×

Encrypted peer-to-peer detection

  • US 8,892,665 B1
  • Filed: 05/24/2011
  • Issued: 11/18/2014
  • Est. Priority Date: 05/24/2011
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising:

  • a processor configured to;

    monitor a network traffic from a first client to determine whether the first client is executing a peer-to-peer application; and

    generate a network traffic that emulates peer-to-peer network traffic sent from the peer-to-peer application executing on the first client to a second client after detecting an unknown network traffic sent from the first client to the second client,wherein the generating of the network traffic that emulates peer-to-peer network traffic comprises;

    send, to the second client, the emulated peer-to-peer network traffic identifying non-existent peers or send, to the second client, the emulated peer-to-peer network traffic indicating that no peers have a desired file requested via the peer-to-peer application, wherein the emulated peer-to-peer network traffic identifying the non-existent peers indicates that the emulated peer-to-peer network traffic originated from a peer that does not exist; and

    in the event that one of the non-existent peers is being contacted, emulate a peer-to-peer traffic response including dummy data; and

    a memory coupled to the processor and configured to provide the processor with instructions.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×