Packet processing in a multiple processor system
First Claim
Patent Images
1. A method comprising:
- receiving, by a first processor and from a second processor, a packet;
processing, by the first processor, the packet using first information,the first information being based on a result of the second processor processing the packet;
determining, by the first processor and based on processing the packet, whether the packet is to be processed by a third processor,the third processor being different than the first processor and the second processor;
when the packet is to be processed by the third processor;
generating, by the first processor, second information that is based on a result of the first processor processing the packet,the second information including;
session information identifying a session,
the packet belonging to the session, andan instruction for the third processor to determine whether the packet is associated with an attack; and
transmitting, by the first processor, the packet for processing of the packet by the third processor,the second information being used by the third processor to process the packet; and
when the packet is not to be processed by the third processor, performing at least one of a plurality of actions,the plurality of actions including;
dropping, by the first processor, the packet, orgenerating, by the first processor, an alarm relating to the packet.
0 Assignments
0 Petitions
Accused Products
Abstract
Packet processing is provided in a multiple processor system including a first processor to processing a packet and to create a tag associated with the packet. The tag includes information about the processing of the packet. A second processor receives the packet subsequent to the first processor and processes the packet using the tag information.
-
Citations
22 Claims
-
1. A method comprising:
-
receiving, by a first processor and from a second processor, a packet; processing, by the first processor, the packet using first information, the first information being based on a result of the second processor processing the packet; determining, by the first processor and based on processing the packet, whether the packet is to be processed by a third processor, the third processor being different than the first processor and the second processor; when the packet is to be processed by the third processor; generating, by the first processor, second information that is based on a result of the first processor processing the packet, the second information including; session information identifying a session,
the packet belonging to the session, andan instruction for the third processor to determine whether the packet is associated with an attack; and transmitting, by the first processor, the packet for processing of the packet by the third processor, the second information being used by the third processor to process the packet; and when the packet is not to be processed by the third processor, performing at least one of a plurality of actions, the plurality of actions including; dropping, by the first processor, the packet, or generating, by the first processor, an alarm relating to the packet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable medium storing instructions, the instructions comprising:
-
one or more instructions which, when executed by a first processor, cause the first processor to receive a packet from a second processor; one or more instructions which, when executed by the first processor, cause the first processor to process the packet using first information, the first information being based on a result of the second processor processing the packet; one or more instructions which, when executed by the first processor, cause the first processor to determine, based on processing the packet, whether the packet is to be further processed; one or more instructions which, when executed by the first processor, cause the first processor to generate, when the packet is to be further processed, second information that is based on a result of the first processor processing the packet, the second information including; session information identifying a session to which the packet belongs, and an instruction for a third processor to determine whether the packet is associated with an attack, the third processor being different than the first processor and the second processor; one or more instructions which, when executed by the first processor, cause the first processor to transmit the packet for further processing of the packet by the third processor, when the packet is to be further processed, the second information being used by the third processor to process the packet; and one or more instructions which, when executed by the first processor, cause the first processor to, when the packet is not to be further processed, one of; drop the packet, hold the packet, generate a log relating to the packet, or generate an alarm relating to the packet. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
a first processor to; receive a packet from a second processor, process the packet using first information, the first information being based on a result of the second processor processing the packet; determine, based on processing the packet, whether the packet is to be further processed; when the packet is to be further processed; generate second information that is based on a result of the first processor processing the packet, the second information including;
session information identifying a session to which the packet belongs, and
an instruction for a third processor to determine whether the packet is associated with an attack, andcause the packet to be transmitted for further processing of the packet by the third processor, the third processor being different than the first processor and the second processor, and the second information being used by the third processor to process the packet; and when the packet is not to be further processed, at least one of; drop the packet, hold the packet, generate a log relating to the packet, or generate an alarm relating to the packet. - View Dependent Claims (18, 19, 20, 21, 22)
Specification