Network analysis system and method utilizing collected metadata
First Claim
Patent Images
1. A method for analyzing network traffic associated with network services, comprising:
- collecting network traffic from a network;
collecting metadata associated with the network traffic from the network;
analyzing the network traffic utilizing the metadata, the analyzing including generating a plurality of parsers based on the metadata, utilizing a processor; and
identifying an application service provider from the network traffic;
wherein the metadata is correlated with the network traffic, and the correlated metadata is stored in a memory;
wherein the correlating of the metadata with the network traffic is carried out by generating commands based on the network traffic and a software configuration;
wherein the commands include universal description, discovery, and integration (UDDI) service calls that invoke at least one web service associated with the application service provider identified from the network traffic;
wherein the parsers are programs that receive input in a form of at least one of sequential source program instructions, interactive online commands, markup tags, and a defined interface;
wherein the parsers break the input into parts including objects, methods, and associated attributes or options;
wherein a selection of the UDDI service calls is based on UDDI service calls listed by a UDDI as being associated with the application service provider identified from the network traffic;
wherein the metadata is utilized to indicate which messages of the network traffic should be authenticated, indicate which messages of the network traffic should not be authenticated, and indicate how to authenticate the messages.
11 Assignments
0 Petitions
Accused Products
Abstract
A system, method and computer program product are provided for analyzing network traffic associated with network services. Initially, network traffic and metadata are collected from a network. Thereafter, the network traffic is analyzed utilizing the metadata.
-
Citations
36 Claims
-
1. A method for analyzing network traffic associated with network services, comprising:
-
collecting network traffic from a network;
collecting metadata associated with the network traffic from the network;analyzing the network traffic utilizing the metadata, the analyzing including generating a plurality of parsers based on the metadata, utilizing a processor; and
identifying an application service provider from the network traffic;wherein the metadata is correlated with the network traffic, and the correlated metadata is stored in a memory; wherein the correlating of the metadata with the network traffic is carried out by generating commands based on the network traffic and a software configuration; wherein the commands include universal description, discovery, and integration (UDDI) service calls that invoke at least one web service associated with the application service provider identified from the network traffic; wherein the parsers are programs that receive input in a form of at least one of sequential source program instructions, interactive online commands, markup tags, and a defined interface; wherein the parsers break the input into parts including objects, methods, and associated attributes or options; wherein a selection of the UDDI service calls is based on UDDI service calls listed by a UDDI as being associated with the application service provider identified from the network traffic; wherein the metadata is utilized to indicate which messages of the network traffic should be authenticated, indicate which messages of the network traffic should not be authenticated, and indicate how to authenticate the messages. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
18. A computer program product embodied on a non-transitory computer-readable medium, comprising:
-
computer code for collecting network traffic from a network; computer code for collecting metadata associated with the network traffic from the network; computer code for analyzing the network traffic utilizing the metadata, the analyzing including generating a plurality of parsers based on the metadata; and computer code for identifying an application service provider from the network traffic; wherein the computer program product is operable such that the metadata is correlated with the network traffic, and the correlated metadata is stored in a memory; wherein the correlating of the metadata with the network traffic is carried out by generating commands based on the network traffic and a software configuration; wherein the commands include universal description, discovery, and integration (UDDI) service calls that invoke at least one web service associated with the application service provider identified from the network traffic; wherein the parsers are programs that receive input in a form of at least one of sequential source program instructions, interactive online commands, markup tags, and a defined interface; wherein the parsers break the input into parts including objects, methods, and associated attributes or options; wherein the computer program product is operable such that a selection of the UDDI service calls is based on UDDI service calls listed by a UDDI as being associated with the application service provider identified from the network traffic; wherein the computer program product is operable such that the metadata is utilized to indicate which messages of the network traffic should be authenticated, indicate which messages of the network traffic should not be authenticated, and indicate how to authenticate the messages.
-
-
19. A system implemented in hardware, comprising:
-
a network traffic collector for collecting network traffic from a network; a metadata aggregator for collecting metadata associated with the network traffic from the network; a network analyzer coupled to the network traffic collector and the metadata aggregator, the network analyzer adapted for analyzing the network traffic utilizing the metadata; and logic for identifying an application service provider from the network traffic; wherein the system is operable such that the metadata is correlated with the network traffic, and the correlated metadata is stored in a memory; wherein the system is operable such that the analysis of the network traffic includes generating a plurality of parsers based on the metadata; wherein the correlating of the metadata with the network traffic is carried out by generating commands based on the network traffic and a software configuration; wherein the commands include universal description, discovery, and integration (UDDI) service calls that invoke at least one web service associated with the application service provider identified from the network traffic; wherein the parsers are programs that receive input in a form of at least one of sequential source program instructions, interactive online commands, markup tags, and a defined interface; wherein the parsers break the input into parts including objects, methods, and associated attributes or options; wherein the system is operable such that a selection of the UDDI service calls is based on UDDI service calls listed by a UDDI as being associated with the application service provider identified from the network traffic; wherein the system is operable such that the metadata is utilized to indicate which messages of the network traffic should be authenticated, indicate which messages of the network traffic should not be authenticated, and indicate how to authenticate the messages.
-
-
20. A system implemented in hardware, comprising:
-
means for collecting network traffic from a network; means for collecting metadata associated with the network traffic from the network; means for analyzing the network traffic utilizing the metadata, the analyzing including generating a plurality of parsers based on the metadata; and means for identifying an application service provider from the network traffic; wherein the system is operable such that the metadata is correlated with the network traffic, and the correlated metadata is stored in a memory; wherein the correlating of the metadata with the network traffic is carried out by generating commands based on the network traffic and a software configuration; wherein the commands include universal description, discovery, and integration (UDDI) service calls that invoke at least one web service associated with the application service provider identified from the network traffic; wherein the parsers are programs that receive input in a form of at least one of sequential source program instructions, interactive online commands, markup tags, and a defined interface; wherein the parsers break the input into parts including objects, methods, and associated attributes or options; wherein the system is operable such that a selection of the UDDI service calls is based on UDDI service calls listed by a UDDI as being associated with the application service provider identified from the network traffic; wherein the system is operable such that the metadata is utilized to indicate which messages of the network traffic should be authenticated, indicate which messages of the network traffic should not be authenticated, and indicate how to authenticate the messages.
-
-
21. A method for analyzing network traffic, comprising:
-
collecting network traffic and metadata from a network for analyzing the network traffic and the metadata for the purpose of analyzing a web service associated therewith, and dentifying an application service provider from the network traffic; wherein the metadata is correlated with the network traffic, and the correlated metadata is stored in a memory; wherein the analysis of the network traffic includes generating a plurality of parsers based on the metadata; wherein the correlating of the metadata with the network traffic is carried out by generating commands based on the network traffic and a software configuration; wherein the commands include universal description, discovery, and integration (UDDI) service calls that invoke at least one web service associated with the application service provider identified from the network traffic; wherein the parsers are programs that receive input in a form of at least one of sequential source program instructions, interactive online commands, markup tags, and a defined interface; wherein the parsers break the input into parts including objects, methods, and associated attributes or options; wherein a selection of the UDDI service calls is based on UDDI service calls listed by a UDDI as being associated with the application service provider identified from the network traffic; wherein the metadata is utilized to indicate which messages of the network traffic should be authenticated, indicate which messages of the network traffic should not be authenticated, and indicate how to authenticate the messages.
-
-
22. A method for analyzing network traffic associated with web services, comprising:
-
collecting network traffic from a plurality of application service providers over a network utilizing a processor, the network traffic being associated with web services provided by the application service providers; collecting metadata associated with the network traffic from the network;
analyzing the network traffic utilizing the metadata for investigating a quality of the web services, the analyzing including generating a plurality of parsers based on the metadata, utilizing a processor; andidentifying an application service provider from the network traffic; wherein the metadata is correlated with the network traffic, and the correlated metadata is stored in a memory; wherein the correlating of the metadata with the network traffic is carried out by generating commands based on the network traffic and a software configuration; wherein the commands include universal description, discovery, and integration (UDDI) service calls that invoke at least one web service associated with the application service provider identified from the network traffic; wherein the parsers are programs that receive input in a form of at least one of sequential source program instructions, interactive online commands, markup tags, and a defined interface; wherein the parsers break the input into parts including objects, methods, and associated attributes or options; wherein a selection of the UDDI service calls is based on UDDI service calls listed by a UDDI as being associated with the application service provider identified from the network traffic; wherein the metadata is utilized to indicate which messages of the network traffic should be authenticated, indicate which messages of the network traffic should not be authenticated, and indicate how to authenticate the messages.
-
-
23. A method for analyzing network traffic associated with web services, comprising:
-
collecting network traffic from a network associated with web services, utilizing a processor; correlating the network traffic and metadata associated with the network traffic by; initiating commands, and collecting the metadata associated with the network traffic in response to the commands;
storing the network traffic and the metadata;analyzing the network traffic utilizing the metadata, the analyzing including generating a plurality of parsers based on the metadata, utilizing a processor; and identifying an application service provider from the network traffic; wherein the correlating of the metadata with the network traffic is carried out by generating the commands based on the network traffic and a software configuration; wherein the commands include universal description, discovery, and integration (UDDI) service calls that invoke at least one web service associated with the application service provider identified from the network traffic; wherein the parsers are programs that receive input in a form of at least one of sequential source program instructions, interactive online commands, markup tags, and a defined interface; wherein the parsers break the input into parts including objects, methods, and associated attributes or options; wherein a selection of the UDDI service calls is based on UDDI service calls listed by a UDDI as being associated with the application service provider identified from the network traffic; wherein the metadata is utilized to indicate which messages of the network traffic should be authenticated, indicate which messages of the network traffic should not be authenticated, and indicate how to authenticate the messages.
-
Specification