PARALLEL NETWORK-BASED VULNERABILITY SCANNING

    公开(公告)号:US20230262085A1

    公开(公告)日:2023-08-17

    申请号:US17670242

    申请日:2022-02-11

    摘要: A computing device may receive a plurality of scanning requests with at least one scanning request in the plurality identifying a target address of a target network. The computing device may for at least a subset of the plurality of scanning requests: generate a scanner instance and a virtual network interface card (VNIC) in response to the scanning request. The scanner instance and the VNIC communicating with a routing namespace that can communicate with two or more scanner instances simultaneously. Until the target address has been scanned: one or more packets can be sent from the scanner instance to the target address via the routing namespace and VNIC. The one or more packets can be wrapped in one or more packet wrappers identifying the target address and the target network. In response to the target address being scanned, the scanner instance and VNIC can be decommissioned.

    Packet header randomization
    5.
    发明授权

    公开(公告)号:US09712501B2

    公开(公告)日:2017-07-18

    申请号:US14919246

    申请日:2015-10-21

    IPC分类号: H04L29/06

    摘要: A system and method for the randomization of packet headers is disclosed. A controller is used to provide random values, also referred to as nonces, that replace the source and destination addresses that typically appear in a packet header. The controller also provides routing rules to the switches and routers in the network that allow these devices to properly route packets, even though the source and destination addresses are not present. In some embodiments, network devices that support software-defined networking (SDN) are employed. The number of times that a particular nonce is used may be variable. In some embodiments, a nonce is used for exactly one packet header. In this way, packets may traverse a network using nonces in place of actual source and destination addresses. Because the nonces are changed periodically, detection of traffic patterns is made significantly more difficult.

    DESTINATION ADDRESS CONTROL TO LIMIT UNAUTHORIZED COMMUNICATIONS
    8.
    发明申请
    DESTINATION ADDRESS CONTROL TO LIMIT UNAUTHORIZED COMMUNICATIONS 有权
    目的地址控制限制未经授权的通信

    公开(公告)号:US20150358285A1

    公开(公告)日:2015-12-10

    申请号:US13828546

    申请日:2013-03-14

    IPC分类号: H04L29/06 H04L29/12

    摘要: Systems and methods for protecting a network including preventing data traffic from exiting the network unless a domain name request has been performed by a device attempting to transmit the data traffic. In an embodiment, a device within the protected network attempting to send data outside the protected network requests an address for a destination outside the protected network from a domain name server (DNS). In response, the DNS provides an address of the destination to the device and a gateway. In response to receiving the address, the gateway temporarily allows access to the address. In an embodiment, a DNS is coupled to a protected network and the gateway, the DNS provides an external address to a device in response to a request; and a mapping to the gateway; the gateway, coupled to a protected network and an external network, allows traffic according to the mapping.

    摘要翻译: 用于保护网络的系统和方法,包括防止数据流量离开网络,除非域名请求已被尝试发送数据业务的设备执行。 在一个实施例中,受保护网络内尝试在受保护网络外发送数据的设备向域名服务器(DNS)请求受保护网络外的目标地址。 作为响应,DNS向设备和网关提供目的地的地址。 响应于接收地址,网关临时允许访问地址。 在一个实施例中,DNS被耦合到受保护的网络和网关,DNS响应于请求向设备提供外部地址; 和映射到网关; 耦合到受保护网络和外部网络的网关允许根据映射的流量。