H04L2463/144

DYNAMIC INJECTION OR MODIFICATION OF HEADERS TO PROVIDE INTELLIGENCE
20200358786 · 2020-11-12 · ·

A method, system, and computer-usable medium are disclosed for receiving a response, by a security management system, from a site external to an internal network comprising the security management system to an endpoint device of the internal network, and injecting a header into the response by the security management system, the header including security rules, such that when the response is communicated to the endpoint device, the endpoint device responds to the security management system with information regarding subsequent requests made by the endpoint device in connection with the response.

SERVICE DETECTION FOR A POLICY CONTROLLER OF A SOFTWARE-DEFINED WIDE AREA NETWORK (SD-WAN)
20200358743 · 2020-11-12 · ·

Systems and methods for detecting Internet services by a network policy controller are provided. According to one embodiment, a network controller maintains an Internet service database (ISDB) in which multiple Internet services and corresponding protocols, port numbers, Internet Protocol (IP) address ranges and singularity levels of the IP ranges are stored. The network policy controller intercepts network traffic and detects the Internet service of the network traffic. If an IP address of the network traffic falls in an IP range with highest singularity level and the protocol type, port number of the network traffic are matched in the ISDB, the corresponding Internet service is identified as the Internet service of the network traffic. The network policy controller further controls transmission of the network traffic based on the Internet service.

IDENTIFICATION AND CONTROL OF PERMISSIBLE ROBOCALLING ON INGRESS TO A TELECOMMUNICATIONS NETWORK
20200359221 · 2020-11-12 · ·

A robocall management system is provided that identifies, classifies, and routes one or more robocalls on ingress into a telecommunications network. In some instances, a robocall may be received at an ingress point of the network and analyzed by the robocall management system. Analysis of the received call may access one or more types of identification, such as an identification token, and classify the robocall as permissible or impermissible based on the identification data. Additionally, the robocall management system may monitor a rate of received robocalls from a known robocall customer and compare the rate of robocalls made to a CPS threshold value associated with the customer. One or more routing actions may be executed on a received robocall based on the classification, including routing the robocall to the destination, selecting a routing path via the receiving network, and/or blocking the robocall at the ingress device.

Applying bytecode obfuscation techniques to programs written in an interpreted language
10834101 · 2020-11-10 · ·

In an embodiment, a computer system configured to improve security of client computer interacting with server computers comprises one or more processors; a digital electronic memory storing a set of program instructions which when executed using the one or more processors cause the one or more processors to: process a first set of original instructions that produce a first set of outputs or effects; generate a first set of interpreter instructions that define a first interpreter; generate a first set of alternate instructions from the first set of original instructions, wherein the first set of alternate instructions is functionally equivalent to the first set of original instructions when the first set of alternate instructions is executed by the first interpreter; send, to the first client computer, the first set of alternate instructions and the first set of interpreter instructions.

System and method for simulating network security threats and assessing network security

A system and method of security assessment of a network is described. The system may include one or more security assessment computers controlled by a security assessor, and connected to a network, and first executable program code for acting as an agent on a first end device on the network. The first executable program code is configured to be executed by a browser application of the first end device, and is configured to initiate a simulation by requesting information from at least a first security assessment computer of the one or more security assessment computers.

Signal distribution score for bot detection
10826920 · 2020-11-03 · ·

Technologies for detecting bot signals include extracting at least a primary signal and a secondary signal from header data logged by an automated service during a time interval, where the header data is associated with web-based client-server requests received by an online system, generating distribution data representative of the secondary signal when the primary signal matches a first criterion, converting the distribution data to a quantitative score, after the time interval, causing a web-based client-server request to be blocked or redirected when the quantitative score matches a second criterion.

APPARATUS, SYSTEM AND METHOD FOR IDENTIFYING AND MITIGATING MALICIOUS NETWORK THREATS

Implementations of the present disclosure involve a system and/or method for identifying and mitigating malicious network threats. Network data associated is retrieved from various sources across a network and analyzed to identify a malicious network threat. When a threat is found, the system performs a mitigating action to neutralize the malicious network threat

Content delivery network (CDN) bot detection using primitive and compound feature sets

A method of detecting bots, preferably in an operating environment supported by a content delivery network (CDN) that comprises a shared infrastructure of distributed edge servers from which CDN customer content is delivered to requesting end users (clients). The method begins as clients interact with the edge servers. As such interactions occur, transaction data is collected. The transaction data is mined against a set of primitive or compound features sets to generate a database of information. In particular, preferably the database comprises one or more data structures, wherein a given data structure associates a feature value with its relative percentage occurrence across the collected transaction data. Thereafter, and upon receipt of a new transaction request, primitive or compound feature set data derived from the new transaction request are compared against the database. Based on the comparison, an end user client associated with the new transaction request is then characterized, e.g., as being associated with a human user, or a bot.

DECENTRALIZED METHOD AND SYSTEM FOR ACCURATELY DETERMINING A LEVEL OF ACTIVITY OF A CLIENT DEVICE

One or more computing devices, systems, and/or methods for monitoring levels of activity of client devices using a cluster of servers having a decentralized network architecture are provided, where over-counting, which may be caused by an uneven distribution of requests transmitted by the client devices to the cluster of servers, may be mitigated. For example, a request may be received by a first server, of the cluster of servers, from a client device. A first counter value associated with a level of activity of the client device may be incremented by a first number. One or more data packets may be transmitted to one or more servers of the cluster of servers. Each data packet of the one or more data packets may comprise an instruction to increment a counter value associated with the client device by a second number, which may be different than the first number.

DGA behavior detection
10812501 · 2020-10-20 · ·

Techniques for Domain Generation Algorithm (DGA) behavior detection are provided. In some embodiments, a system, process, and/or computer program product for DGA behavior detection includes receiving passive Domain Name System (DNS) data that comprises a plurality of DNS responses at a security device; and applying a signature to the passive DNS data to detect DGA behavior, in which applying the signature to the passive DNS data to detect DGA behavior further comprises: parsing each of the plurality of DNS responses to determine whether one or more of the plurality of DNS responses correspond to a non-existent domain (NXDOMAIN) response.