H04L69/326

Supporting a routing protocol with a transport layer protocol

Various example embodiments for supporting link-state flooding for a routing protocol based on use of a transport layer protocol are presented. Various example embodiments for supporting link-state flooding for a routing protocol based on use of a transport layer protocol may be configured to support use of routing protocol messages of the routing protocol to support establishment of transport layer connections of a transport layer protocol (e.g., use of adjacency messages of the routing protocol for identifying routers configured to support use of transport layer connections for supporting link-state flooding). Various example embodiments for supporting link-state flooding for a routing protocol based on use of a transport layer protocol may be configured to support use of transport layer connections to support communication of routing protocol messages of the routing protocol (e.g., adjacency messages, link-state messages for flooding of link-state information, or the like, as well as various combinations thereof).

European telecommunications standards institute (ETSI) cooperative intelligent transport system (C-ITS) communication compatibility

Systems and methods for compatibility in European Telecommunications Standards Institute (ETSI) Cooperative Intelligent Transport System (C-ITS) station communications are disclosed. Embodiments of a method performed by a C-ITS station are disclosed. In some embodiments, the method comprises receiving a message, determining whether the message was received via an external interface of the C-ITS station or a short range interface of the C-ITS station, and upon determining that the message was received via the external interface of the C-ITS station, treating the message differently as compared to if the message was received via the short range interface of the C-ITS station.

European telecommunications standards institute (ETSI) cooperative intelligent transport system (C-ITS) communication compatibility

Systems and methods for compatibility in European Telecommunications Standards Institute (ETSI) Cooperative Intelligent Transport System (C-ITS) station communications are disclosed. Embodiments of a method performed by a C-ITS station are disclosed. In some embodiments, the method comprises receiving a message, determining whether the message was received via an external interface of the C-ITS station or a short range interface of the C-ITS station, and upon determining that the message was received via the external interface of the C-ITS station, treating the message differently as compared to if the message was received via the short range interface of the C-ITS station.

Dynamic migration of session data between firewalls to facilitate low-latency session continuity
11638150 · 2023-04-25 · ·

A method and system to facilitate session continuity where a user-plane function (UPF) serves user-equipment devices (UEs) and communicates with a transport network by default through a first firewall. As each of various ones of the UEs establishes a respective TCP session via the first firewall, the UPF determines if the UE is likely to engage in latency-sensitive communication, such as if the UE is a Ultra-Reliable Low-Latency Communication (URLLC) device and if so causes the first firewall to record the UE's TCP session 5-tuple to a centralized data storage. Thereafter when the UPF switches to use a second firewall instead of the first firewall (e.g., because the first firewall goes out of service), the UPF causes the second firewall to get from the centralized data store the TCP session 5-tuple of each such UE, for access-control use by the second firewall, to help provide session continuity.

Dynamic migration of session data between firewalls to facilitate low-latency session continuity
11638150 · 2023-04-25 · ·

A method and system to facilitate session continuity where a user-plane function (UPF) serves user-equipment devices (UEs) and communicates with a transport network by default through a first firewall. As each of various ones of the UEs establishes a respective TCP session via the first firewall, the UPF determines if the UE is likely to engage in latency-sensitive communication, such as if the UE is a Ultra-Reliable Low-Latency Communication (URLLC) device and if so causes the first firewall to record the UE's TCP session 5-tuple to a centralized data storage. Thereafter when the UPF switches to use a second firewall instead of the first firewall (e.g., because the first firewall goes out of service), the UPF causes the second firewall to get from the centralized data store the TCP session 5-tuple of each such UE, for access-control use by the second firewall, to help provide session continuity.

System and Method for Improving Content Fetching by Selecting Tunnel Devices
20230124148 · 2023-04-20 ·

A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.

Communication functions in a mesh network
11601505 · 2023-03-07 · ·

A method including receiving, at an infrastructure device from a first device in a mesh network, a request to determine a communication parameter associated with communicating meshnet data with the first device; configuring a transport layer included in a network stack associated with the infrastructure device to determine the communication parameter and to transmit identification information indicating the communication parameter to an application layer included in the network stack; configuring the application layer to determine a response including the identification information; and transmitting, by the infrastructure device, the response to the first device. Various other aspects are contemplated.

QUERY ANALYSIS USING A PROTECTIVE LAYER AT THE DATA SOURCE

A method and system for performing query analysis are described. The method and system include receiving a query for a data source at a wrapper. The wrapper includes a dispatcher and a service. The dispatcher receives the query and is data agnostic. The method and system also include providing the query from the dispatcher to the data source and to the service as well as analyzing the query using the service.

QUERY ANALYSIS USING A PROTECTIVE LAYER AT THE DATA SOURCE

A method and system for performing query analysis are described. The method and system include receiving a query for a data source at a wrapper. The wrapper includes a dispatcher and a service. The dispatcher receives the query and is data agnostic. The method and system also include providing the query from the dispatcher to the data source and to the service as well as analyzing the query using the service.

DEPLOYABLE NETWORK SENSOR FOR MULTIPLE PLATFORMS

Disclosed herein are methods, systems, and processes for centralized containerized deployment of network traffic sensors to network sensor hosts for deep packet inspection (DPI) that supports various other cybersecurity operations. A network sensor package containing a preconfigured network sensor container is received by a network sensor host from a network sensor deployment server. Installation of the network sensor package on the network sensor host causes execution of the network sensor container that further causes deployment of an on-premise network sensor along with a network sensor management system, a DPI system, and an intrusion detection/prevention (IDS/IPS) system. The configurable on-premise network sensor is deployed on multiple operating system distributions of the network sensor host and generates actionable network metadata using DPI techniques for optimized log search and management and improved intrusion detection and response (IDR) operations.