×

Detecting secure or encrypted tunneling in a computer network

  • US 8,544,100 B2
  • Filed: 07/02/2010
  • Issued: 09/24/2013
  • Est. Priority Date: 04/16/2010
  • Status: Active Grant
First Claim
Patent Images

1. A computer assisted method for detecting encrypted tunneling comprising:

  • electronically receiving information from a proxy server;

    extracting information regarding a CONNECT function of Hyper Text Transport Protocol (HTTP) from the electronically received information;

    determining at least one destination to which the extracted information regarding the CONNECT function of HTTP corresponds;

    attempting to negotiate a standard Hyper Text Transport Protocol Secure (HTTPS) session with each of the at least one destination; and

    for each of the at least one destination,determining if a Secure Socket Layer (SSL) certificate associated with the destination has been issued by a trusted certificate authority;

    determining whether the destination is hosting an encrypted tunneling application, wherein the determining is based on characteristics of the SSL certificate;

    in response to a determination that it is unable to be determined whether the destination is hosting an encrypted tunneling application based on characteristics of the SSL certificate, determining whether the destination is hosting an encrypted tunneling application based on characteristics of a response received from the destination over a transmission control protocol/Internet protocol (TCP/IP) connection; and

    generating a security alert in response to a determination that the destination is hosting an encrypted tunneling application.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×