System and method for IP target traffic analysis
First Claim
Patent Images
1. A method, comprising:
- acquiring, from a network, data traffic that is associated with a network connection;
analyzing the data traffic so as to identify individual users by detecting one or more User Identifiers (UIs) that the individual uses for login to one or more servers over the network, thereby forming a UI cluster;
associating the one or more UIs with the individual according to one or more association criteria;
creating a list of one or more individuals who are served by the network connection by processing the acquired data traffic; and
outputting the created list of the individuals.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for identifying network users who communicate with the network (e.g., the Internet) via a given network connection. The disclosed techniques analyze traffic that flows in the network to determine, for example, whether the given network connection serves a single individual or multiple individuals, a single computer or multiple computers. A Profiling System (PS) acquires copies of data traffic that flow through network connections that connect computers to the WAN. The PS analyzes the acquired data, attempting to identify individuals who login to servers.
-
Citations
20 Claims
-
1. A method, comprising:
-
acquiring, from a network, data traffic that is associated with a network connection; analyzing the data traffic so as to identify individual users by detecting one or more User Identifiers (UIs) that the individual uses for login to one or more servers over the network, thereby forming a UI cluster; associating the one or more UIs with the individual according to one or more association criteria; creating a list of one or more individuals who are served by the network connection by processing the acquired data traffic; and outputting the created list of the individuals. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. Apparatus, comprising:
-
an interface, which is configured to acquire, from a network, data traffic that is associated with a network connection; and a processor, which is configured to analyze data traffic so as to identify individual users by detecting one or more User Identifiers (UIs) that the individual uses for login to one or more servers over the network, thereby forming a UI cluster, and to associate the one or more UIs with the individual according to one or more association criteria; and
to create a list of one or more individuals who are served by the network connection by processing the acquired data traffic. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification