Parallel network-based vulnerability scanning

    公开(公告)号:US11956270B2

    公开(公告)日:2024-04-09

    申请号:US17670242

    申请日:2022-02-11

    摘要: A computing device may receive a plurality of scanning requests with at least one scanning request in the plurality identifying a target address of a target network. The computing device may for at least a subset of the plurality of scanning requests: generate a scanner instance and a virtual network interface card (VNIC) in response to the scanning request. The scanner instance and the VNIC communicating with a routing namespace that can communicate with two or more scanner instances simultaneously. Until the target address has been scanned: one or more packets can be sent from the scanner instance to the target address via the routing namespace and VNIC. The one or more packets can be wrapped in one or more packet wrappers identifying the target address and the target network. In response to the target address being scanned, the scanner instance and VNIC can be decommissioned.

    Enhanced privacy-preserving access to a VPN service

    公开(公告)号:US11611536B2

    公开(公告)日:2023-03-21

    申请号:US16898374

    申请日:2020-06-10

    申请人: 360 IT, UAB

    摘要: Systems and methods for effectively managing security and privacy measures during a user's connectivity session with a VPN service are provided. The systems and methods use a computer program that introduces a double-NAT feature at the network layer and a temporary hash table containing the minimally necessary temporary data to link two NAT sessions together in a secure manner. The systems and methods avoid including the dynamic management of IP addresses or requiring each client to have an IP address assigned beforehand to avoid compromising the user's identity by hard linking the session traces with the client.

    Layer-2 Grouping of Electronic Devices Across Heterogeneous Networks

    公开(公告)号:US20220201469A1

    公开(公告)日:2022-06-23

    申请号:US17690112

    申请日:2022-03-09

    摘要: A computer that segments traffic associated with different entities across heterogeneous networks is described. During operation, the computer may provide, addressed to a second computer, information that specifies a mapping of an identifier of an electronic device in a wireless network and a second identifier of a virtual container for traffic associated with the electronic device in the wireless network to a third identifier of the electronic device in a cellular-telephone network, where the electronic device and the virtual container are associated with an entity. Then, the computer may communicate the traffic between the wireless network and the cellular-telephone network within the virtual container based at least in part on the mapping, where the virtual container isolates the traffic from other traffic in the wireless network. Note that the identifier may include a MAC address and the third identifier may include an IMSI.

    PARALLEL NETWORK-BASED VULNERABILITY SCANNING

    公开(公告)号:US20230262085A1

    公开(公告)日:2023-08-17

    申请号:US17670242

    申请日:2022-02-11

    摘要: A computing device may receive a plurality of scanning requests with at least one scanning request in the plurality identifying a target address of a target network. The computing device may for at least a subset of the plurality of scanning requests: generate a scanner instance and a virtual network interface card (VNIC) in response to the scanning request. The scanner instance and the VNIC communicating with a routing namespace that can communicate with two or more scanner instances simultaneously. Until the target address has been scanned: one or more packets can be sent from the scanner instance to the target address via the routing namespace and VNIC. The one or more packets can be wrapped in one or more packet wrappers identifying the target address and the target network. In response to the target address being scanned, the scanner instance and VNIC can be decommissioned.