Encrypted peer-to-peer detection
First Claim
1. A system, comprising:
- a processor configured to;
monitor a network traffic from a first client to determine whether the first client is executing a peer-to-peer application; and
generate a network traffic that emulates peer-to-peer network traffic sent from the peer-to-peer application executing on the first client to a second client after detecting an unknown network traffic sent from the first client to the second client,wherein the generating of the network traffic that emulates peer-to-peer network traffic comprises;
send, to the second client, the emulated peer-to-peer network traffic identifying non-existent peers or send, to the second client, the emulated peer-to-peer network traffic indicating that no peers have a desired file requested via the peer-to-peer application, wherein the emulated peer-to-peer network traffic identifying the non-existent peers indicates that the emulated peer-to-peer network traffic originated from a peer that does not exist; and
in the event that one of the non-existent peers is being contacted, emulate a peer-to-peer traffic response including dummy data; and
a memory coupled to the processor and configured to provide the processor with instructions.
1 Assignment
0 Petitions
Accused Products
Abstract
Encrypted peer-to-peer detection is provided. In some embodiments, encrypted peer-to-peer detection includes monitoring network traffic from a first client to determine whether the first client is executing a peer-to-peer application; and generating network traffic that emulates peer-to-peer network traffic sent from the peer-to-peer application executing on the first client to a second client after detecting unknown network traffic sent from the first client to the second client. In some embodiments, encrypted peer-to-peer detection includes monitoring network traffic from a client to determine that the client is sending a request for information for a peer-to-peer application executing on the client; and generating a network traffic response to the client that emulates peer-to-peer network traffic.
-
Citations
26 Claims
-
1. A system, comprising:
-
a processor configured to; monitor a network traffic from a first client to determine whether the first client is executing a peer-to-peer application; and generate a network traffic that emulates peer-to-peer network traffic sent from the peer-to-peer application executing on the first client to a second client after detecting an unknown network traffic sent from the first client to the second client, wherein the generating of the network traffic that emulates peer-to-peer network traffic comprises; send, to the second client, the emulated peer-to-peer network traffic identifying non-existent peers or send, to the second client, the emulated peer-to-peer network traffic indicating that no peers have a desired file requested via the peer-to-peer application, wherein the emulated peer-to-peer network traffic identifying the non-existent peers indicates that the emulated peer-to-peer network traffic originated from a peer that does not exist; and in the event that one of the non-existent peers is being contacted, emulate a peer-to-peer traffic response including dummy data; and a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method, comprising:
-
monitoring a network traffic sent from a first client to determine whether the first client is executing a peer-to-peer application; and generating a network traffic that emulates peer-to-peer network traffic sent from the peer-to-peer application executing on the first client to a second client after detecting an unknown network traffic sent from the first client to the second client, wherein the generating of the network traffic that emulates peer-to-peer network traffic comprises; sending, to the second client, the emulated peer-to-peer network traffic identifying non-existent peers or sending, to the second client, the emulated peer-to-peer network traffic indicating that no peers have a desired file requested via the peer-to-peer application, wherein the emulated peer-to-peer network traffic identifying the non-existent peers indicates that the emulated peer-to-peer network traffic originated from a peer that does not exist; and in the event that one of the non-existent peers is being contacted, emulating a peer-to-peer traffic response including dummy data.
-
-
25. A computer program being embodied in a tangible non-transitory computer readable storage medium and comprising computer instructions for:
-
monitoring a network traffic sent from a first client to determine whether the first client is executing a peer-to-peer application; and generating a network traffic that emulates peer-to-peer network traffic sent from the peer-to-peer application executing on the first client to a second client after detecting an unknown network traffic sent from the first client to the second client, wherein the generating of the network traffic that emulates peer-to-peer network traffic comprises; sending, to the second client, the emulated peer-to-peer network traffic identifying non-existent peers or sending, to the second client, the emulated peer-to-peer network traffic indicating that no peers have a desired file requested via the peer-to-peer application, wherein the emulated peer-to-peer network traffic identifying the non-existent peers indicates that the emulated peer-to-peer network traffic originated from a peer that does not exist; and in the event that one of the non-existent peers is being contacted, emulating a peer-to-peer traffic response including dummy data.
-
-
26. A system, comprising:
-
a processor configured to; monitor a network traffic from a client to determine that the client is sending a request for information for a peer-to-peer application executing on the client; and generate a network traffic response to the client that emulates peer-to-peer network traffic, wherein the generating of the network traffic that emulates peer-to-peer network traffic comprises; send, to the second client, the emulated peer-to-peer network traffic identifying non-existent peers or send, to the second client, the emulated peer-to-peer network traffic indicating that no peers have a desired file requested via the peer-to-peer application, wherein the emulated peer-to-peer network traffic identifying the non-existent peers indicates that the emulated peer-to-peer network traffic originated from a peer that does not exist; and in the event that one of the non-existent peers is being contacted, emulate a peer-to-peer traffic response including dummy data; and a memory coupled to the processor and configured to provide the processor with instructions.
-
Specification