Patent classifications
H04L63/0254
Filtering Network Data Transfers
Aspects of this disclosure relate to filtering network data transfers. In some variations, multiple packets may be received. A determination may be made that a portion of the packets have packet header field values corresponding to a packet filtering rule. Responsive to such a determination, an operator specified by the packet filtering rule may be applied to the portion of packets having the packet header field values corresponding to the packet filtering rule. A further determination may be made that one or more of the portion of the packets have one or more application header field values corresponding to one or more application header field criteria specified by the operator. Responsive to such a determination, at least one packet transformation function specified by the operator may be applied to the one or more of the portion of the packets.
METHOD AND DEVICE FOR DEFENDING DHCP ATTACK
A method for defending a DHCP attack is provided. The method includes monitoring packets transmitted by a client terminal coupled to a target port, and determining, in IP addresses allocated for the client terminal coupled to the target port, the number of the IP addresses generating no packet traffic in a preset first time. And the method further includes if the number of the IP addresses generating no packet traffic reaches a preset first threshold, determining that the client terminal coupled to the target port has risk of attacking, and restricting DHCP service of the target port. A device for defending a DHCP attack is also provided.
Controlling access to secured data via timed filtering of data
According to certain implementations, an access control system controls access to secured data that is stored on a secured source. A requestor system may request information representing the secured data. The access control system receives the secured data from the secured source, and selects a portion of the secured data based on a lens including a filter criteria or a modification instruction. Adjusted data may be generated based on a modification of the selected portion of data, where the modification is based on the lens. The access control system provides the adjusted data to the requestor system via an access interface. In some cases, upon completion of a time period, the access control system prevents the requestor system from accessing the adjusted data, by disabling the access interface used to access the adjusted data. The adjusted data may be deleted from the access control system.
Methods and systems for synchronizing state amongst monitoring nodes
Methods and systems for synchronizing state information amongst monitoring nodes for DDoS attack mitigation are disclosed. Embodiments of the present technology may include a method for synchronizing state information amongst monitoring nodes, the method including identifying a packet as a state-related packet by inspecting the packet below a TCP/IP stack in a monitoring node and implementing state synchronization operations below the TCP/IP stack of the monitoring node in response to identifying the packet as a state-related packet, wherein the state synchronization operations include updating an allowlist stored as a key-value map in the monitoring node based on the identified packet and generating a state update packet based on the identified packet.
DATA CENTER SYSTEM
A data center system includes: at least two data center subsystems interconnected through a layer-2 network, each of the data center subsystems comprising a plurality of hosts, a plurality of layer-2 switches connected with the plurality of hosts, a firewall group connected with the layer-2 switches, and a layer-2 extension device connected with the layer-2 switches; wherein the firewall groups of the at least two data center subsystems are configured to transmit synchronization information to each other through a synchronization channel in a first virtual local area network; wherein the layer-2 extension devices of the at least two data center subsystems are configured to transmit service information through a service channel in a second virtual local area network; and wherein the first virtual local area network and the second virtual local area network are implemented in the layer-2 network.
Hierarchical clustering in a geographically dispersed network environment
An example method for facilitating hierarchical clustering in a geographically dispersed network environment is provided and includes receiving a packet at one of a plurality of adaptive security appliance (ASA) units in one of a plurality of ASA clusters in a cluster domain of a network environment, identifying the packet as matching an inter-data center live traffic profile, identifying a target ASA cluster in the plurality of ASA clusters in the cluster domain, querying a domain director in the target ASA cluster for a flow owner, and if the flow owner is identified by the domain director, forwarding the packet to the flow owner in the target cluster, and if the flow owner is not identified by the domain director, and the domain director includes a flow state for a flow to which the packet belongs, designating the ASA unit as the flow owner.
COMPUTERIZED SYSTEM AND METHOD FOR ADVANCED NETWORK CONTENT PROCESSING
A computerized system and method for processing network content in accordance with at least one content processing rule is provided. According to one embodiment, the network content is received at a first interface. A transmission protocol according to which the received network content is formatted is identified and used to intercept at least a portion of the received network content. The intercepted portion of the network content is redirected to a proxy, which buffers the redirected portion of network content. The buffered network content is scanned in accordance with a scanning criterion and processed in accordance with the at least one content processing rule based on the result of the scanning. The processed portion of network content may be forwarded using a second interface.
User login credential warning system
Virtually every online account requires login credentials like username and password for access. Using different credentials for each account can reduce the likelihood of unauthorized access to these accounts. Remembering all the different credentials, however, can be a challenge and it is not uncommon for a user to mistakenly provide credentials to a site that are for another, sensitive site. Accordingly, a system for warning a user of such an error is provided. The system includes a browser plugin that responds to a user entering their credentials at a requesting site by looking up an identifier of a trusted site associated with the user's credentials. The identifiers of the requesting and trusted sites are compared, and if they do not match, the browser plugin blocks the user from submitting their credentials to the requesting site. Advantageously, the system reduces the likelihood that credentials to sensitive accounts are provided by accident.
METHOD AND SYSTEM FOR PACKET ACQUISITION, ANALYSIS AND INTRUSION DETECTION IN FIELD AREA NETWORKS
A packet intercept system includes probes along the field area network. A portion of the probes are mobile probes configured to receive and process a global positioning system signal. Intercepting by the mobile probes includes implementing a global positioning tag in each packet in the traffic data stream intercepted by the mobile probes, the global positioning tag includes a timestamp and global positioning system coordinates, derived from the global position system signal. The packet intercept system backhauls the traffic data stream to an additional network that is distinct from the field area network. Processors on the additional network obtain the traffic data stream and process the stream into a live traffic data stream by ordering each packet intercepted by the mobile probes in the processed live traffic data stream, based on the timestamp. The processors analyze the processed live traffic data stream.
Application firewall
A firewall uses information about an application that originates a network request to determine whether and how to forward the request over a network. The firewall may more generally rely on the identity of the originating application, the security state of the originating application, the security state of the endpoint, and any other information that might provide an indication of malicious activity, to make routing and forwarding decisions for endpoint-originated network traffic.