINING PRIVACY

    公开(公告)号:US20200374314A1

    公开(公告)日:2020-11-26

    申请号:US16416794

    申请日:2019-05-20

    Abstract: A computer system applies security policies to web traffic while maintaining privacy. A network security agent is authenticated by a client application to dynamically obtain one or more security policies, wherein the client application and the network security agent are configured to execute on a device and the network security agent is capable of communicating with a source of security policies. Connection information is obtained that includes a request to initiate an encrypted connection with a destination entity. The client application determines whether the encrypted connection between the client application and the destination entity is permitted according to the security policy and based on the connection information. The encrypted connection between the client and the destination entity is established in response to determining that the encrypted connection is permitted. Embodiments may further include a method and computer program product for applying security policies to web traffic.

Patent Agency Ranking