EP2476237A1 - Überwachung einer kommunikationssitzung mit verschiedenen strömen über ein datennetzwerk - Google Patents

Überwachung einer kommunikationssitzung mit verschiedenen strömen über ein datennetzwerk

Info

Publication number
EP2476237A1
EP2476237A1 EP10763796A EP10763796A EP2476237A1 EP 2476237 A1 EP2476237 A1 EP 2476237A1 EP 10763796 A EP10763796 A EP 10763796A EP 10763796 A EP10763796 A EP 10763796A EP 2476237 A1 EP2476237 A1 EP 2476237A1
Authority
EP
European Patent Office
Prior art keywords
stream
data
signature
parent
session
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP10763796A
Other languages
English (en)
French (fr)
Inventor
Jérôme TOLLET
Jérôme ABELA
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qosmos Tech SAS
Original Assignee
Qosmos SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qosmos SAS filed Critical Qosmos SAS
Publication of EP2476237A1 publication Critical patent/EP2476237A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1083In-session procedures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/80Responding to QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/18Multiprotocol handlers, e.g. single devices capable of handling multiple protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Definitions

  • the present invention relates to a method and a system for monitoring a communication session on a data network, said session comprising a first data stream, called a parent stream, using a first protocol, said parent stream comprising data enabling establishing a second stream of data, said child stream, using a second protocol for said session. It also relates to a computer program product for implementing the monitoring method.
  • a real-time protocol (RTP) session will be initiated by a Session Initiation Protocol (SIP) session. session initialization), and the parameters of the RTP session will depend on information exchanged by the SIP session.
  • SIP Session Initiation Protocol
  • Network monitoring devices such as, for example, firewalls, link the sessions of different protocols via state machines.
  • a method of monitoring a communication session on a data network comprising a first stream of data, said parent stream, using a first protocol, the parent stream comprising data enabling the establishment of a second data stream, said child stream, using a second protocol for this session, comprises:
  • this method advantageously makes it possible to easily group the related streams, and in particular without defining a state machine.
  • the session comprising a determined plurality of child flows, the data flows are audited until the set of child flows is determined.
  • the child stream including data for establishing a third data stream using a third protocol for the session, a signature is generated from these data, and data streams using the third protocol are audited to determining the data flow corresponding to the session.
  • the method monitoring a plurality of sessions each comprising a parent stream for which a parent key is generated and stored, for each of the streams using the second protocol, the The signature is compared to each of the parent keys to determine whether the stream is, or not, the child stream of one of the sessions. It should be noted in particular that this method advantageously applies to a multitude of parent flows, child flows and any type of tree defining an inheritance between one or more parent flows, one or child flows with any level of information. 'legacies.
  • a computer program product includes program code instructions recorded on a computer readable medium, for implementing the steps of the preceding method when said program is running on a computer.
  • a system for monitoring a communication session on a data network comprising a first data stream, called a parent stream, using a first protocol, the parent stream comprising data enabling establishing a second stream of data, said child stream, using a second protocol for the session, comprises:
  • a first stream analyzer for searching the parent stream for the data enabling the child stream to be established
  • a second stream analyzer for auditing data streams using the second protocol on the data network
  • a second signature generator for each of these streams
  • the system comprises at least two devices connected by a data network, a first device comprising at least the storage memory, the signature comparator and the tagger and the second device comprising at least the first analyzer the first signature generator and an interface for transmitting the generated signature to the first device. It may also include at least a third device connected to the first device by the data network and comprising at least the second flow analyzer and the second signature generator and an interface for transmitting the generated signature to the first device.
  • FIG. 1 is a schematic view of a data network
  • FIG. 2 is a flow chart of a method according to one embodiment of the invention.
  • FIG. 3 is a schematic view of a surveillance system according to one embodiment of the invention.
  • FIG. 4 is a schematic view of a monitoring system according to a second embodiment of the invention.
  • a digital data network 1 connects a multitude of devices 3 to each other.
  • a monitoring system 5 is connected to this network to capture the data flows exchanged between the equipment 3.
  • the system 5 thus monitors the communication sessions running on the network 1.
  • the term "session”, or application session, is the set of data exchanges generated by a given network application.
  • a first device when a first device wishes to transfer a file using a FTP protocol to a second device, the first device and the second device will start by establishing a first exchange using the TCP protocol on the port. 21 then they will agree to transfer the file itself using FTP-DATA which uses the TCP protocol on a variable number port greater than 1024. All of these exchanges constitute a session.
  • sub-session or simply data stream
  • the first sub-session will be called parent sub-session, or parent stream, in that it allows to exchange the data between the two equipments allowing the establishment of the second sub-session which will thus be called child sub-session, or child flow.
  • the system 5 implements the following method, FIG.
  • step 1 the system detects, step 1 1, establishment of an application session in the form of a parent stream.
  • the system 5 analyzes, step 1 3, then the parent stream looking for establishment data of a child stream. For example, in the context of an FTP session, the system 5 will analyze the transmitted packets to determine the number of the port on which the file transfer will take place.
  • step 1 5 a signature, called parent key, from these data.
  • a signature for example, for an FTP session, the system 5 generates a signature from the I P addresses of the source equipment and the receiving equipment and the port number. This signature is, for example, a hash value of this data.
  • This parent key is stored, step 1 7, by the system 5.
  • the system 5 then monitors, step 1 9, the flows that can correspond to the child stream because implementing, for example, a protocol compatible with it.
  • step 21 a signature.
  • the calculation of this signature is similar to the calculation of the parent key. For example, for the FTP session, it calculates the hash key of the I P addresses of the two devices and the port number.
  • This signature is compared, step 23, to the parent key.
  • step 25 the desired child stream.
  • the description above is limited to a parent stream and a child stream.
  • the method is generalized without difficulty to a plurality of parent flows and child flows.
  • a session consists of a parent stream and a plurality of child streams
  • the system calculates as many parent keys as necessary and monitors all flows until all child flows are found.
  • the comparison of the flow signatures is then made on all the parent keys until a parent key matches, thus defining the attachment session. If no key matches, it means that the stream does not belong to any monitored session.
  • the method also applies smoothly to sessions with multiple cascading inheritances, i.e., a child stream has establishment data of another stream and behaves like a parent stream for that stream. other flow that is then its child flow. Based on the settlement data carried by the child stream, the system sets a parent key on which the signatures of the prospective child flows are compared.
  • the set of parent keys may correspond to an ordered index vector, one of whose attributes is the session name.
  • the search and comparison with the parent key (s) and the allocation of the flow to a session then correspond to an operation on indexes, a computer operation that is extremely efficient in terms of resources used and speed. It also makes it possible to pool the monitoring operations of a multitude of sessions.
  • the monitoring system 5 thus comprises, FIG.
  • a first signature generator 33 called the parent key, from these data
  • a second stream analyzer 37 for auditing data streams using the second protocol on the data network;
  • a second signature generator 39 for each of these streams;
  • This monitoring system is feasible in the form of a dedicated electronic circuit or by specifically programming a computer with a computer program comprising program code instructions recorded on a computer-readable medium, to implement the steps of the program. monitoring process when the program is running on a computer.
  • This computer comprises in particular a network interface enabling it to listen to the transmissions carried out on the network, volatile random access memories connected to a computing unit to generate the keys and signatures, storage memories that can be, for example, a magnetic hard disk to store especially the rules of formation of signatures.
  • a particularly interesting embodiment of this system consists of breaking it up into several decentralized devices, FIG. 4.
  • a first series of devices 50 installed closest to the streams comprises the flow analyzers 31, 37 and the signature generators 33, 39. Each then comprises a communication interface 52 with a centralization device 54 comprising, in addition to a communication interface 56 in connection with the interfaces 52, the storage memory 35 of the signatures as well as the comparator 41 of the signature and the tagger 43.
  • the latter element can also be found in the first devices 50 in order to label the flows as close to their production.
  • the monitoring system may actually include only one flow analyzer and one signature generator capable of auditing feeds and generating signatures for parent feeds as well. only for child flows. Or, for reasons of speed, these can be as numerous as there are types of protocols.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
EP10763796A 2009-09-09 2010-09-01 Überwachung einer kommunikationssitzung mit verschiedenen strömen über ein datennetzwerk Withdrawn EP2476237A1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0956161A FR2949934B1 (fr) 2009-09-09 2009-09-09 Surveillance d'une session de communication comportant plusieurs flux sur un reseau de donnees
PCT/FR2010/051823 WO2011030045A1 (fr) 2009-09-09 2010-09-01 Surveillance d'une session de communication comportant plusieurs flux sur un reseau de donnees

Publications (1)

Publication Number Publication Date
EP2476237A1 true EP2476237A1 (de) 2012-07-18

Family

ID=42079062

Family Applications (1)

Application Number Title Priority Date Filing Date
EP10763796A Withdrawn EP2476237A1 (de) 2009-09-09 2010-09-01 Überwachung einer kommunikationssitzung mit verschiedenen strömen über ein datennetzwerk

Country Status (9)

Country Link
US (1) US20120166666A1 (de)
EP (1) EP2476237A1 (de)
JP (1) JP5696147B2 (de)
KR (1) KR101703805B1 (de)
CN (1) CN102714652B (de)
CA (1) CA2773247A1 (de)
FR (1) FR2949934B1 (de)
SG (1) SG179043A1 (de)
WO (1) WO2011030045A1 (de)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9246687B2 (en) * 2007-02-28 2016-01-26 Broadcom Corporation Method for authorizing and authenticating data
US10320749B2 (en) * 2016-11-07 2019-06-11 Nicira, Inc. Firewall rule creation in a virtualized computing environment
WO2018141392A1 (en) * 2017-02-02 2018-08-09 NEC Laboratories Europe GmbH Firewall support for multipath connections
US10834011B2 (en) * 2017-06-29 2020-11-10 Itron Global Sarl Packet servicing priority based on communication initialization
FR3089373B1 (fr) * 2018-12-03 2020-11-27 Thales Sa Procédé et dispositif de mesure d’un paramètre représentatif d’un temps de transmission dans un tunnel de communication chiffré
CN111198807B (zh) * 2019-12-18 2023-10-27 中移(杭州)信息技术有限公司 数据流分析方法、装置、计算机设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040054927A1 (en) * 2002-05-08 2004-03-18 Stonesoft Corporation Handling related connections in a firewall
US20040177106A1 (en) * 2003-03-06 2004-09-09 Rose Kenneth M. Apparatus and method for filtering IP packets
US20050238010A1 (en) * 2004-04-26 2005-10-27 Rina Panigrahy Programmable packet parsing processor
US7212522B1 (en) * 1998-09-30 2007-05-01 Cisco Technology, Inc. Communicating voice over a packet-switching network

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6680933B1 (en) * 1999-09-23 2004-01-20 Nortel Networks Limited Telecommunications switches and methods for their operation
US6816455B2 (en) * 2001-05-09 2004-11-09 Telecom Italia S.P.A. Dynamic packet filter utilizing session tracking
US8004971B1 (en) * 2001-05-24 2011-08-23 F5 Networks, Inc. Method and system for scaling network traffic managers using connection keys
ATE373323T1 (de) * 2002-03-14 2007-09-15 Questair Technologies Inc Wasserstoffrückführung für festoxid- brennstoffzellen
US6856991B1 (en) * 2002-03-19 2005-02-15 Cisco Technology, Inc. Method and apparatus for routing data to a load balanced server using MPLS packet labels
TWI222144B (en) * 2002-07-23 2004-10-11 Nanya Technology Corp Test device for detecting the overlay shift between active area and deep trench capacitor in DRAM and the detection method thereof
US7953841B2 (en) * 2002-08-22 2011-05-31 Jds Uniphase Corporation Monitoring an RTP data stream based on a phone call
US7020130B2 (en) * 2003-03-13 2006-03-28 Mci, Inc. Method and apparatus for providing integrated voice and data services over a common interface device
US20070050777A1 (en) * 2003-06-09 2007-03-01 Hutchinson Thomas W Duration of alerts and scanning of large data stores
US20050023801A1 (en) * 2003-07-31 2005-02-03 Adley Finley Fin-ray tote-a-load
GB0321426D0 (en) * 2003-09-12 2003-10-15 Ericsson Telefon Ab L M Data sharing in a multimedia communication system
US20050182836A1 (en) * 2004-02-17 2005-08-18 Johnson Teddy C. Method for transparently auditing employee and contractor FTP usage
US7535905B2 (en) * 2004-03-31 2009-05-19 Microsoft Corporation Signing and validating session initiation protocol routing headers
US7995611B2 (en) * 2004-06-29 2011-08-09 Apsect Software, Inc. Method and apparatus for dynamic VoIP phone protocol selection
US8194640B2 (en) * 2004-12-31 2012-06-05 Genband Us Llc Voice over IP (VoIP) network infrastructure components and method
US7624446B1 (en) * 2005-01-25 2009-11-24 Symantec Corporation Efficient signature packing for an intrusion detection system
US7580356B1 (en) * 2005-06-24 2009-08-25 Packeteer, Inc. Method and system for dynamically capturing flow traffic data
JP4073931B2 (ja) * 2005-08-08 2008-04-09 株式会社ソニー・コンピュータエンタテインメント 端末、通信装置、通信確立方法および認証方法
JP2007068093A (ja) * 2005-09-02 2007-03-15 Nippon Telegraph & Telephone East Corp Ip電話故障区間切り分けシステム及び方法
US8274979B2 (en) * 2005-12-30 2012-09-25 Telecom Italia S.P.A. Method and system for secure communication between a public network and a local network
JP5095631B2 (ja) * 2006-01-25 2012-12-12 フランス・テレコム マルチブロードキャストデータ伝送の信頼性を改善するシステム
US8010689B2 (en) * 2006-05-22 2011-08-30 Mcafee, Inc. Locational tagging in a capture system
DE602006014667D1 (de) * 2006-06-23 2010-07-15 Nippon Office Automation Co Lt Protokoll- und Sitzunganalysator
US7940657B2 (en) * 2006-12-01 2011-05-10 Sonus Networks, Inc. Identifying attackers on a network
EP2090061A2 (de) * 2006-12-01 2009-08-19 Sonus Networks, Inc. Filterung und überwachung zur abwehr von dienstverweigerungsangriffen in einem netzwerk
US9917844B2 (en) * 2006-12-17 2018-03-13 Fortinet, Inc. Detection of undesired computer files using digital certificates
US7706291B2 (en) * 2007-08-01 2010-04-27 Zeugma Systems Inc. Monitoring quality of experience on a per subscriber, per session basis
US8413111B2 (en) * 2008-10-02 2013-04-02 Actiance, Inc. Techniques for dynamic updating and loading of custom application detectors
US8578491B2 (en) * 2008-12-11 2013-11-05 Alcatel Lucent Network based malware detection and reporting
JP2012526500A (ja) * 2009-05-08 2012-10-25 セーブル ネットワークス,インク データ通信セッションを制御する方法および装置
US8068504B2 (en) * 2009-05-18 2011-11-29 Tresys Technology, Llc One-way router

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7212522B1 (en) * 1998-09-30 2007-05-01 Cisco Technology, Inc. Communicating voice over a packet-switching network
US20040054927A1 (en) * 2002-05-08 2004-03-18 Stonesoft Corporation Handling related connections in a firewall
US20040177106A1 (en) * 2003-03-06 2004-09-09 Rose Kenneth M. Apparatus and method for filtering IP packets
US20050238010A1 (en) * 2004-04-26 2005-10-27 Rina Panigrahy Programmable packet parsing processor

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO2011030045A1 *

Also Published As

Publication number Publication date
US20120166666A1 (en) 2012-06-28
KR20120082415A (ko) 2012-07-23
JP2013504915A (ja) 2013-02-07
SG179043A1 (en) 2012-04-27
FR2949934B1 (fr) 2011-10-28
CN102714652B (zh) 2016-01-20
JP5696147B2 (ja) 2015-04-08
CN102714652A (zh) 2012-10-03
WO2011030045A1 (fr) 2011-03-17
FR2949934A1 (fr) 2011-03-11
CA2773247A1 (fr) 2011-03-17
KR101703805B1 (ko) 2017-02-07

Similar Documents

Publication Publication Date Title
JP7157222B2 (ja) セッションセキュリティ分割およびアプリケーションプロファイラ
Park et al. Towards automated application signature generation for traffic identification
EP2476237A1 (de) Überwachung einer kommunikationssitzung mit verschiedenen strömen über ein datennetzwerk
EP2832069B1 (de) System zur überwachung der sicherheit einer architektur
EP2705644B1 (de) Verfahren und vorrichtung zur erkennung von eindringungen bei einer reihe virtueller ressourcen
Mazhar Rathore et al. Exploiting encrypted and tunneled multimedia calls in high-speed big data environment
EP3545641A1 (de) Suchbares verschlüsselungsverfahren
EP2767060B1 (de) Gateway sowie verfahren, computerprogramm und speichermittel dafür
FR2902954A1 (fr) Systeme et procede de stockage d'un inventaire des systemes et/ou services presents sur un reseau de communication
FR2964280A1 (fr) Procede de centralisation d’evenements pour systeme d’information hierarchique multi-niveaux
EP2849404A1 (de) Detektionsverfahren von ungewünschten Eingriffen in ein Informationsnetz, entsprechende Vorrichtung, entsprechendes Computerprogrammprodukt und entsprechendes Speichermittel
EP2979222A1 (de) Verfahren zum speichern von daten in einem computersystem zur durchführung einer daten-entduplizierung
WO2015145079A1 (fr) Procede de mise en cache d'un contenu dans un reseau de distribution de contenus
EP1034476B1 (de) Verfahren zur funktionsprüfung eines systems
FR3083659A1 (fr) Identification de protocole d'un flux de donnees
EP3123691A1 (de) Verfahren zur verarbeitung einer nachricht bei einer verbindungsvorrichtung
FR3076010A1 (fr) Procede de construction automatique de scenarios d'attaques informatiques, produit programme d'ordinateur et systeme de construction associes
WO2015197987A1 (fr) Procédé et dispositif d'obtention de paquets de données émis dans un réseau de communication comprenant une pluralité de sous réseaux
EP2464068B1 (de) System zur globalen Verwaltung der personalisierten Filterung, die auf einem gesicherten Informationsaustauschsystem basiert, und entsprechendes Verfahren
FR2844368A1 (fr) Dispositif et procede de supervision d'equipements de reseau incluant un transformateur d'evenements
FR2917556A1 (fr) Detection d'anomalie dans le trafic d'entites de service a travers un reseau de paquets
FR2987534A1 (fr) Methode d'inventaire de reseau.
FR3022721A1 (fr) Procede et dispositif de traitement de paquets de donnees emis dans un reseau de communication
FR2896897A1 (fr) Detection d'incidents de securite dans un reseau de telecommunications
EP2850779A1 (de) Überwachungssystem, verfahren und entsprechendes computerprogramm

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20120305

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: QOSMOS TECH

17Q First examination report despatched

Effective date: 20180123

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20190731