×

Application detection architecture and techniques

  • US 8,484,338 B2
  • Filed: 09/28/2009
  • Issued: 07/09/2013
  • Est. Priority Date: 10/02/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method for detecting network-based applications based on network traffic generated by the network-based applications, the method comprising:

  • receiving network traffic at a computer system;

    generating first results information in response to analyzing, in a first phase associated with the network traffic, the network traffic with an ordered sequence of a plurality of single inspection point engines using a processor associated with the computer system based on whether a single inspection point of the network traffic satisfies at least one of the plurality of single inspection point engines;

    generating second results information in response to analyzing, in a second phase associated with the network traffic, the network traffic and results information associated with the one or more single inspection point engines with one or more multiple inspection point engines using the processor associated with the computer system to determine whether a plurality of inspection points of the network traffic satisfy at least one of the multiple inspection point engines;

    generating third results information in response to analyzing, in a third phase associated with the network traffic, the network traffic, results information associated with the one or more single inspection point engines, and results information associated with the one or more multiple inspection point engines with one or more custom inspection point engines using the processor associated with the computer system to determine whether the network traffic satisfies at least one of the custom inspection point engines based on a determination using the second results information;

    identifying, with the processor associated with the computer system, a network-based application that generated the network traffic based on results information obtained from at least one of the second phase or the third phase;

    determining, with the processor associated with the computer system, a policy that is applicable to the network-based application; and

    performing an action defined by the policy in regard to the network-based application.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×