SYSTEM AND METHOD OF DETECTING WHETHER A SOURCE OF A PACKET FLOW TRANSMITS PACKETS WHICH BYPASS AN OPERATING SYSTEM STACK
    35.
    发明申请
    SYSTEM AND METHOD OF DETECTING WHETHER A SOURCE OF A PACKET FLOW TRANSMITS PACKETS WHICH BYPASS AN OPERATING SYSTEM STACK 审中-公开
    检测分组流量传输的源的系统和方法除了操作系统堆栈之外的包

    公开(公告)号:US20160359890A1

    公开(公告)日:2016-12-08

    申请号:US15171879

    申请日:2016-06-02

    Abstract: A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed on a second host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that the second packet flow was transmitted by a component that bypassed an operating stack of the first host or a packet capture agent at the device to yield a determination, detecting that hidden network traffic exists, and predicting a malware issue with the first host based on the determination.

    Abstract translation: 一种方法包括使用部署在第一主机处的第一捕获代理捕获与来自第一主机的第一分组流相关联的第一数据,以产生第一流数据,从第二主捕获与第一主机起源的第二分组流相关联的第二数据 部署在第二主机上的捕获代理产生第二流数据并比较第一流数据和第二流数据以产生差异。 当所述差异高于阈值时,所述方法包括确定所述第二分组流由绕过所述设备的所述第一主机或分组捕获代理的操作堆栈的组件发送以产生确定,检测所述隐藏网络流量 存在并且基于该确定来预测与第一主机的恶意软件问题。

    SYNTHETIC DATA FOR DETERMINING HEALTH OF A NETWORK SECURITY SYSTEM
    36.
    发明申请
    SYNTHETIC DATA FOR DETERMINING HEALTH OF A NETWORK SECURITY SYSTEM 审中-公开
    用于确定网络安全系统健康的合成数据

    公开(公告)号:US20160359878A1

    公开(公告)日:2016-12-08

    申请号:US15157300

    申请日:2016-05-17

    Abstract: An example method can include choosing a pattern or patterns of network traffic. This pattern can be representative of a certain type of traffic such as an attack. The pattern can be associated with various components of a network and can describe expected behavior of these various components. A system performing this method can then choose a nodes or nodes to generate traffic according to the pattern and send an instruction accordingly. After this synthetic traffic is generated, the system can compare the behavior of the components with the expected behavior. An alert can then be created to notify an administrator or otherwise remedy any problems.

    Abstract translation: 示例性方法可以包括选择网络流量的模式或模式。 这种模式可以代表某种类型的流量,如攻击。 该模式可以与网络的各种组件相关联,并且可以描述这些各种组件的预期行为。 执行该方法的系统然后可以根据模式选择节点或节点来生成流量,并相应地发送指令。 生成此合成流量后,系统可以将组件的行为与预期行为进行比较。 然后可以创建警报以通知管理员或以其他方式补救任何问题。

Patent Agency Ranking