METHOD OF NON-INTRUSIVE ANALYSIS OF SECURE AND NON-SECURE WEB APPLICATION TRAFFIC IN REAL-TIME
First Claim
1. A method for non-intrusive real-time analysis of secure communications between a first application and a second application, wherein the first and second applications communicate through a communication channel, comprising the steps of:
- non-intrusively and securely capturing a plurality of secure communications between the first application and the second application substantially in real-time;
processing the plurality of communications to form a first plurality of information units, each information unit comprising application level information substantially in real-time;
analyzing a second plurality of information units up to an application layer, the second plurality comprising one or more of the first plurality of information units, to determine a plurality of dependencies among the second plurality of information units substantially in real-time;
organizing the second plurality of information units into a hierarchical data structure according to the plurality of dependencies among the information units.
8 Assignments
0 Petitions
Accused Products
Abstract
Provided is a method and system for monitoring and analysis of networked systems, that is non-intrusive and real time. Both secure and non-secure traffic may be analyzed. The provided method involves non-intrusively copying data from a communication medium, reconstructing this data to a higher level of communication, such as the application level, grouping the data into sets, each set representing a session, and organizing the data for chosen sessions in hierarchical fashion which corresponds to the hierarchy of the communicated information. If monitored communications are encrypted, they are non-intrusively decrypted in real time. Hierarchically reconstructed session data is used by one or more plug-in applications, such as alarms, archival applications, visualization applications, script generation applications, abandonment monitoring applications, error detection applications, performance monitoring applications, and others.
-
Citations
1 Claim
-
1. A method for non-intrusive real-time analysis of secure communications between a first application and a second application, wherein the first and second applications communicate through a communication channel, comprising the steps of:
-
non-intrusively and securely capturing a plurality of secure communications between the first application and the second application substantially in real-time; processing the plurality of communications to form a first plurality of information units, each information unit comprising application level information substantially in real-time; analyzing a second plurality of information units up to an application layer, the second plurality comprising one or more of the first plurality of information units, to determine a plurality of dependencies among the second plurality of information units substantially in real-time; organizing the second plurality of information units into a hierarchical data structure according to the plurality of dependencies among the information units.
-
Specification