H04L63/0254

NETWORK MANAGEMENT SERVICES IN A SECURE ACCESS SERVICE EDGE APPLICATION

A software-defined wide area network (SD-WAN) environment that leverages network virtualization management deployment is provided. Edge security services managed by the network virtualization management deployment are made available in the SD-WAN environment. Cloud gateways forward SD-WAN traffic to managed service nodes to apply security services. Network traffic is encapsulated with corresponding metadata to ensure that services can be performed according to the desired policy. Point-to-point tunnels are established between cloud gateways and the managed service nodes to transport the metadata to the managed service nodes using an overlay logical network. Virtual network identifiers (VNIs) in the metadata are used by the managed service nodes to identify tenants/policies. A managed service node receiving a packet uses provider service routers (T0-SR) and tenant service routers (T1-SRs) based on the VNI to apply the prescribed services for the tenant, and the resulting traffic is returned to the cloud gateway that originated the traffic.

HIGH-SPEED NETWORK PACKET PAYLOAD INSPECTION SYSTEM BASED ON EBPF (EXTENDED BERKELEY PACKET FILTER)/XDP (EXPRESS DATA PATH) FOR CONTAINER ENVIRONMENT

According to the present specification, a method for inspecting a high-speed network packet payload by a terminal includes: a step of receiving L7 (Layer 7) policy related to containers from a user; a step of extracting string patterns to be inspected for each of the containers on the basis of the L7 policy through a pattern compiler; a step of creating a deterministic finite automaton (DFA) on the basis of the extracted string patterns through the pattern complier; and a step of converting a state transition table of the deterministic finite automaton into a match-action table through the pattern compiler and storing the match-action table in an eBPF (extended Berkeley Packet Filter) map for a payload inspection engine.

DYNAMIC TRAFFIC PRIORITIZATION ACROSS DATA CENTERS

The disclosure provides an approach for processing communications between connected data centers. Embodiments include receiving, at a first gateway of a first data center from a second gateway of a second data center, one or more policies associated with traffic attributes. Embodiments include programming priority routes between the first gateway and the second gateway over a virtual private network (VPN) tunnel based on the one or more policies, wherein each of the priority routes is associated with a traffic attribute of the traffic attributes. Embodiments include providing the one or more policies to a central controller of the first data center and programming, by the central controller, one or more tables associated with a centrally-managed virtual switch based on the one or more policies. Embodiments include updating a database associated with each of a plurality of hosts based on the programming of the one or more tables.

Generation method, generation device, and recording medium

A generation method includes identifying, as paths that are abstraction candidates, dynamically generated paths among paths in a profile that is used to determine whether each request to a server is an attack, and counting numbers of path variations corresponding to the respective paths that are abstraction candidates, and abstracting paths contained in the profile when a number of variations counted at the counting satisfies a certain condition, by processing circuitry.

Simulating user interactions for malware analysis

Simulating user interactions during dynamic analysis of a sample is disclosed. A sample is received for analysis. Prior to execution of the sample, a baseline screenshot of a system folder is generated by accessing frame buffer data stored on a graphics card. The sample is caused to execute, at least in part using one or more hypervisor instructions to move a pointing device to an icon associated with the sample. A current screenshot of the system folder is generated by accessing current frame buffer data stored on the graphics card.

Reassembly free deep packet inspection for peer to peer networks
11695784 · 2023-07-04 · ·

The present disclosure relates to a system, a method, and a non-transitory computer readable storage medium for deep packet inspection scanning at an application layer of a computer. A method of the presently claimed invention may scan pieces of data received out of order without reassembly at an application layer from a first input state generating one or more output states for each piece of data. The method may then identify that the first input state includes one or more characters that are associated with malicious content. The method may then identify that the data set may include malicious content when the first input state combined with one or more output states matches a known piece of malicious content.

ANTI-PIRACY CONTROL BASED ON BLACKLISTING FUNCTION
20230006971 · 2023-01-05 ·

An electronic device is provided for control of an execution of a third-party application based on a blacklisting function. The electronic device includes circuitry that executes a monitor application that is a part of an operating system rooted onto the electronic device. The monitor application has system privileges to examine the code and execution of the third-party application installed on the electronic device. The circuitry identifies, by the monitor application, one or more requests to access a network resource from a runtime code of the third-party application. The circuitry extracts, by the monitor application, one or more first network resource identifiers associated with the network resource from the one or more requests. The circuity compares, by the monitor application, the first network resource identifiers with the blacklist associated with the monitor application. The circuitry controls, by the monitor application, the execution of the third-party application based on the comparison.

Method and device for detecting an attack on a serial communications system

A method for detecting an attack on a serial communications system which determines the status of messages transmitted via the serial communications system to obtain a sequence of statuses, compares the sequence of statuses with at least one reference sequence, and determines that there is an attack on the serial communications system in response to the sequence of statuses deviating from the reference sequence. The status of one of the messages is based on properties of the message and properties of a preceding message.

Can communication based hacking attack detection method and system
11522878 · 2022-12-06 · ·

Provided is a CAN communication based abnormal message detection method including obtaining reception times of reception messages; a reception filtering operation for performing a period calculation for comparing a difference between reception times of reception messages having the same message ID and a reference period of the corresponding message ID; an abnormal message detecting operation for determining the reception messages as abnormal messages when, as a result of the period calculation, the difference between the reception times is smaller than the reference period and determining the reception messages as normal messages when the difference between the reception times is greater than the reference period; and a blocking operation for blocking the abnormal messages.

SYSTEMS AND METHODS FOR SECURE COMMUNICATION

An encrypted message comprising a DNS request may be received from a client device. The DNS request may be decrypted to determine an IP address and a port associated with the client device. A security token may be determined based on the IP address and the port. A message comprising an indication of the DNS request and the security token may be sent to a DNS server. A reply comprising a payload and the security token may be received from the DNS server. Based on the security token, an indication of the payload of the reply may be sent to the client device.