IDENTIFYING DEVICES WITH MULTIPLE NETWORK INTERFACE CARDS IN A NETWORK

    公开(公告)号:US20240338332A1

    公开(公告)日:2024-10-10

    申请号:US18297276

    申请日:2023-04-07

    IPC分类号: G06F13/40

    CPC分类号: G06F13/4068 G06F2213/40

    摘要: A service obtains traffic logs for traffic of a network that has been sent according to a Layer 7 protocol (e.g., SNMP or DNS). The service identifies from the traffic logs device names that appear to correspond to different devices/NICs as names of candidate multi-NIC devices. The service extracts features from names of the candidate multi-NIC devices and generates respective feature vectors. The service can generate “documents” representing each device name from which it extracts features by determining n-grams of each device name, where a set of n-grams of a device name is treated as a document, and each n-gram is treated as a term in the document. Exemplary features that can be extracted based on a device name document include within-document and cross-document uniqueness scores. The service clusters the feature vectors with unsupervised learning and identifies clusters of a size that satisfies a criterion as corresponding to multi-NIC devices.

    AUTOMATING IOT DEVICE IDENTIFICATION USING STATISTICAL PAYLOAD FINGERPRINTS

    公开(公告)号:US20240314105A1

    公开(公告)日:2024-09-19

    申请号:US18674456

    申请日:2024-05-24

    发明人: Feng Wang

    IPC分类号: H04L9/40

    CPC分类号: H04L63/0227

    摘要: Internet of Things (IoT) device classification is disclosed. Byte frequency information is obtained from an application executing on an Internet of Things (IoT) device that has a corresponding flow. The obtained byte frequency information is transmitted to a remote system. A classification of the application is received from the remote system. A policy is applied to the IoT device based at least in part on the received classification.

    CERTIFICATE-BASED ADDITION OF NODES TO A WIRELESS MESH NETWORK

    公开(公告)号:US20240292472A1

    公开(公告)日:2024-08-29

    申请号:US18174363

    申请日:2023-02-24

    发明人: Ta Chien Lin

    摘要: A node being added to a wireless mesh network (“network”) identifies an available wireless network(s) for which WPA-Enterprise is deployed that is advertised by a “gateway node,” such as the network's main node. The new and main node have installed digital certificates that were issued by the mesh service provider. The node attempts to connect to the wireless network(s) using 802.1X authentication with its certificate. On successful network connection establishment, the node establishes a secure connection with an external service offered by the mesh service provider. Meanwhile, a user associated with the network scans a code attached to the node to initiate registration of the node for the user and network. The external service receives the encoded information, registers the node in association with the user and the network, and communicates a network configuration to the node over the secure connection. The node installs the configuration and is incorporated in the network as a satellite node.

    Security policy enforcement and visibility for network traffic with masked source addresses

    公开(公告)号:US12069102B2

    公开(公告)日:2024-08-20

    申请号:US17646857

    申请日:2022-01-03

    IPC分类号: H04L9/40 H04L47/20 H04L67/52

    摘要: Some network architectures include perimeter or edge devices which perform network address translation or otherwise modify data in a network traffic packet header, such as the source address. The modification of the source address prevents downstream devices from knowing the true or original source address from which the traffic originated. To address this issue, perimeter devices can insert the original source address in an X-Forwarded-For field of the packet header. Firewalls and related security services can be programmed to record the original source address in the XFF field in addition to the other packet information and to consider the original source address during security analysis. Using the original source address in the XFF field, services can determine additional characteristics about the traffic, such as geographic origin or associated user accounts, and use these characteristics to identify applicable rules or policies.