×

Computerized system and method for advanced network content processing

  • US 10,009,386 B2
  • Filed: 06/30/2017
  • Issued: 06/26/2018
  • Est. Priority Date: 01/13/2006
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • receiving, by a network security device protecting a private network, network traffic carrying content associated with a plurality of application layer protocols, including one or more of an instant messaging (IM) protocol, a peer-to-peer (P2P) protocol, an electronic mail (email) protocol, a web browsing protocol and a file sharing protocol;

    identifying, by the network security device, a first application layer protocol of the plurality of application layer protocols associated with a first subset of packets of the network traffic;

    performing, by the network security device, real-time application-level content processing of a first set of original application layer content carried by the first subset of packets by;

    based on the identified first application layer protocol, redirecting the first subset of packets to a first proxy module executing on the network security device;

    extracting, reconstructing and buffering, by the first proxy module, the first set of original application layer content from the first subset of packets; and

    based on a first set of network traffic selectors associated with the first subset of packets, causing, by the first proxy module, a first subset of a plurality of scanning engines to process the first set of original application layer content in accordance with a first set of a plurality of content processing rules selected from a rule definition store;

    identifying, by the network security device, a second application layer protocol of the plurality of application layer protocols, distinct from the first application layer protocol, associated with a second subset of packets of the network traffic; and

    performing, by the network security device, real-time application-level content processing of a second set of original application layer content carried by the second subset of packets by;

    based on the identified second application layer protocol, redirecting the first subset of packets to a second proxy module executing on the network security device;

    extracting, reconstructing and buffering, by the second proxy module, the second set of original application layer content from the second subset of packets; and

    based on a second set of network traffic selectors associated with the second subset of packets, causing, by the second proxy module, a second subset of a plurality of scanning engines to process the second set of original application layer content in accordance with a second set of a plurality of content processing rules selected from the rule definition store.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×