Collaborative security for application layer encryption

    公开(公告)号:US11570213B2

    公开(公告)日:2023-01-31

    申请号:US16788999

    申请日:2020-02-12

    Abstract: A non-transitory computer readable medium comprising instructions stored thereon, the instructions effective to cause at least one processor to: establish trustworthiness of an application installed on a endpoint, the established trustworthiness is sufficient for an enterprise security infrastructure to treat the application installed on the endpoint and the endpoint as a trusted application and a trusted endpoint; negotiate with the trusted endpoint to determine a traffic inspection method for traffic flows originating at the trusted application that is destined for a service, the traffic inspection method is determined based on at least the trusted application, and the service; and instruct the trusted application of the determined traffic inspection method.

    LIGHTWEIGHT DISTRIBUTED APPLICATION SECURITY THROUGH PROGRAMMABLE EXTRACTION OF DYNAMIC METADATA

    公开(公告)号:US20210218771A1

    公开(公告)日:2021-07-15

    申请号:US16741794

    申请日:2020-01-14

    Abstract: Presented herein are methodologies for implementing application security. A method includes generating an extraction vector based on a plurality of application security rules to be enforced, transmitting the extraction vector to a first agent operating on a first network device and to a second agent operating on a second network device; receiving, separately, from the first agent and from the second agent, first metadata generated by the first agent and second metadata generated by the second agent by the agents applying the extraction vector to network traffic passing, respectively, through the first network device and the second network device. The first metadata includes a transaction ID assigned by the first agent, and the second metadata includes the same transaction ID. The method further includes correlating the first metadata with the second metadata based on the transaction ID to construct a transactional service graph for the network traffic.

    Detection of malware and malicious applications

    公开(公告)号:US10305928B2

    公开(公告)日:2019-05-28

    申请号:US14820265

    申请日:2015-08-06

    Abstract: A method comprises receiving, at a network infrastructure device, a flow of packets, determining, using the network infrastructure device and for a first subset of the packets, that the first subset corresponds to a first datagram and determining a first length of the first datagram, determining, using the network infrastructure device and for a second subset of the packets, that the second subset corresponds to a second datagram that was received after the first datagram, and determining a second length of the second datagram, determining, using the network infrastructure device, a duration value between a first arrival time of the first datagram and a second arrival time of the second datagram, sending, to a collector device that is separate from the network infrastructure device, the first length, the second length, and the duration value for analysis.

    Detection of malware and malicious applications

    公开(公告)号:US11057420B2

    公开(公告)日:2021-07-06

    申请号:US16370853

    申请日:2019-03-29

    Abstract: A method comprises receiving, at a network infrastructure device, a flow of packets, determining, using the network infrastructure device and for a first subset of the packets, that the first subset corresponds to a first datagram and determining a first length of the first datagram, determining, using the network infrastructure device and for a second subset of the packets, that the second subset corresponds to a second datagram that was received after the first datagram, and determining a second length of the second datagram, determining, using the network infrastructure device, a duration value between a first arrival time of the first datagram and a second arrival time of the second datagram, sending, to a collector device that is separate from the network infrastructure device, the first length, the second length, and the duration value for analysis.

    Differential malware detection using network and endpoint sensors

    公开(公告)号:US10187414B2

    公开(公告)日:2019-01-22

    申请号:US15214905

    申请日:2016-07-20

    Abstract: A method is disclosed in which a system compares a first set of reports characterizing network traffic flows originating from an endpoint device with a second set of reports characterizing network traffic flows originating from the endpoint device and stored at an external network device to determine whether the first set and second set of reports characterizing network traffic flows originating from an endpoint device are different. In response to determining that the first and second reports characterizing network traffic flows are different, the system identifies the network traffic flows originating from the endpoint device and reported by an external network device, but not reported by the endpoint device, as possibly indicative of malware and forwards the network traffic flows originating from the endpoint device to an analyzer for further processing. Thus, an observed difference between network traffic flows originating from an endpoint device and stored at the endpoint device and network traffic flows originating from the endpoint device and stored on an external network device are compared to detect the presence of malware residing on the endpoint device.

    APPLICATION IDENTIFICATION IN RECORDS OF NETWORK FLOWS
    6.
    发明申请
    APPLICATION IDENTIFICATION IN RECORDS OF NETWORK FLOWS 有权
    网络流量记录中的应用识别

    公开(公告)号:US20150326486A1

    公开(公告)日:2015-11-12

    申请号:US14274220

    申请日:2014-05-09

    CPC classification number: H04L12/6418 H04L43/026 H04L43/0876 H04L47/36

    Abstract: In one embodiment, a method is provided for improving data center and endpoint network visibility and security. The method comprises detecting a communication flow of a plurality of packets over a network, and generating a flow identifier that uniquely identifies the communication flow. After determining an application associated with the communication flow, a flow record is generated. The flow record includes the flow identifier and an indication of the application associated with the communication flow. The indication of the application may be, for example, a hash of the application binary file.

    Abstract translation: 在一个实施例中,提供了一种用于改进数据中心和端点网络可见性和安全性的方法。 该方法包括通过网络检测多个分组的通信流,并且生成唯一地标识通信流的流标识符。 在确定与通信流相关联的应用之后,生成流记录。 流记录包括流标识符和与通信流相关联的应用的指示。 应用程序的指示可以是例如应用程序二进制文件的散列。

    Detection of malware and malicious applications

    公开(公告)号:US11700275B2

    公开(公告)日:2023-07-11

    申请号:US17360910

    申请日:2021-06-28

    Abstract: A method comprises receiving, at a network infrastructure device, a flow of packets, determining, using the network infrastructure device and for a first subset of the packets, that the first subset corresponds to a first datagram and determining a first length of the first datagram, determining, using the network infrastructure device and for a second subset of the packets, that the second subset corresponds to a second datagram that was received after the first datagram, and determining a second length of the second datagram, determining, using the network infrastructure device, a duration value between a first arrival time of the first datagram and a second arrival time of the second datagram, sending, to a collector device that is separate from the network infrastructure device, the first length, the second length, and the duration value for analysis.

    Lightweight distributed application security through programmable extraction of dynamic metadata

    公开(公告)号:US11412000B2

    公开(公告)日:2022-08-09

    申请号:US16741794

    申请日:2020-01-14

    Abstract: Presented herein are methodologies for implementing application security. A method includes generating an extraction vector based on a plurality of application security rules to be enforced, transmitting the extraction vector to a first agent operating on a first network device and to a second agent operating on a second network device; receiving, separately, from the first agent and from the second agent, first metadata generated by the first agent and second metadata generated by the second agent by the agents applying the extraction vector to network traffic passing, respectively, through the first network device and the second network device. The first metadata includes a transaction ID assigned by the first agent, and the second metadata includes the same transaction ID. The method further includes correlating the first metadata with the second metadata based on the transaction ID to construct a transactional service graph for the network traffic.

    COLLABORATIVE SECURITY FOR APPLICATION LAYER ENCRYPTION

    公开(公告)号:US20200322382A1

    公开(公告)日:2020-10-08

    申请号:US16788999

    申请日:2020-02-12

    Abstract: A non-transitory computer readable medium comprising instructions stored thereon, the instructions effective to cause at least one processor to: establish trustworthiness of an application installed on a endpoint, the established trustworthiness is sufficient for an enterprise security infrastructure to treat the application installed on the endpoint and the endpoint as a trusted application and a trusted endpoint; negotiate with the trusted endpoint to determine a traffic inspection method for traffic flows originating at the trusted application that is destined for a service, the traffic inspection method is determined based on at least the trusted application, and the service; and instruct the trusted application of the determined traffic inspection method.

    DIFFERENTIAL MALWARE DETECTION USING NETWORK AND ENDPOINT SENSORS

    公开(公告)号:US20180026993A1

    公开(公告)日:2018-01-25

    申请号:US15214905

    申请日:2016-07-20

    CPC classification number: H04L63/1425

    Abstract: A method is disclosed in which a system compares a first set of reports characterizing network traffic flows originating from an endpoint device with a second set of reports characterizing network traffic flows originating from the endpoint device and stored at an external network device to determine whether the first set and second set of reports characterizing network traffic flows originating from an endpoint device are different. In response to determining that the first and second reports characterizing network traffic flows are different, the system identifies the network traffic flows originating from the endpoint device and reported by an external network device, but not reported by the endpoint device, as possibly indicative of malware and forwards the network traffic flows originating from the endpoint device to an analyzer for further processing. Thus, an observed difference between network traffic flows originating from an endpoint device and stored at the endpoint device and network traffic flows originating from the endpoint device and stored on an external network device are compared to detect the presence of malware residing on the endpoint device.

Patent Agency Ranking