System, method, and computer program product for preventing communication of unwanted network traffic by holding only a last portion of the network traffic
First Claim
Patent Images
1. A method, comprising:
- receiving, through an input port, network traffic associated with a file being transferred from a source device to a destination device;
determining, by a processor, identifying information regarding the file;
employing the identifying information to consult a file reputation database over a network;
receiving, through an input port, a message from the file reputation database over the network;
holding in a memory only a last packet of the network traffic associated with the file being transferred to determine whether the file is unwanted; and
conditionally forwarding, through an output port, the last packet of the network traffic associated with the file transfer to the destination device, based on the message received from the file reputation database.
8 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for preventing communication of unwanted network traffic by holding only a last portion of the network traffic. In use, network traffic associated with a file transfer is received. Additionally, only a last portion of the network traffic associated with the file transfer is held for determining whether the file is unwanted. Further, the last portion of the network traffic associated with the file transfer is conditionally forwarded to a destination device, based on the determination.
-
Citations
12 Claims
-
1. A method, comprising:
-
receiving, through an input port, network traffic associated with a file being transferred from a source device to a destination device; determining, by a processor, identifying information regarding the file; employing the identifying information to consult a file reputation database over a network;
receiving, through an input port, a message from the file reputation database over the network;holding in a memory only a last packet of the network traffic associated with the file being transferred to determine whether the file is unwanted; and conditionally forwarding, through an output port, the last packet of the network traffic associated with the file transfer to the destination device, based on the message received from the file reputation database.
-
-
2. A computer program product embodied on a non-transitory computer readable medium, comprising:
-
computer code for receiving network traffic associated with a file being transferred from a source device to a destination device; computer code for determining identifying information regarding the file; computer code for employing the identifying information to consult a file reputation database over a network; computer code for receiving a message from the file reputation database over the network; computer code for holding only a last packet of the network traffic associated with the file transfer to determine whether the file is unwanted; and computer code for conditionally forwarding, through an output port, the last packet of the network traffic associated with the file transfer to the destination device, based on the message received from the file reputation database. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
-
a network input to receive network traffic associated with a file transfer from a source device; a cache memory to hold only a last packet of network traffic associated with a received file to determine whether the file is unwanted; a processor configured to; determine identifying information regarding files received through the network input, employ the identifying information to query a file reputation database, receive a query response, and determine disposition of the last packet of network traffic based upon the query response; and a network output port to send the last packet to a destination device.
-
Specification