×

Monitoring traffic in a computer network

  • US 9,985,981 B2
  • Filed: 09/14/2017
  • Issued: 05/29/2018
  • Est. Priority Date: 12/31/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer program product comprising a non-transitory computer readable storage medium retaining program instructions, which program instructions when read by a processor, cause the processor to perform a method carried out in a computer network environment comprising a plurality of devices, each of which being configured for applying a transformation function on an identifier of a target port for network communication indicated in a transmission request of an application program executing thereon, whereby a scrambled version of the identifier is obtained, the plurality of devices being further configured for directing the transmission to be received via a different target port identified by the scrambled version of the identifier, the method comprising:

  • identifying an invalid port access attempt by a first transmission directed at a first port of a first computerized apparatus comprised in the plurality of devices, is wherein said identifying the invalid port access is based an ability of the transformation function to yield a first port identifier identifying the first port;

    wherein the transformation function depends on at least one secret parameter shared among the plurality of devices, wherein a device of the plurality of devices is configured to apply the transformation function only for transmission issued by application programs that are listed in a list of authorized application programs; and

    in response to said identifying, providing for an action to be performed whereby a security threat ascribed to the invalid port access attempt is mitigated.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×