Systems and methods for discovering network topologies
    5.
    发明授权
    Systems and methods for discovering network topologies 有权
    用于发现网络拓扑的系统和方法

    公开(公告)号:US09219655B1

    公开(公告)日:2015-12-22

    申请号:US13660574

    申请日:2012-10-25

    IPC分类号: H04L12/24

    CPC分类号: H04L41/12

    摘要: A computer-implemented method for discovering network topologies. The method may include (1) receiving, on a host system within a network, a switch-protocol message that includes a switch identifier, a port identifier, and/or a root path cost, (2) identifying a set of switches within the network based on the switch-protocol message, (3) determining how the set of switches are connected based on the switch-protocol message, and (4) mapping a topology of the network based on determining how the set of switches are connected. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于发现网络拓扑的计算机实现的方法。 该方法可以包括:(1)在网络中的主机系统上接收包括交换机标识符,端口标识符和/或根路径开销的交换机协议消息,(2)识别所述交换机 基于交换协议消息的网络,(3)基于交换协议消息确定交换机集合如何连接,以及(4)基于确定如何连接交换机的集合来映射网络的拓扑。 还公开了各种其它方法,系统和计算机可读介质。

    Detecting network devices and mapping topology using network introspection by collaborating endpoints
    6.
    发明授权
    Detecting network devices and mapping topology using network introspection by collaborating endpoints 有权
    通过协作端点检测网络设备和使用网络内省的映射拓扑

    公开(公告)号:US08844041B1

    公开(公告)日:2014-09-23

    申请号:US12713606

    申请日:2010-02-26

    摘要: Detection of network devices (e.g., stealth devices) and mapping network topology are performed via network introspection by collaborating endpoints/nodes. The method includes receiving (e.g., by a node on a network) an assignment to be a supernode that will manage multiple agents of a subnetwork within an overall network. This assigned supernode instructs two or more of the agents to perform a set of network traffic fingerprinting tests of the subnetwork by passing information across the subnetwork to each other. The supernode receives results of the tests from the clients and detects one or more intermediate devices located between the clients based on an effect of the intermediate devices on the information passed between the clients. The supernode can further map the topology of the subnetwork (including the detected devices) which can be used in mapping the overall network topology.

    摘要翻译: 网络设备(例如隐形设备)和映射网络拓扑的检测通过协作端点/节点的网络内省来执行。 该方法包括接收(例如,由网络上的节点)作为将管理整个网络内的子网络的多个代理的超级节点的分配。 该分配的超节点指示两个或更多个代理通过将信息跨越子网彼此传递来执行子网的一组网络流量指纹测试。 超级节点从客户端接收测试结果,并基于中间设备对客户端之间传递的信息的影响,检测位于客户端之间的一个或多个中间设备。 超级节点可以进一步映射可用于映射整个网络拓扑的子网(包括检测到的设备)的拓扑。

    Validation of secure sockets layer communications
    7.
    发明授权
    Validation of secure sockets layer communications 有权
    验证安全套接字层通信

    公开(公告)号:US07634811B1

    公开(公告)日:2009-12-15

    申请号:US11134696

    申请日:2005-05-20

    IPC分类号: G08B23/00

    摘要: Computer-implemented methods, apparati, and computer-readable media for thwarting computer attacks. A method embodiment of the present invention comprises the steps of examining (52) a digital certificate (20) presented by a server computer (2); compiling (53) a set of suspicion indications (31) gleaned from said examining step (52); and feeding (54) said suspicion indications (31) to a consequence engine (30).

    摘要翻译: 用于阻止计算机攻击的计算机实现的方法,设备和计算机可读介质。 本发明的方法实施例包括检查(52)由服务器计算机(2)呈现的数字证书(20)的步骤; 编译(53)从所述检查步骤(52)收集的一组怀疑指示(31); 以及将所述怀疑指示(31)馈送(54)到结果引擎(30)。