H04L47/32

Secure message processing protocol

A system and method for processing electronic data messages mitigate the transmission of one or more electronic messages including a sequence of data as a plurality of packets characterized by a sequence therebetween corresponding to the sequence of the data of the electronic message, each packet including data indicative of the sequence of that packet relative to the others of the plurality of packets, to a receiving system, prior to the sender determining that the message(s) is/are desired, alone or in conjunction with subsequently canceling or otherwise invalidating the message(s). The system and method mitigate such behavior by adding a timestamp when the packets are received, detecting if at least one of the received augmented packets of the electronic data message was received by the network interface in an order different from the sequence between the plurality of packets, and taking an action with respect to the electronic data message.

Secure message processing protocol

A system and method for processing electronic data messages mitigate the transmission of one or more electronic messages including a sequence of data as a plurality of packets characterized by a sequence therebetween corresponding to the sequence of the data of the electronic message, each packet including data indicative of the sequence of that packet relative to the others of the plurality of packets, to a receiving system, prior to the sender determining that the message(s) is/are desired, alone or in conjunction with subsequently canceling or otherwise invalidating the message(s). The system and method mitigate such behavior by adding a timestamp when the packets are received, detecting if at least one of the received augmented packets of the electronic data message was received by the network interface in an order different from the sequence between the plurality of packets, and taking an action with respect to the electronic data message.

Methods and apparatus to throttle media access by web crawlers

Methods, apparatus, systems and articles of manufacture are disclosed to throttle resource access by web crawlers. An example method disclosed herein includes obtaining, at a server, a media request message for media hosted by the server, the media request message requesting access to the media, characterizing a media-requesting source associated with the media request message, and inserting a time delay in a media response message to the media-requesting source based on the characterization.

Methods and apparatus to throttle media access by web crawlers

Methods, apparatus, systems and articles of manufacture are disclosed to throttle resource access by web crawlers. An example method disclosed herein includes obtaining, at a server, a media request message for media hosted by the server, the media request message requesting access to the media, characterizing a media-requesting source associated with the media request message, and inserting a time delay in a media response message to the media-requesting source based on the characterization.

Correlating discarded network traffic with network policy events through augmented flow

A method for correlating discarded network traffic with network policy events in a network includes receiving a flow record. The flow record includes initial network flow information in a standard flow record format. Discarded network traffic information associated with each network policy is received from a network policy enforcement device. Network traffic is discarded based on a network traffic policy. The received flow record is correlated with the received discarded network traffic information. The discarded network traffic information is encoded into the received flow record based on the correlation while maintaining the initial network flow information to yield an enhanced flow record.

Correlating discarded network traffic with network policy events through augmented flow

A method for correlating discarded network traffic with network policy events in a network includes receiving a flow record. The flow record includes initial network flow information in a standard flow record format. Discarded network traffic information associated with each network policy is received from a network policy enforcement device. Network traffic is discarded based on a network traffic policy. The received flow record is correlated with the received discarded network traffic information. The discarded network traffic information is encoded into the received flow record based on the correlation while maintaining the initial network flow information to yield an enhanced flow record.

Providing security for internet of things (IoT) devices

Examples provided herein describe a method for providing security for Internet of Things (IoT) devices. For example, a data packet from an IoT device may be received at an edge device. A signature associated with the IoT device may be accessed at the edge device, where the signature includes network layer information about the IoT device. A set of rules may be applied by the edge device to validate the IoT device based on the accessed signature. Responsive to the IoT device being validated based on the accessed signature, received data packet, and the applied set of rules, the edge device may process the data packet from the IoT device.

Method for relaying a route discovery request in a mesh communication network
11546830 · 2023-01-03 · ·

For relaying a route-discovery request in order to discover at least one route from a source node device to a destination node device in a communication network comprising other node devices able to act as relays between the source node device and the destination node device, at least one node device among said other node devices dynamically defines a waiting delay value to be applied before relaying the route-discovery request. More precisely, said at least one node device defines the waiting delay value according to a quality level of a link via which the route-discovery request was received.

Selective tracking of acknowledgments to improve network device buffer utilization and traffic shaping

Systems and methods provide for Selective Tracking of Acknowledgments (STACKing) to improve buffer utilization and traffic shaping for one or more network devices. A network device can identify a first flow that corresponds to a predetermined traffic class and a predetermined congestion state. The device can determine a current window size and congestion threshold of the first flow. In response to a determination to selectively track a portion of acknowledgments of the first flow, the device can track, in main memory, information of a first portion of acknowledgments of the first flow. The device can exclude, from one or more buffers, a second portion of acknowledgments of the first flow. The device can re-generate and transmit segments corresponding to the second portion of acknowledgments at a target transmission rate based on traffic shaping policies for the predetermined traffic class and congestion state.

Packet Processing Method and Apparatus, Device, and Storage Medium
20220417144 · 2022-12-29 ·

This application provides a packet processing method and a device. In this application, a control identifier field is added to a packet, and the control identifier field indicates whether forwarding of the packet is allowed when a resource corresponding to a slice identifier fails to be matched. The control identifier field and a slice identifier of a network slice are carried in the packet, so that the slice identifier and the control identifier field are transmitted on a network together. When a receive end fails to match the resource corresponding to the slice identifier, the receive end can discard the packet based on the control identifier field, instead of forwarding the packet by using routing information.