Patent classifications
H04L63/0245
NETWORK TRAFFIC MANAGEMENT USING SERVER NAME INDICATION
A network gateway apparatus monitors Quic user datagram protocol (UDP) Internet Connection (QUIC) packets between a first device and a second device, extracts a version of the QUIC protocol and a connection identification from an unprotected portion of the protected header in response to detecting a QUIC packet having a protected header in use, determines a salt used in encryption of the protected header based on the version of the QUIC protocol, calculates a client initial secret based on the salt and the connection identification, determines an unprotected payload of the QUIC packet based on the client initial secret, a protected payload of the QUIC packet and the unprotected portion of the protected header, and extracts a server name indication (SNI) from the unprotected payload.
METHODS AND APPARATUS FOR HINDRANCE OF ADVERSE AND DETRIMENTAL DIGITAL CONTENT IN COMPUTER NETWORKS
A network computer system provides logic to cause a client compute device to perform operations in connection with the client compute device rendering a publisher's webpage. The operations performed by the client compute device include retrieving rules from a collection of rules, each rule of the collection being associated with at least one of a plurality of third-party digital content identifiers, each third-party digital content identifier uniquely identifying a corresponding third-party digital content; detection of execution of a third-party tag on the client compute device, including identifying a digital content identifier that is utilized in execution of the third-party tag; matching the digital content identifier of the executing third-party tag to one of the retrieved rules; and implementing a security or compliance operation with respect to the third-party tag based at least in part on the matched rule.
Method, apparatus, and computer readable medium for providing security service for data center
Embodiments of the present disclosure relate to a method, apparatus, and computer readable medium for providing a security service for a data center. According to the method, a packet terminating at or originating from the data center is received. At least one label is determined for the packet, each label indicating a security requirement for the packet. Based on the at least one label, a security service chain is selected for the packet, the security service chain including an ordered set of security functions deployed in the data center and to be applied to the packet. The packet is transmitted to the selected security service chain in association with the at least one label, the packet being processed by the ordered set of security functions in the security service chain.
Method, device, and system for network traffic analysis
A method, device, and system for network traffic analysis are provided. The method comprises obtaining traffic data of current time interval, recording the traffic data in a Chinese Remainder Theorem based Reversible Sketch (CRT-RS) based on a hash operation comprising Modulo operations, detecting abnormal buckets in the CRT-RS based on a change between the traffic data of current time interval and traffic data of previous time interval, and recovering abnormal source address associated information based on the abnormal buckets, wherein the modulus of the Modulo operations are selected from the modulus in Chinese Remainder Theorem (CRT) as pairwise coprime integers and the CRT-RS includes a plurality of buckets. The step of detecting uses a Modified Multi-chart Cumulative Sum.
Methods for zero trust security with high quality of service
The present disclosure relates to network security software cooperatively configured on plural nodes to monitor, alert, authenticate, and authorize devices, applications, users, and data protocol in network communications by exchanging nonpublic identification codes, application identifiers, and data type identifiers via pre-established communication pathways and comparing against pre-established values to provide authorized communication and prevent compromised nodes from spreading malware to other nodes.
Surgical instrument utilizing drive signal to power secondary function
A surgical instrument connectable to a surgical energy module that is configured to provide a first drive signal at a first frequency range for driving a first energy modality and a second drive signal at a second frequency range for driving a second energy modality is provided. The surgical instrument can comprise a surgical instrument component configured to receive power from a direct current (DC) power source, an end effector, and a circuit. The circuit can be configured to convert the first electrical signal to a DC voltage, apply the DC voltage to the surgical instrument component, and deliver the second energy modality to the end effector according to the second drive signal. Alternatively, the circuit can be disposed within a cable assembly configured to connect the surgical instrument to the surgical energy module.
Systems and methods for providing shifting network security via multi-access edge computing
Disclosed is a device for configuring and implementing network security for a connected network node, and for shifting the network security closer to the attack point of origin. In particular, the device may activate attack protections on different Multi-Access Edge Computing (“MEC”) devices that are physically located near or at the attack point of origin. The device may detect an attack signature based on one or more received data packets, and may provide a response with an extended header field, the attack signature, and/or other attack protection instructions. The responses may be passed to an address of a suspected attacker. MEC devices along the network path may detect and receive the responses, and implement attack protections in response. The responses may also be passed to a multicast or broadcast address that the MEC device may use to receive responses.
Allocation of tokens for network packets based on application type
Described herein are systems, methods, and software to manage the deployment and use of application identifier tokens in a distributed firewall environment. In one implementation, a computing environment generates tokens associated with application types executing on virtual nodes in the computing environment. After generating the tokens, the computing environment provides at least one token of the tokens to each of the virtual nodes based on at least one application type executing on the virtual node. When a communication is identified in the virtual node associated with an application, the virtual node may encapsulate the communication and a corresponding token in a packet and forward the packet via a virtual network interface associated with the virtual node.
Technique for processing messages sent by a communicating device
A processing technique can be implemented by a security device. The security device verifies that a message sent by a communicating device to a receiving device is a message to be sent. When the verification is positive, the message is sent to the receiving device. The security device than receives a notification sent by the receiving device indicating that the sent message is to be blocked. Subsequent messages of the same type as the message for which the notification was received, sent by communicating devices provided by the same manufacturer and with the same product identifier as those of the communicating device that sent the message are thus blocked by the security device during the verification process.
Systems and methods for command and control protection
A host computer system may be configured to connect to a network. The host computer system may be configured to implement a workspace and an isolated computing environment. The host computer system may be configured to isolate the isolated computing environment from the workspace using an internal isolation firewall. The internal isolation firewall may be configured to prevent data from being communicated between the isolated computing environment and the workspace, for example, without an explicit user input. The host computer system may be configured to implement one or more mechanisms that prevent malware received by the host computer system from receiving external communications from an external source. The one or more mechanisms may be configured to prevent control of the malware by the external source. The one or more mechanisms may be configured to prevent the malware from establishing a command channel with the external source.