×

Use of application signature to identify trusted traffic

  • US 7,703,138 B2
  • Filed: 12/29/2004
  • Issued: 04/20/2010
  • Est. Priority Date: 12/29/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method for monitoring communication packets, comprising:

  • storing site-specific application signatures, wherein each of the site-specific application signatures includes a source address, a destination address, a protocol identifier, and a port identifier, wherein each of the site-specific application signatures is associated with an application executing at a specific source computing device;

    storing rules that determine whether the communication packet has vulnerabilities or anomalies;

    receiving a communication packet;

    determining a communication packet signature of the communication packet, wherein the communication packet signature includes a source address, a destination address, a protocol identifier, and a port identifier;

    comparing the communication packet signature to the site-specific application signatures by comparing the source address, the destination address, the protocol identifier, and the port identifier of the communication packet with the site-specific application signatures;

    in response to determining that the communication packet signature matches at least one of the site-specific application signatures, determining that the communication packet is to be trusted and allowing the communication packet to be routed without comparing the communication packet to the rules that determine whether the communication packet has vulnerabilities or anomalies, wherein the communication packet signature matches at least one of the site-specific signatures when the source address, the destination address, the protocol identifier, and the port identifier of the communication packet matches the source address, the destination address, the protocol identifier, and the port identifier of the at least one site-specific application signatures; and

    in response to determining that the communication packet signature does not match at least one of the site-specific application signatures, comparing the communication packet to the rules that determine whether the communication packet has vulnerabilities or anomalies by;

    determining whether the communication packet matches the rules;

    in response to determining that the communication packet matches one or more rules, issuing an alert; and

    in response to determining that that communication packet does not match the rules, allowing the communication packet to be routed without issuing the alert.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×