×

Encrypted peer-to-peer detection

  • US 9,596,155 B2
  • Filed: 10/13/2014
  • Issued: 03/14/2017
  • Est. Priority Date: 05/24/2011
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising a processor, the system further comprising:

  • an application signature check engine executed on the processor for monitoring a network traffic from a first client to determine whether the first client is executing a peer-to-peer application; and

    a peer-to-peer traffic generator executed on the processor for generating a network traffic that emulates peer-to-peer network traffic sent from the peer-to-peer application executing on the first client to a second client after detecting an unknown network traffic sent from the first client to the second client,wherein the peer-to-peer traffic generator for the generating of the network traffic that emulates peer-to-peer network traffic further comprises;

    sending, to the second client, the emulated peer-to-peer network traffic identifying non-existent peers or spoofed peers, wherein the emulated peer-to-peer network traffic identifying the non-existent peers or the spoofed peers indicates that the emulated peer-to-peer network traffic originated from a peer that does not exist; and

    in the event that one of the non-existent peers or the spoofed peers is being contacted, emulating a peer-to-peer traffic response including dummy data.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×