Patent classifications
H04L63/0254
Robust learning of web traffic
A method includes monitoring web traffic until a threshold of network traffic is collected. The method further includes determining a number of location characteristics corresponding to the network traffic. The method further includes monitoring traffic information corresponding to the number of location characteristics until a threshold of traffic information is collected. The method further includes determining a number of location content flags corresponding to the traffic information. The method further includes generating, by a processing device, a location profile based on the number of location characteristics and the number of content flags. The method further includes blocking impermissible web traffic from reaching a client device based on the location profile.
Reliability based dynamic content recommendation
Systems and methods for automatic content remediation notification are disclosed herein. The system can include memory that can contain a content library database. The system can include a first user device and one or more servers. The one or more servers can: receive a content aggregation creation request from the first user device; identify content information associated with a set of the plurality of data packets; apply a filter request to the set of the plurality of data packets; automatically provide information relating to data packets in the restricted set of data packets to the first user device; receive content aggregate information identifying a content aggregate from the first user device; evaluate the content aggregate according to the metadata associated with the data packets of the content aggregate; and output an indicator of the evaluation result to the first user device.
Communication system, non-transitory computer-readable recording medium storing computer-readable instructions for authentication server, and non-transitory computer-readable recording medium storing computer-readable instructions for printer
An authentication server may, in a case where a communication state between the authentication server and a management server is a non-connecting state, send first authentication information to an external device. A printer may, in a case where a communication state between the printer and the management server changes from a communication-enabled state to a communication-disabled state, shift a state of the printer from a first permission state to a first prohibition state, while the state of the printer is the first prohibition state, accept an input of second authentication information from a user; and, in a case where the input of the second authentication information is accepted and the second authentication information matches the first authentication information, shift the state of the printer from the first prohibition state to a second permission state.
Network Defense Method and Security Detection Device
A network defense method and a security detection device, to resolve a problem of malicious traffic spreading in a campus network. The method includes a security detection device receiving a first packet. The security detection device detects the first packet when security detection on the first packet is not completed and a security detection capability of the security detection device is sufficient to detect the first packet. Furthermore, the security detection device forwards the first packet when security detection on the first packet is not completed and the security detection capability of the security detection device is insufficient.
IPV6 flow label for stateless handling of IPV4-fragments-in-IPV6
A network device may receive, from a first network, a network packet of a first network packet type that encapsulates a fragment of a second network packet of a second network packet type, where the network packet is part of a flow of a plurality of network packets of the first network packet type that encapsulates fragments of the second network packet, and where the network packet includes a flow label that indicates a source port for the second network packet. The network device may perform an anti-spoof check on the fragment of the second network packet based at least in part on the source port for the second network packet that is indicated by the flow label of the network packet. The network device may, based on the fragment passing the anti-spoof check, forward the fragment of the second network packet to a second network.
FIREWALL IN A VIRTUALIZED COMPUTING ENVIRONMENT USING PHYSICAL NETWORK INTERFACE CONTROLLER (PNIC) LEVEL FIREWALL RULES
Example methods are provided for a destination host to implement a firewall in a virtualized computing environment that includes the destination host and a source host. The method may comprise receiving, via a physical network interface controller (PNIC) of the destination host, an ingress packet sent by the source host. The ingress packet may be destined for a destination virtualized computing instance that is supported by the destination host and associated with a destination virtual network interface controller (VNIC). The method may further comprise retrieving a PNIC-level firewall rule associated with the destination virtualized computing instance, the PNIC-level firewall rule being applicable at the PNIC and generated by based on a VNIC-level firewall rule applicable at the destination VNIC. In response to determination that the PNIC-level firewall rule blocks the ingress packet from passing through, the ingress packet may be dropped such that the ingress packet is not sent to the destination VNIC.
VERIFYING IDENTITY OF A SOURCE OF A TRANSMISSION
A method including configuring a security device to store, in a database, a trusted fingerprint determined based at least in part on encrypting trusted connection information included in a trusted transmission packet received from a trusted source application; configuring the security device to determine a current fingerprint based at least in part on encrypting current connection information included in a current transmission packet received from a current source application; configuring the security device to compare the current fingerprint with the trusted fingerprint; and configuring the security device to process the current transmission packet based at least in part on a result of comparing the current fingerprint with the trusted fingerprint. Various other aspects are contemplated.
REASSEMBLY FREE DEEP PACKET INSPECTION FOR PEER TO PEER NETWORKS
The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.
Methods, systems, and media for detecting new malicious activity from IOT devices
Methods, systems, and media for detecting malicious activity from user devices are provided. In some embodiments, a method for detecting malicious activity from user devices is provided, the method comprising: receiving information indicating a requested connection to a destination by a first user device; adding the received information to information received from a plurality of user devices to generate aggregated connection information; determining that the requested connection to the destination by the first user device is part of an attack, wherein determining that the requested connection to the destination by the first user device is part of the attack on the destination comprises determining that more than a predetermined percentage of user devices have requested connections to the destination; receiving information indicating a requested connection to the destination by a second user device; and causing the connection to the destination by the second user device to be blocked.
Unified system for detecting policy enforcement issues in a cloud-based environment
Disclosed is a unified security system of cloud-based components configured for (a) packet-level and (b) protocol-level access control and traffic inspection, (c) threat detection and (d) activity contextualization. Packet-level inspects and classifies headers in requests or responses, sets a first restrictive state or passes the request or response. Protocol-level performs deep packet inspection for malicious signatures then sets a second state or passes. Threat detection, when the request or response is an HTTP/S stream, classifies as directed to a threat destination or not, then sets a third state or passes the request or response and activity contextualization, when the request is an HTTP/S stream seeking access to a cloud-based application, recognizes, processes and classifies content-containing activity as compromising or not, then sets a fourth state or passes. A restrictive state analyzer determines whether the first, second, third or fourth restrictive state has been set and takes restrictive steps in response.