Patent classifications
H04L2101/30
SYSTEM AND METHOD FOR ESTABLISHING A COMMUNICATION LINK
In one embodiment, a method includes generating a Domain Name Service (DNS) request comprising a domain name, determining that the DNS request corresponds to a first computer configured to communicate securely, and sending, based on the determination, a request to establish a communication link with the first computer configured to communicate securely, the request including an identifier of a client device used to determine whether the client device is authorized to communicate with the first computer. The method includes receiving, in response to the request to establish the communication link, a resource used to establish the communication link, wherein the resource corresponds to a qualify of service level for the communication link, determining, in response to the request to establish a communication link, whether a software module for communicating securely requires installation on the client device, and if it is determined that the software module requires installation on the client device: accessing a network address for downloading the software module, downloading the software module, and installing the software module on the client device. The method also includes automatically establishing the communication link having the quality of service level using the received resource communicating securely with the first computer over the established communication link having the quality of service, wherein the communication link passes through one or more intermediate devices that provide anonymity of at least one of the client device and the first computer, and client device is a user device.
Classifying uniform resource locators
A target domain name is classified using hash strides including domain name components. The hash strides are fed into a set of bloom filters programmed to identify pre-determined domain name categories. A programmable mapping table is provided for selecting one of many probable classifications.
Reliability of a connection during a communication session on a network device
The present application details methods and systems for improving the reliability of a connection during a communication session on a network device. In one or more embodiments, the network device maps to and connects with multiple datacenters. For example, the network device connects with a primary datacenter and participates in a communication session via a primary media bridge connection while jointly being connected with a secondary datacenter. In addition, the network device can switch from the primary media bridge connection to a secondary media bridge connection if a fault is detected on the primary media bridge connection.
Classifying uniform resource locators
A target domain name is classified using hash strides including domain name components. The hash strides are fed into a set of bloom filters programmed to identify pre-determined domain name categories. A programmable mapping table is provided for selecting one of many probable classifications.
Identifying Malware Communications with DGA Generated Domains by Discriminative Learning
Techniques are presented to identify malware communication with domain generation algorithm (DGA) generated domains. Sample domain names are obtained and labeled as DGA domains, non-DGA domains or suspicious domains. A classifier is trained in a first stage based on the sample domain names. Sample proxy logs including proxy logs of DGA domains and proxy logs of non-DGA domains are obtained to train the classifier in a second stage based on the plurality of sample domain names and the plurality of sample proxy logs. Live traffic proxy logs are obtained and the classifier is tested by classifying the live traffic proxy logs as DGA proxy logs, and the classifier is forwarded to a second computing device to identify network communication of a third computing device as malware network communication with DGA domains via a network interface unit of the third computing device based on the trained and tested classifier.
Using domain name system security extensions in a mixed-mode environment
A method relates to generating, by a processing device executing a DNS resolver, a first domain name system (DNS) query comprising a DNS request generated from an application executing on the processing device to query a first DNS server serving a first DNS zone connected to the processing device via a public network, receiving, from the first DNS server, a first resource record comprising a DNS answer to the DNS query, a second resource record comprising a digital signature generated by signing the DNS answer with a first private key of the first DNS zone, a third resource record comprising a first public key for verifying the digital signature, and one or more files for validating a chain of trust of the first public key, determining, by the processing device in view of the one or more files, that the chain of trust of the first public key misses at least one of a trust anchor or a link in the chain of trust, and generating a second DNS query comprising the DNS request to query a second DNS server residing in a private network of the processing device.
METHOD FOR PUBLISHING AND SHARING CONTENT ON THE INTERNET
A computer-implemented system and method for enabling publishing/sharing of content to a web page by sending an email to a centralized email address. This is accomplished with an email server that employs a modular array of software inclusive of a Message Monitoring System (MMS) software application, an interpretation layer software module (the Interpeter Module), and Message Posting System (MPS) software application. The MMS software automatically extracts messages, invokes the Interpeter Module to detect, the sending format and to provide necessary reformatting. The MMS software then invokes the MPS software which posts the reformatted message content to a designated web page at the assigned URL. Any user registered or not can post any content to a web page anytime simply by sending, the content to a singular email address (e.g, Post@abovo42.com). The present solution is easy to use and enables real-time publishing/sharing by multiple users.
Method for selecting a device in a telecommunications network
A method is provided for selecting a device in a telecommunications network in accordance with characteristics relating to the implementation of a telecommunications service, comprising the following steps: a) receiving a set of characteristics relating to said service; b) forming a first symbolic address for querying an address server, using at least one portion of the overall characteristics of the set on the one hand, and an address domain name on the other hand; c) sending the first address to the address server; d) receiving a list of one or more devices compatible with the characteristics; and e) selecting one device from the list.
Detecting homographs of domain names
Various techniques for detecting homographs of domain names are disclosed. In some embodiments, a system, process, and/or computer program product for detecting homographs of domain names includes receiving a DNS data stream, wherein the DNS data stream includes a DNS query and a DNS response for resolution of the DNS query; applying a homograph detector for each domain in the DNS data stream; and detecting a homograph of a domain name in the DNS data stream using the homograph detector.
Network address resolution
A content delivery method including the operations of receiving a uniform resource locator resolution request at an authoritative name server for a domain where the uniform resource resolution request is received based, at least in part, on a host name of the uniform resource resolution request where the host name is uniquely related to a resource associated with the uniform resource resolution request. The method further including the operation of tracking a popularity of the resource based on the host name uniquely related to the resource and providing a location within a network capable of delivering the resource where the provided location is based on the popularity of the resource.