×

System and method of detecting whether a source of a packet flow transmits packets which bypass an operating system stack

  • US 10,454,793 B2
  • Filed: 06/02/2016
  • Issued: 10/22/2019
  • Est. Priority Date: 06/05/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data;

    capturing second data associated with a second packet flow originating from the first host using a second capture agent deployed at a second host to yield second flow data, wherein the first capturing agent is deployed in a first layer of a network and the second capturing agent is deployed in a second layer of the network;

    comparing the first flow data and the second flow data to yield a difference; and

    when the difference is above a threshold value, determining that the second packet flow was transmitted by a component that bypassed an operating stack of the first host or a packet capture agent on the first host, to yield a determination that hidden network traffic exists, and performing a correcting action comprising one or more of;

    isolating a virtual machine, isolating a container, limiting packets to and from the first host, requiring all packets to and from the first host to flow through the operating stack of the first host, isolating the first host, shutting down the first host, or notifying an administrator.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×