Patent classifications
H04L63/16
System and method for network tapestry multiprotocol integration
Systems and methods for connecting devices via a virtual global network across network fabrics using a network tapestry are disclosed. The network system comprises a first access point server in communication with a first backbone exchange server, a second access point server in communication with a second backbone exchange server, and a network tapestry comprising a first communication path connecting the first and second access point servers and a second communication path connecting the first and second backbone exchange servers.
Method and apparatus for identifying encrypted data stream
A method includes parsing a handshake message of an encrypted data stream according to a secure encrypted transmission protocol corresponding to the encrypted data stream, to obtain a plurality of fields included in the handshake message, determining, from a plurality of rule sets and based on the plurality of fields, a rule set that matches the handshake message, and determining, based on a mapping relationship between the matched rule set and an application, an application corresponding to the encrypted data stream.
FULL-DUPLEX COMMUNICATIONS AND PHYSICAL LAYER SECURITY
Methods, systems, and devices for wireless communications are described. A base station may indicate for a first device to transmit random information in the direction of an adverse device on at least partially overlapping time and frequency resources that are also used for receiving a downlink message from the base station. By transmitting the random information in the direction of the adverse device, the first device may cause entropy overhead to the adverse device, impacting an ability of the adverse device to decode portions of the downlink message transmitted to and intended for the first device. Accordingly, the first device may receive the downlink message and may concurrently transmit the random information in the direction of the adverse device on time and frequency resources that at least partially overlap with time and frequency resources used for receiving the downlink message based on receiving the indication from the base station.
Unique ID generation for sensors
Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.
Managing session secrets for continuous packet capture systems
Embodiments are direct to monitoring communication between computers may be using network monitoring computers (NMCs). Network packets that are communicated between the computers may be captured and stored in a data store. If the NMCs identify a secure communication session established between two computers, the NMCs may obtain key information that corresponds to the secure communication session that includes a session key that may be provided by a key provider. Correlation information associated with the secure communication session may be captured by the NMCs. The correlation information may include tuple information associated with the secure communication session. And, the key information and the correlation information may be stored in a key escrow. The key information may be indexed in the key escrow using the correlation information.
SYSTEMS AND METHODS FOR NETWORK RISK MANAGEMENT, CYBER RISK MANAGEMENT, SECURITY RATINGS, AND EVALUATION SYSTEMS AND METHODS OF THE SAME
A method of building a risk management model, the method including: sampling a plurality of organization networks; assessing identified security features; ranking the identified security features based on security risk; transforming ranked features into categorized factors; building logistic model to blend the categorized factors into a likelihood of breach; and transforming the logistics model from a multiplicative model to an additive model by scaling the logistics model.
END-TO-END ENCRYPTION FOR LOCATION SHARING
A device implementing end-to-end encryption for location sharing may include at least one processor configured to generate a public-private keypair. The at least one processor may be further configured to encrypt, using a first key of the public-private keypair, location data corresponding to a location of the electronic device. The at least one processor may be further configured to transmit, to a server, the encrypted location data for storage. The at least one processor may be further configured to transmit, via a secure communication channel, a second key of the public-private keypair to another electronic device for subsequent retrieval of the encrypted location data by the other electronic device.
PHYSICAL CHANNEL ENCRYPTION USING SECRET KEYS
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may determine, based at least in part on a key derivation function and a set of physical layer parameters, a secret key for encrypting a unicast physical channel at a physical layer, wherein the secret key is a UE-specific secret key. The UE may transmit, to a base station, an encrypted transmission over the unicast physical channel based at least in part on the secret key. Numerous other aspects are described.
AUTOMATED CLUSTERING OF SESSIONS OF UNSTRUCTURED TRAFFIC
A natural language processor extracts features from batches of unstructured traffic. A feature weighted distance engine computes a distance matrix between pairs of feature vectors for sessions of unstructured traffic using a weight vector that assigns importance to relative placement of features in feature vectors. The distance function used to compute the distance matrix with the weight vector is conducive to generating high-quality clusters and patterns in unstructured traffic. The sessions of unstructured traffic are clustered according to the pairwise distance matrix. Generated clusters are merged with clusters for previously analyzed sessions of unstructured traffic. A pattern identification engine extracts patterns from the merged clusters that correspond to behavior of applications generating the unstructured traffic.
SYSTEM AND METHOD FOR NETWORK POLICY SIMULATION
This disclosure generally relate to a method and system for network policy simulation in a distributed computing system. The present technology relates techniques that enable simulation of a new network policy with regard to its effects on the network data flow. By enabling a simulation data flow that is parallel and independent from the regular data flow, the present technology can provide optimized network security management with improved efficiency.