System and method for modifying network traffic
First Claim
1. A method for modifying network traffic, the method comprising:
- receiving a packet at an intermediate network node at a network layer, the packet associated with a communication flow between a sending device and a receiving device;
determining, by the intermediate network node, whether the intermediate network node is capable of performing layer injection, wherein determining, by the intermediate network node, whether the intermediate network node is capable of performing layer injection includes checking each individual layer of the communication protocol layers and sublayers of the layers of the communication protocol layers to identify individual layers and sublayers that are protected from being modified by the intermediate network node;
responsive to a determination each individual layer of the communication protocol layers and sublayers of the layers of the communication protocol layers are not protected and that the intermediate network node is capable of performing layer injection;
identifying at least one of an application or protocol associated with the packet using deep packet inspection;
determining a routing modification based on the identified application or protocol; and
modifying the packet with the determined routing modification.
2 Assignments
0 Petitions
Accused Products
Abstract
The disclosed embodiments include a system and method for modifying network traffic. For example, in one embodiment, the method includes receiving a packet at an intermediate network node at a network layer. The method determines at the intermediate network node whether layer injection can be performed at the intermediate network node. If layer injection can be performed at the intermediate network node, the method identifies at least one application or protocol associated with the packet using deep packet inspection. The method determines a routing modification based on the identified application protocol. The method then performs the routing modification on the packet.
-
Citations
19 Claims
-
1. A method for modifying network traffic, the method comprising:
-
receiving a packet at an intermediate network node at a network layer, the packet associated with a communication flow between a sending device and a receiving device; determining, by the intermediate network node, whether the intermediate network node is capable of performing layer injection, wherein determining, by the intermediate network node, whether the intermediate network node is capable of performing layer injection includes checking each individual layer of the communication protocol layers and sublayers of the layers of the communication protocol layers to identify individual layers and sublayers that are protected from being modified by the intermediate network node; responsive to a determination each individual layer of the communication protocol layers and sublayers of the layers of the communication protocol layers are not protected and that the intermediate network node is capable of performing layer injection; identifying at least one of an application or protocol associated with the packet using deep packet inspection; determining a routing modification based on the identified application or protocol; and modifying the packet with the determined routing modification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An apparatus for modifying network traffic, the apparatus located in a network along a communication path between a sending device and the receiving device, the apparatus comprising:
-
a network interface component for receiving a packet transmitted between a sending device and a receiving device; a memory component for storing executable instructions, and at least one processor, the at least one processor configured to execute the executable instructions to perform the steps of; determining whether the apparatus is capable of performing layer injection, wherein determining whether the apparatus is capable of performing layer injection includes checking each individual layer of the communication protocol layers and sublayers of the layers of the communication protocol layers to identify individual layers and sublayers that are protected from being modified by the apparatus; responsive to a determination each individual layer of the communication protocol layers and sublayers of the layers of the communication protocol layers are not protected and that the apparatus is capable of performing layer injection; identifying at least one of an application or protocol associated with the packet using deep packet inspection; determining a routing modification based on the identified application protocol; and modifying the packet with the determined routing modification. - View Dependent Claims (19)
-
Specification