×

Obfuscating network traffic from previously collected network traffic

  • US 8,996,728 B2
  • Filed: 10/01/2010
  • Issued: 03/31/2015
  • Est. Priority Date: 10/01/2010
  • Status: Active Grant
First Claim
Patent Images

1. A system for generating obfuscated network traffic, the system comprising:

  • a network monitor for separating a first network traffic flow into application content and network header content based on a first network model by separately extracting the application content and network header content in accordance with the first network model;

    a computer-readable storage device comprising;

    an application content database operative to store application content extracted from the first network traffic flow by the network monitor;

    a network header content database operative to store network header content extracted from the first network traffic flow by the network monitor; and

    an obfuscated network traffic database operative to store obfuscated network header content;

    a masking attribute selector operative to receive an input specifying one or more network header attributes to be masked;

    a data masking processor operative to;

    retrieve the network header content stored in the network header content database; and

    mask at least a selected portion of the network header content to generate the obfuscated network header content, wherein the data masking processor is further operative to mask the selected portion of the network header based on the input received by the masking attribute selector; and

    an obfuscated network traffic request interface operative to;

    receive a request for obfuscated network traffic; and

    transmit the obfuscated network header content stored in the obfuscated network traffic database based upon the request for obfuscated network traffic;

    where said mask is at least one of;

    a bitwise operation, analyzing the IP addresses in the network header content and changing or replacing the IP addresses with a set of IP addresses, replacing one or more network priority bits of the network header content with a different but consistent set of network priority bits, replacing one or more portions of the network header content requested from the network header content database, replacing content with content stored in another database, and replacing content with randomly generated content or pseudo-randomly generated content.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×