×

Methods and systems for protecting a secured network

DC CAFC
  • US 9,565,213 B2
  • Filed: 04/16/2014
  • Issued: 02/07/2017
  • Est. Priority Date: 10/22/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by each of a plurality of packet security gateways associated with a security policy management server and from the security policy management server, a dynamic security policy that comprises at least one rule specifying application-layer packet-header information and a packet transformation function comprising a packet digest logging function to be performed on packets comprising the application-layer packet-header information;

    receiving, by a packet security gateway of the plurality of packet security gateways, packets associated with a network protected by the packet security gateway;

    identifying, by the packet security gateway, from amongst the packets associated with the network protected by the packet security gateway, and on a packet-by-packet basis, one or more packets comprising the application-layer packet-header information;

    performing, by the packet security gateway and on a packet-by-packet basis, the packet transformation function on each of the one or more packets comprising the application-layer packet-header information, wherein the performing the packet transformation function comprisesidentifying a subset of information specified by the packet digest logging function for each of the one or more packets comprising the application-layer packet-header information;

    generating, for each of the one or more packets comprising the application-layer packet-header information, a record comprising the subset of information specified by the packet digest logging function; and

    reformatting, for each of the one or more packets comprising the application-layer packet-header information, the subset of information specified by the packet digest logging function in accordance with a logging system standard; and

    routing, by the packet security gateway and on a packet-by-packet basis, to a monitoring device each of the one or more packets corresponding to the application-layer packet-header information in response to the performing the packet transformation function.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×