摘要:
Systems and methods for providing an interface to communicate policy information from a policy server to a policy enforcement point are presented. An external policy server is used to implement and provide various policies to a policy enforcement point for enforcement on subscriber sessions and traffic flows of a mobile subscriber. A policy enforcement point can request instructions from the policy server using an access-request message and receive from the policy server unsolicited instructions with a change-of-authorization message. Policies for application to a subscriber session or traffic flow are included in the message from a policy server to the policy enforcement point. Other messages such as a disconnect message are used to terminate a subscriber session.
摘要:
The solution described herein provides systems and methods for the interoperability of network processing programs that process network packets at different levels of the network stack. This solution bridges the communications of a network packet between a first network processing program operating at a first level of a network stack in an intermediary and a second network processing program operating at a second level of the network stack of the intermediary. The first network processing program may modify an incoming network packet so that the packet may traverse the network stack to an upper level of the stack to the second network processing program. After processing the network packet at the upper layers of the stack or by the second network processing program, the first network processing program modifies the network pack in order to transmit the packet to the intended destination while traversing the intermediary.
摘要:
Procédé de classification de trafics sur réseaux de télécommunications, ce procédé comprenant une étape de capture de trafic et une étape d 'analyse approfondie des paquets, ce procédé comprenant en outre une étape de classification statistique des trafics utilisant un arbre de décision généré statistiquement. Avantageusement, l'étape de classification statistique des trafics est effectuée après l'analyse approfondie des paquets et ne concerne que les trafics qui n'ont pas été identifiés par cette analyse de paquets, notamment les trafics chiffrés, par exemple mettant en oeuvre des protocoles pair à pair cryptés.
摘要:
Methods of filling a request for content from a communications system, e.g., the internet, comprises receiving a client request for content, optionally removing from the client request information identifying the client to produce an anonymous request, optionally adding to the anonymous request information identifying the proxy system to produce a proxy request, sending the proxy request, receiving response content, optionally removing undesired material from the response content, and transmitting the response content to the client, as well as proxy systems for carrying out such methods. The proxy system and methods provide the capability to protect a client's communications system, e.g., computer, from being infiltrated by data-mining or spy software (spyware), malicious software (malware) or advertisement software, including pop-up advertisements (adware). The invention also makes it possible to avoid the disclosure of the client's personal information and web browsing activity.
摘要:
A method for inspection of compressed data packages, which are transported over a data network, is provided. The data packages comprise a data package header containing control data for securing the correct delivery and interpretation of the package and a payload part containing data to be transferred over the data network. The method comprises the steps of: a) extracting payload data from the payload part of the package, b) appending the extracted payload data to a stream of data, c) probing the data package header so as to determine the compression scheme that is applied to the payload data, d) applying the determined compression scheme to at least one search pattern, which has previously been stored in a search key register, and e) comparing the compressed search pattern to the stream of data. The method can be carried out by dedicated hardware.
摘要:
A system defines at least one key event to be monitored by at least one agent, and creates a graphical model for the at least one key event. The system observes the at least one key event. The system infers a degree of attack on the computer system based on an observation of the at least one key event in conjunction with a result of an effect the at least one key event has on the graphical model. The system then adjusts a security policy based on an output of the graphical model.
摘要:
A control device (D) is intended to form part of a router (R1) of a communication network. This router (R1) comprises analysis means (MA) responsible for determining in the header of a data packet, received and to be routed, the destination address that it contains, with a view to the routing of this packet received to this destination address. The device (D) comprises i) control means (MC) responsible, should the analysis means (MA) determine a header comprising a nonallocated or inaccessible destination address, for extracting the packet containing this header, and ii) processing means (MT) responsible for associating with a packet extracted by the control means (MC) a chosen replacement destination address, allocated to an item of packet analysis equipment (EA1), so that the router (R1) routes to this associated replacement destination address.
摘要:
Disclosed techniques provide enhanced security for a communications network. Access terminal devices intended for operation via the network are expected to have security agent functionality, e.g. in the form security agent software loaded into or otherwise enabled on each of the access terminal devices. Registration procedures include verification that such an agent is present/enabled on an access terminal and that the agent currently implemented on the terminal device provides adequate security for the communications network against malicious traffic from that device.
摘要:
A data transfer client device comprising: memory for storing at least one dataset comprising a plurality of data fields and at least one filter definition comprising data defining which of the data fields can be accessed by a particular server; an interface for communicating with a data transfer server, whereby a data transfer server can access a dataset stored in the memory; and a data transfer controller for policing access during a data transfer operation by a data transfer server to the data fields, the data transfer controller being arranged to determine in dependence on the filter definition whether the data transfer server can access particular data fields and to deny the server access to those data fields to which the data transfer controller determines that the data transfer server cannot have access.
摘要:
A control device (D) is intended to form part of a router (R1) of a communication network. This router (R1) comprises analysis means (MA) responsible for determining in the header of a data packet, received and to be routed, the destination address that it contains, with a view to the routing of this packet received to this destination address. The device (D) comprises i) control means (MC) responsible, should the analysis means (MA) determine a header comprising a nonallocated or inaccessible destination address, for extracting the packet containing this header, and ii) processing means (MT) responsible for associating with a packet extracted by the control means (MC) a chosen replacement destination address, allocated to an item of packet analysis equipment (EA1), so that the router (R1) routes to this associated replacement destination address.