METHOD AND APPARATUS FOR DETECTING PORT SCANS WITH FAKE SOURCE ADDRESS
    2.
    发明申请
    METHOD AND APPARATUS FOR DETECTING PORT SCANS WITH FAKE SOURCE ADDRESS 有权
    用于检测端口扫描器的方法和装置

    公开(公告)号:US20080263666A1

    公开(公告)日:2008-10-23

    申请号:US11738547

    申请日:2007-04-23

    IPC分类号: G06F12/14

    CPC分类号: H04L63/126 H04L63/1458

    摘要: A computer implemented method, apparatus, and computer program product for port scan protection. A reply data packet having a modified transmission control protocol header is generated to form a modified reply data packet, in response to detecting a port scan. The modified reply data packet will illicit a response from a recipient of the modified data packet. The reply data packet is sent to a first Internet protocol address associated with the port scan. A second Internet protocol address is identified from a header of the response to the modified reply data packet. The second Internet protocol address is an actual Internet protocol address of a source of the port scan. All network traffic from the second Internet protocol address may be blocked to prevent an attack on any open ports from the source of the port scan.

    摘要翻译: 用于端口扫描保护的计算机实现的方法,装置和计算机程序产品。 响应于检测到端口扫描,生成具有修改的传输控制协议报头的应答数据分组以形成修改的应答数据分组。 经修改的回复数据分组将对修改的数据分组的接收者的响应进行非法操作。 答复数据包被发送到与端口扫描相关联的第一个因特网协议地址。 从对修改的应答数据分组的响应的报头来识别第二个因特网协议地址。 第二个Internet协议地址是端口扫描源的实际Internet协议地址。 来自第二个Internet协议地址的所有网络流量可能被阻止,以防止从端口扫描的源的任何开放端口的攻击。

    Preventing replay attacks in encrypted file systems
    4.
    发明授权
    Preventing replay attacks in encrypted file systems 有权
    防止加密文件系统中的重放攻击

    公开(公告)号:US08607071B2

    公开(公告)日:2013-12-10

    申请号:US12034350

    申请日:2008-02-20

    IPC分类号: G06F21/00

    摘要: Replay attacks in an encrypted file system are prevented by generating a session key and providing the session key to one or more drive managers and an encrypted file system process. When a drive request is received by the encrypted file system process the drive request is encrypted using the generated session key. The encrypted drive request is sent to a drive manager. The drive manager attempts to decrypt the drive request using the session key. If the encrypted drive request is successfully decrypted, then the drive manager performs the requested operation. On the other hand, if the request is not decrypted successfully, then the request is not performed by the drive manager. Drive managers can include both disk device drivers and a logical volume managers.

    摘要翻译: 通过生成会话密钥并将会话密钥提供给一个或多个驱动器管理器和加密的文件系统进程来防止加密文件系统中的重播攻击。 当加密文件系统进程接收到驱动器请求时,使用所生成的会话密钥对驱动器请求进行加密。 加密的驱动器请求被发送到驱动器管理器。 驱动器管理器尝试使用会话密钥解密驱动器请求。 如果加密驱动器请求被成功解密,则驱动器管理器执行请求的操作。 另一方面,如果请求没有成功解密,那么驱动器管理器不执行该请求。 驱动管理器可以包括磁盘设备驱动程序和逻辑卷管理器。

    Rogue router hunter
    8.
    发明授权
    Rogue router hunter 有权
    盗贼路由器猎人

    公开(公告)号:US07991877B2

    公开(公告)日:2011-08-02

    申请号:US11867726

    申请日:2007-10-05

    IPC分类号: G06F15/173

    摘要: A computer implemented method, data processing system, and computer program product for discovering an unauthorized router in a network. The process in the illustrative embodiments first obtains a physical address of a suspected router or destination device. A data packet is created which comprises at least a destination media access control field, a destination internet protocol field, and a time-to-live field, wherein the destination media access control field comprises the physical address of the destination device, wherein the destination internet protocol field comprises a bogus internet protocol address, and wherein the time-to-live field comprises a value indicating the data packet has exceeded a time limit. The data packet is sent to the destination device using the physical address in the destination media access control field. If a time exceeded message is received from the destination device, the destination device is determined to be enabled for routing.

    摘要翻译: 一种计算机实现的方法,数据处理系统和用于发现网络中的未经授权的路由器的计算机程序产品。 说明性实施例中的过程首先获得可疑路由器或目的地设备的物理地址。 创建包括至少目的地媒体访问控制字段,目的地互联网协议字段和生存时间字段的数据分组,其中目的地媒体访问控制字段包括目的地设备的物理地址,其中目的地 互联网协议字段包括虚假的因特网协议地址,并且其中所述生存时间字段包括指示所述数据分组已超过时间限制的值。 使用目标介质访问控制字段中的物理地址将数据包发送到目标设备。 如果从目的地设备接收到超时消息,则确定目的地设备被启用以进行路由。