×

Detection and prevention of encapsulated network attacks using an intermediate device

  • US 7,797,411 B1
  • Filed: 02/02/2005
  • Issued: 09/14/2010
  • Est. Priority Date: 02/02/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, with an intermediate device, packets;

    determining, with the intermediate device, whether one or more of the received packets are associated with a network tunnel that extends from an ingress device to an egress device by detecting the protocol to which the packet adheres, wherein those of the received packets determined to be associated with the network tunnel encapsulate data units for transmission along the network tunnel, wherein the intermediate device is positioned between the ingress device and the egress device along the network tunnel, and wherein the intermediate device is separate from both the ingress device and the egress device;

    applying a set of heuristics to the data units to determine whether the data units are encrypted;

    when the data units are determined not to be encrypted, extracting, with the intermediate device, the encapsulated data units from the one or more received packets determined to be associated with the network tunnel;

    when the data units are determined not the be encrypted, generating, with the intermediate device, temporary packets from the data units, wherein the temporary packets are different from the originally received packets;

    analyzing, with the intermediate device, the temporary packets to detect a network attack,wherein analyzing the temporary packet to detect a network attack comprises processing the data units within the temporary packets with the intermediate network device to identify network elements associated with the data units, forming application-layer communications from the data units within the temporary packets, processing the application-layer communications with protocol-specific decoders to identify application-layer elements, and applying an attack definition to the network elements and the application-layer elements to detect the network attack;

    selectively transmitting, with the intermediate device, the originally received packets to the egress device based on the analysis of the temporary packets such that the originally received packets that share the same data units as the temporary packets from which the network attack is detected are not transmitted and the originally received packets that share the same data units as the temporary packets from which the network attack is not detected are transmitted;

    analyzing, with the intermediate device, those of the received packets determined not to be associated with the network tunnel to detect a network attack without generating the temporary packets from the received packets; and

    selectively transmitting, with the intermediate device, those of the received packets determined not to be associated with the network tunnel based on the analysis of these packets.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×