WO2013058944A1 - System and method for redirected firewall discovery in a network environment - Google Patents
System and method for redirected firewall discovery in a network environment Download PDFInfo
- Publication number
- WO2013058944A1 WO2013058944A1 PCT/US2012/057312 US2012057312W WO2013058944A1 WO 2013058944 A1 WO2013058944 A1 WO 2013058944A1 US 2012057312 W US2012057312 W US 2012057312W WO 2013058944 A1 WO2013058944 A1 WO 2013058944A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- firewall
- metadata
- network
- network flow
- host
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/10—Active monitoring, e.g. heartbeat, ping or trace-route
Definitions
- This specification relates in general to the field of network security, and more particularly, to a system and method for redirected firewall discovery in a network environment.
- the field of network security has become increasingly important in today's society.
- the Internet has enabled interconnection of different computer networks all over the world.
- malicious operators can be configured to receive commands from a remote operator once the software has infected a host computer.
- the software can be instructed to perform any number of malicious actions, such as sending out spam or malicious emails from the host computer, stealing sensitive information from a business or individual associated with the host computer, propagating to other host computers, and/or assisting with distributed denial of service attacks.
- the malicious operator can sell or otherwise give access to other malicious operators, thereby escalating the exploitation of the host computers.
- FIGURE 1 is a simplified block diagram illustrating an example embodiment of a network environment in which a firewall may be discovered through host redirection according to this specification;
- FIGURE 2 is simplified block diagram illustrating additional details that may be associated with one potential embodiment of the network environment
- FIGURE 3 is a simplified interaction diagram illustrating potential operations that may be associated with example embodiments of the network environment
- FIGURE 4 is a simplified interaction diagram illustrating potential operations that may be associated with example embodiments of the network environment with a stale firewall cache that identifies an invalid firewall for a managed route;
- FIGURE 5 is a simplified interaction diagram illustrating potential operations that may be associated with other example embodiments of the network environment with a stale firewall cache that identifies an invalid firewall for a managed route;
- FIGURE 6 is an example packet data unit format that may be associated with exchanging metadata in example embodiments of the network environment.
- a method in one example embodiment that includes receiving metadata from a host over a metadata channel.
- the metadata may be correlated with a network flow and a network policy may be applied to the flow.
- a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
- FIGURE 1 is a simplified block diagram of an example embodiment of a network environment 10 in which a firewall may be discovered through host redirection.
- network environment 10 can include Internet 15, user hosts 20a and 20b, a firewall 25, a policy server 30, a mail server 35, and a web server 40.
- user hosts 20a-20b may be any type of termination node in a network connection, including but not limited to a desktop computer, a server, a laptop, a mobile telephone, or any other type of device that can receive or establish a connection with another node, such as mail server 35 or web server 40.
- Firewall 25 may control communications between user hosts 20a-20b and other nodes attached to Internet 15 or another network, such as by blocking unauthorized access while permitting authorized communications.
- firewall 25 may be coupled to or integrated with an intrusion prevention system, network access control device, web gateway, email gateway, or any other type of gateway between Internet 15 and user hosts 20a-20b.
- Policy server 30 may be coupled to or integrated with firewall 25, and may be used to manage user hosts 20a-20b and to administer and distribute network policies.
- user hosts 20a-20b may communicate with servers attached to Internet 15, such as mail server 35 or web server 40, by establishing a connection through firewall 25 if permitted by policies implemented in firewall 25 and managed by policy server 30.
- Network environment 10 may include a configuration capable of transmission control protocol/Internet protocol (TCP/IP) communications for the transmission or reception of packets in a network.
- TCP/IP transmission control protocol/Internet protocol
- Network environment 10 may also operate in conjunction with a user datagram protocol/IP (UDP/IP) or any other suitable protocol where appropriate and based on particular needs.
- UDP/IP user datagram protocol/IP
- Typical network environments used in organizations and by individuals include the ability to communicate electronically with other networks using the internet, for example, to access web pages hosted on servers connected to the Internet, to send or receive electronic mail (i.e., email) messages, or to exchange files.
- malicious users continue to develop new tactics for using the Internet to spread malware and to gain access to confidential information.
- Malware generally includes any software designed to access and/or control a computer without the informed consent of the computer owner, and is most commonly used as a label for any hostile, intrusive, or annoying software such as a computer virus, bot, spyware, adware, etc. Once compromised, malware may subvert a host and use it for malicious activity, such as spamming or information theft.
- Malware also typically includes one or more propagation vectors that enable it to spread within an organization's network or across other networks to other organizations or individuals.
- Common propagation vectors include exploiting known vulnerabilities on hosts within the local network and sending emails having a malicious program attached or providing malicious links within the emails.
- malware One way in which malware may operate is to deceive a user by using a different network protocol exchange than the user expects.
- the malware may be packaged so as to convince the user to allow access to run it in some innocuous way, thus al lowing it access to the network, which often may require passing through a firewall or other security measure.
- the malware may then exploit the access to engage in alternative or additional activities not contemplated by the user. For example, a game may send email messages or a word processor may open a web connection.
- the malware may also use standard protocols to deceive the firewall into permitting the malware to establish remote connections.
- Botnets for example, use malware and are an increasing threat to computer security. In many cases they employ sophisticated attack schemes that include a combination of well-known and new vulnerabilities. Botnets generally use a client-server architecture where a type of malicious software (i.e., a bot) is placed on a host computer and communicates with a command and control (C&C) server, which may be controlled by a malicious user (e.g., a botnet operator).
- C&C command and control
- a botnet is composed of a large number of bots that are controlled by the operator using a C&C protocol through various channels, including Internet Relay Chat (IRC) and peer-to-peer (P2P) communication.
- IRC Internet Relay Chat
- P2P peer-to-peer
- the bot may receive commands from the C&C server to perform particular malicious activities and, accordingly, may execute such commands.
- the bot may also send any results or pilfered information back to the C&C server.
- a bot is often designed to initiate communication with the C&C server and to masquerade as normal web browser traffic.
- a bot may use a port typically used to communicate with a web server.
- Such bots therefore, may not be detected by existing technologies without performing more detailed packet inspection of the web traffic.
- the botnet operator may simply find another way to masquerade network traffic by the bot to continue to present as normal web traffic.
- botnet operators have crafted bots to use encryption protocols such as, for example, secure socket layer (SSL), thereby encrypting malicious network traffic.
- SSL secure socket layer
- Such encrypted traffic may use a Hypertext Transfer Protocol Secure (HTTPS) port so that only the endpoints involved in the encrypted session can decrypt the data.
- HTTPS Hypertext Transfer Protocol Secure
- Information may be shared between a host and a firewall to collectively and mutually achieve better security, though.
- a host may understand an application as an executable fife that is running a process with specific authentication, while the firewall may understand the application as a protocol in a TCP connection, which may also be correlated to a particular user authentication.
- the host may share session descriptors and other metadata with the firewall, and the firewall may share network policy with the host as needed to correlate application activities with expected network behavior.
- Network policy may include elements of security policy as well as other network specific parameters, such as quality of service (QoS) and routing.
- QoS quality of service
- a host may also be associated with a universally unique identifier (UUID), which can be used to correlate connections and activities originating behind network address translators.
- UUID universally unique identifier
- a host may also notify the firewall of additional network connections to the host. If a host has both wireless and wired connections active simultaneously, for example, there may be a risk of data received on one connection being transmitted on the other, so it may be desirable to restrict access to sensitive data.
- a host may also notify the firewall if the connection is associated with a virtual machine, or if the host has mountable read/write media, such as a USB stick attached.
- a host may include multiple attachment points, causing it to have multiple IP addresses.
- a host may use the IP version 6 (IPv6), perhaps including Privacy Extensions (RFC4941), causing it to have one or more registered and known IPv6 addresses and one or more hidden or private IPv6 addresses.
- IPv6 IP version 6
- ROC4941 Privacy Extensions
- an interlocked firewall may readily use dynamic information sharing to discover the user-to-host mapping for all the addresses on a host.
- This dynamic information sharing between an interlocked host and firewall in network environment 10 may provide several benefits over conventional architectures. For example, by coordinating firewall policy with a host, a firewall can manage routes differently, such as by allowing or denying traffic depending on which of multiple users on a host may be attempting to establish a connection. Moreover, only applications that may need to be granufarly controlled need to be controlled by the firewall. Thus, the firewall may control arbitrary or evasive applications, provide higher effective throughput, and control mobile-user traffic. In addition, traffic that does not need to be completely allowed or denied can be rate-limited. Arbitrary or evasive applications can also be rate-limited with process information available on a firewall, and differentiated services can be provided for managed and unmanaged hosts.
- Many hosts may only use a single firewall for all routes.
- An agent running on a host may maintain a firewall cache that can identify this firewall.
- a host may use more than one firewall, in which case it is important that the host understand which firewall will process a given flow.
- the firewall cache can provide routes through more than one firewall by mapping a given network route to a particular firewall .
- Routes are generally managed or unmanaged.
- a "managed route” generally refers to a route through a firewall that may be configured to accept metadata for network flows, while an "unmanaged route” is a route through a firewall that may not accept metadata.
- a firewall cache may associate a network (e.g., identified by a network destination and network mask) with a firewall designated for managing flows to the network, for example, or may associate an unmanaged route to a null value.
- the firewall cache may be initialized or configured by an administrator, providing separate configurations for each named network and/or default configurations for the first time a network is used. Some configurations may define one firewall for Internet addresses, initially based on an assumption that all global IP addresses are on the Internet.
- Session descriptors generally include information about a host and an application associated with a given network session.
- a session descriptor may include a UUID associated with the host and the user credentials of a process owner. Since a user can run separate processes with different user credentials, such information may be particularly advantageous for Citrix and terminal services.
- a session descriptor may additionally include a filename, pathname or other unique identifier of an application file (e.g., C: ⁇ ... ⁇ WINWORD.EXE) that is running the process attempting to establish a network connection.
- the application may be identified by a hash function of the application's executable file, so as to make it more difficult for a malicious user to spoof the application name.
- a firewall may correlate this information with an application identifier or protocol to ensure that the application is performing as expected.
- a session descriptor may also contain information about the host environment, such as software installed on the host and the current configuration and state of the software, permitting the firewall to act as a network access control device. For example, a session descriptor may indicate whether the local anti-virus system is up to date and running. If Host-based Data Loss Prevention (HDLP) software is available, a session descriptor may also include file-typing information for file transfer. HDLP normally determines the type of file being transmitted out of the network (e.g., PDF, Word, etc.). The firewall may have additional policies about certain file types being transmitted over particular protocols, which may not be visible directly to an HDLP program.
- HDLP Data Loss Prevention
- Session descriptors and other metadata may be exchanged over an out-of- band communication channel (a "metadata channel") in some embodiments of network environment 10, which may be implemented with a protocol that provides authentication and/or encryption for communication privacy.
- a Datagram Transport Layer Security (DTLS) protocol may be used to provide a metadata channel with communication privacy, and a host and a firewall may use certificates based on a common certificate authority.
- a policy server may distribute certificates to a host and firewall in some embodiments, while an external certificate authority may be used in other embodiments.
- Some protocols, including DTLS may also be used to establish a back channel from a firewall to a host, which may be used for error messages and diagnostics, for example.
- a host can send metadata to a firewall before opening a new network flow such that, in general, metadata arrives at the firewall before the first packet of a new flow.
- a firewall agent on the host may intercept the first packet of a new flow and send a session descriptor and other metadata associated with the flow, such as source IP address and port, destination IP address and port, and protocol.
- the firewall may maintain a metadata cache and correlate a network flow with metadata if the firewall agent releases the flow.
- the firewall may correlate metadata with network flow data, which broadly refers to information that associates a given network flow with a source node (i.e., a node sending or attempting to send a packet) and a destination node (i.e., a node to which a packet is addressed) or destination nodes (e.g., broadcast or multicast address).
- Flow data may also include other information about the flow, such as a protocol family or protocol, for example.
- TCP generally opens a new flow (generally referred to as a "connection" in the context of a TCP flow) with a handshake - a host sends a first packet with one of the TCP flag bits (i.e., the SYN bit) set to indicate that a three-way handshake is in progress.
- an agent on a source node may intercept a new TCP connection by detecting an application on the source node sending a SYN packet (i.e., a packet with the SYN bit set) and holding the SYN packet.
- the agent may be able to identify a firewall for managing the route to a destination node associated with the new connection, such as by locating the route and its associated firewall in a firewall cache, and send metadata to the firewall (which the firewall can cache) over a secure metadata channel.
- the connection request may then be released by sending the SYN packet to the firewall, and the firewall may correlate the source IP, destination IP, protocol, etc.
- Flows are not limited to communications using a reliable protocol such as TCP; a flow may also include communications using an unreliable protocol such as UDP or IP.
- an agent may track flows that use an unreliable protocol and intercept a new flow by holding the first packet of a flow while it transmits metadata. The agent may also be able to retransmit the metadata by caching a hash of the first packet of a flow and comparing the hash to the hash of subsequent packets to determine if the first packet is being retransmitted by an application.
- a firewall may track flows and cache the first packet until metadata arrives.
- metadata may be sent with every packet in a flow using an unreliable protocol, or never sent. Caches of first packet data can be very short-lived (e.g. less than one second to five seconds).
- a host may not always be able to identify or locate such a firewall. For example, a host may move from one network to another (e.g., a laptop moving from a home network to a corporate network), may have a misconfigured routing table, a stale table entry, or a missing table entry, which may cause the host to send metadata to the incorrect firewall (or send no metadata at all). If a host cannot determine the location of a firewall, an additional mechanism is needed.
- network environment 10 may provide a system and method for redirection-based discovery of an interlocked firewall.
- a firewall can maintain a list of managed hosts, which may be identified within a given subnet range or identified explicitly by IP address or hostname, for example.
- a policy server may provide the list to a firewall.
- the firewall may cache or drop the initial connection packet (e.g., a SYN packet) and send a firewall-host discovery redirect to any managed host that attempts to open a connection without sending appropriate metadata.
- network environment 10 can decrease redirect traffic volume by not sending discovery redirects for local link or local broadcasts (e.g., netbios probes on port 137).
- Managed hosts and firewalls may also maintain a shared secret (e.g., a password, key, etc.) for authentication of redirect packets.
- the shared secret may be distributed by a policy server or manually configured, for example, and a firewall may share the same secret with more than one host, including all hosts within a site.
- the shared secret may be a function of time.
- managed hosts and firewalls may use asymmetric key cryptography (i.e., public key cryptography) to secure redirect packets.
- a discovery redirect may be implemented in an Internet Control Message Protocol (ICMP) packet, such as an ICMP Destination Unreachable (DU) packet for administratively prohibited communications (i.e., ICMP type 3, code 13).
- An ICMP DU packet may include the IP header and TCP (or UDP) headers of the original packet, and may further include a magic number and a hash-based message authentication code (HMAC).
- the magic number may be a 32-bit identifier (e.g., 0x46484131 or "FHA1”), which may also act as a protocol version number.
- an HMAC is a message authentication code (MAC) involving a cryptographic hash function in combination with a shared secret (e.g., a secret key).
- a MAC (and an HMAC) may be used to simultaneously verify both the data integrity and the authenticity of a message.
- An HMAC may include, for example, the host-firewall shared secret, source IP address, destination IP address, IP identification, firewall IP address, and TCP initial sequence number.
- a firewall may have a public/private key pair that it can use to establish a metadata channel (e.g., a DTLS connection).
- the firewall's private key may be used to encrypt a hash of the discovery redirect packet (using RSA for example).
- the encrypted hash can be inserted into the discovery redirect, and a host can validate the discovery redirect by decrypting the hash using the firewall's public key.
- an ICMP DU packet may be used as described above, but replacing the HMAC with the encrypted hash.
- a host may ignore most of these types of ICMP DU packets, the host can take appropriate action when it receives a discovery redirect packet with an HMAC or encrypted hash. For example, a host may calculate an HMAC using its shared key and authenticate the message by comparing the calculated HMAC to the HMAC received in the discovery redirect packet. If the message is authentic, a host may update its firewall cache to reflect the firewall information in the discovery redirect packet and send metadata to the firewall for the given connection.
- FIGURE 2 is a simplified block diagram illustrating additional details that may be associated with potential embodiments of network environment 10.
- FIGURE 2 includes Internet 15, user host 20a, firewall 25, and a server 45.
- Each of user host 20a and firewall 25 may include a respective processor 50a-50b, a respective memory element 55a-55b, and various hardware and/or software modules.
- user host 20a may include an application 60, a configuration database 65, a client certificate 70, and a firewall agent 75, which may maintain a firewall cache 77.
- Firewall 25 may include a host manager 80 and a policy module 85, as well as a log 90, a metadata cache 95, and a server certificate 97.
- user hosts 20a-20b, firewall 25, and/or policy server 30 are network elements, which are meant to encompass network appliances, servers, routers, switches, gateways, bridges, loadbafancers, processors, modules, or any other suitable device, component, element, or object operable to exchange information in a network environment.
- Network elements may include any suitable hardware, software, components, modules, or objects that facilitate the operations thereof, as well as suitable interfaces for receiving, transmitting, and/or otherwise communicating data or information in a network environment. This may be inclusive of appropriate algorithms and communication protocols that allow for the effective exchange of data or information.
- user hosts 20a-20b may be distinguished from other network elements, as they tend to serve as a terminal point for a network connection, in contrast to a gateway or router that tends to serve as an intermediate point in a network connection.
- User hosts 20a-20b may also be representative of wireless network nodes, such as an i-Phone, i-Pad, Android phone, or other similar telecommunications devices.
- each of user hosts 20a-20b, firewall 25, and/or policy server 30 can include memory elements for storing information to be used in the operations outlined herein.
- Each of user hosts 20a-20b, firewall 25, and/or policy server 30 may keep information in any suitable memory element (e.g., random access memory (RAM), read-only memory (ROM), erasable programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), application specific integrated circuit (ASIC), etc.), software, hardware, or in any other suitable component, device, element, or object where appropriate and based on particular needs.
- RAM random access memory
- ROM read-only memory
- EPROM erasable programmable ROM
- EEPROM electrically erasable programmable ROM
- ASIC application specific integrated circuit
- any of the memory items discussed herein should be construed as being encompassed within the broad term 'memory element.
- the information being used, tracked, sent, or received by user hosts 20a-20b, firewall 25, and/or policy server 30 could be provided in any database, register, queue, table, cache, control list, or other storage structure, all of which can be referenced at any suitable timeframe. Any such storage options may be included within the broad term 'memory element' as used herein.
- the functions outlined herein may be implemented by logic encoded in one or more tangible media (e.g., embedded logic provided in an ASIC, digital signal processor (DSP) instructions, software (potentially inclusive of object code and source code) to be executed by a processor, or other similar machine, etc.), which may be inclusive of non-transitory media.
- memory elements as shown in FIGURE 2, can store data used for the operations described herein. This includes the memory elements being able to store software, logic, code, or processor instructions that are executed to carry out the activities described herein.
- user hosts 20a-20b, firewall 25, and/or policy server 30 may include software modules (e.g., firewall agent 75 and/or host manager 80) to achieve, or to foster, operations as outlined herein.
- software modules e.g., firewall agent 75 and/or host manager 80
- such operations may be carried out by hardware, implemented externally to these elements, or included in some other network device to achieve the intended functionality.
- these elements may include software (or reciprocating software) that can coordinate in order to achieve the operations, as outlined herein.
- one or all of these devices may include any suitable algorithms, hardware, software, components, modules, interfaces, or objects that facilitate the operations thereof.
- each of user hosts 20a-20b, firewall 25, and/or policy server 30 may include a processor that can execute software or an algorithm to perform activities as discussed herein.
- a processor can execute any type of instructions associated with the data to achieve the operations detailed herein.
- the processors (as shown in FIGURE 2) could transform an element or an article (e.g., data) from one state or thing to another state or thing.
- the activities outlined herein may be implemented with fixed logic or programmable logic (e.g., software/computer instructions executed by a processor) and the elements identified herein could be some type of a programmable processor, programmable digital logic (e.g., a field programmable gate array (FPGA), an EPROM, an EEPROM) or an ASIC that includes digital logic, software, code, electronic instructions, or any suitable combination thereof.
- programmable logic e.g., a field programmable gate array (FPGA), an EPROM, an EEPROM
- FIGURE 3 is a simplified interaction diagram illustrating potential operations that may be associated with example embodiments of network environment 10 with a firewall cache that identifies a firewall for a managed route.
- FIGURE 3 includes application 60, firewall agent 75, and firewall cache 77, which may be installed in a user host, such as user host 20a, for example.
- FIGURE 3 also illustrates host manager 80, metadata cache 95, and policy module 85, which may be installed in a firewall such as firewall 25, for example.
- An intranet 78, Internet 15, and server 45 are also depicted in FIGURE 3.
- An application such as application 60 may attempt to open a new TCP connection at 305, with a server such as server 45, for example.
- Firewall agent 75 may intercept and hold the new connection, consulting firewall cache 77 (which may be initialized from configuration) at 310 to identify a firewall associated with the route to server 45.
- a firewall associated with host manager 80 e.g., firewall 25
- a connection e.g., a DTLS connection
- the connection may also be added to firewall cache 77 at 320 for future connections.
- Firewall agent 75 may send metadata for the connection to host manager 80 at 325a via a DTLS packet, for example.
- Host manager 80 may store the metadata in metadata cache 95 at 325b.
- Firewall agent 75 may release the connection at 330a, allowing data from application 60 to flow to host manager 80.
- Host manager 80 may provide connection data (i.e., TCP flow data, such as source IP address/port, destination IP address/port, protocol, etc.) to policy module 85 at 330b, and policy module 85 may correlate the connection data with metadata from metadata cache 95 at 335 to apply appropriate network policy at 340.
- network policy permits the connection, so the connection may be released to server 45 at 345 and data may flow between server 45 and application 60 at 350.
- FIGURE 4 is a simplified interaction diagram illustrating potential operations that may be associated with example embodiments of network environment 10 with a stale firewall cache that identifies an invalid firewall for a managed route.
- FIGURE 4 includes application 60, firewall agent 75, and firewall cache 77, which may be installed in a user host, such as user host 20a, for example.
- FIGURE 4 also illustrates host manager 80, metadata cache 95, and policy module 85, which may be installed in a firewall such as firewall 25, for example.
- An intranet 78, Internet 15, server 45, and an invalid firewall 100 are also depicted in FIGURE 4.
- An application such as application 60 may attempt to open a new flow at 405, with a server such as server 45, for example.
- Firewall agent 75 may intercept and hold the new flow, and consult firewall cache 77 (which may be initialized from configuration) at 410 to identify a firewall associated with the route to server 45.
- firewall cache 77 may include a stale entry that identifies firewall 100 for the route to server 45, such as might occur if a laptop or other mobile device moves from one network to another.
- firewall agent 75 may open, attempt to open, or believe it has previously opened a connection (e.g., a DTLS connection) to firewall 100 at 415, using a certificate distributed by a policy server, for example.
- the DTLS connection to firewall 100 may also be added to firewall cache 77 at 420 for future connections.
- Firewall agent 75 may fail to open a DTLS connection at 415, or it may send metadata for the connection to firewall 100 via a DTLS packet at 425 if it believes a connection is already open.
- Firewall 100 may never receive the metadata since it may no longer even be accessible to firewall agent 75 (e.g., there is no route to firewall 100), in which case the metadata is lost in transmission. If firewall 100 receives the metadata, it may be added to a metadata cache associated with firewall 100, but may be ignored since firewall 100 is no longer responsible for managing the route to server 45 in this particular example.
- Firewall agent 75 may release the new flow and data from application 60 may flow to host manager 80 at 430a.
- Host manager 80 may provide flow data to policy module 85 at 430b, and policy module 85 may attempt to correlate the flow data with metadata from metadata cache 95 at 435 to apply appropriate network policy at 440. However, since metadata for the flow was sent to another firewall (e.g., firewall 100) in this example scenario, policy module 85 may be unable to retrieve the metadata for the flow at 435. In the example of FIGURE 4, though, network policy may permit the flow without metadata, so the flow may be released to server 45 at 445 and data may flow between server 45 and application 60 at 450.
- Policy module 85 may log the event (i.e., releasing a new flow without metadata) and notify host manager 80 at 455a.
- Host manager 80 may send a discovery redirect to firewall agent 75 at 455b, which may include an HMAC based on a shared secret.
- Firewall agent 75 can receive the discovery redirect, and may also authenticate the discovery redirect based on the HMAC, for example, and update firewall cache 77 accordingly at 460.
- Firewall agent 75 may also open a connection (e.g., a DTLS connection) to host manager 80 and send metadata at 465.
- Host manager 80 may store in the metadata in metadata cache 95 at 470. The metadata can be audited along with the flow, which is already passing through the firewall associated with host manager 80.
- FIGURE 5 is a simplified interaction diagram illustrating potential operations that may be associated with other example embodiments of network environment 10 with a stale firewall cache that identifies an invalid firewall for a managed route.
- FIGURE 5 includes application 60, firewall agent 75, and firewall cache 77, which may be installed in a user host, such as user host 20a, for example.
- FIGURE 5 also illustrates host manager 80, metadata cache 95, and policy module 85, which may be installed in a firewall such as firewall 25, for example.
- An intranet 78, Internet 15, server 45, and invalid firewall 100 are also depicted in FIGURE 5.
- An application such as application 60 may attempt to open a new TCP connection at 505, with a server such as server 45, for example.
- Firewall agent 75 may intercept and hold the new connection, and consult firewall cache 77 at 510 to identify a firewall associated with the route to server 45.
- firewall cache 77 may include a stale entry that identifies firewall 100 for the route to server 45, such as might occur if a laptop or other mobile device moves from one network to another.
- Firewall cache 77 may also identify an open connection 515 to firewall 100 in this scenario.
- firewall agent 75 may send metadata for the connection to firewall 100 via a DTLS packet at 520, but since firewall 100 is no longer responsible for managing the route to server 45 in this particular example, this metadata may be generally ignored by firewall 100.
- Firewall agent 75 may release the connection and data from application 60 may flow to host manager 80 at 525a.
- Host manager 80 may provide connection data to policy module 85 at 525b, and policy module 85 may attempt to correlate the connection data with metadata from metadata cache 95 at 530 to apply appropriate network policy at 535.
- policy module 85 may be unable to retrieve the metadata for the connection at 530.
- network policy may block the connection without metadata at 535, so the firewall (e.g., host manager 80 or policy module 85) may drop the initial connection packet, without attempting to reset the connection (e.g., by sending a TCP RST packet).
- the firewall e.g., host manager 80 or policy module 85
- Policy module 85 may log the event (i.e., dropping the initial connection packet because no metadata was received) and notify host manager 80 at 540a.
- Host manager 80 may send a discovery redirect to firewall agent 75 at 540b.
- Firewall agent 75 can receive the discovery redirect, and may aiso authenticate the discovery redirect based on an HMAC, for example, and update firewall cache 77 accordingly at 545.
- application 60 retransmits its connection request at 550 if the firewall drops the initial connection packet (without resetting the connection) and application 60 does not receive an acknowledgement (e.g., an ACK packet) from server 45.
- an acknowledgement e.g., an ACK packet
- Firewall agent 75 may again intercept and hold the connection, and consult firewall cache 77 at 555 to identify a firewall associated with the route to server 45. Updated firewall cache 77 may then identify a firewall associated with host manager 80 (e.g., firewall 25). Firewall agent 75 may also open a connection (e.g., a DTLS connection) to host manager 80 at 560 and add the new connection to firewall cache 77 at 565 for future connections. Firewall 75 may send metadata at 570a, which host manager 80 may store in metadata cache 95 at 570b.
- a connection e.g., a DTLS connection
- Firewall agent 75 may release the connection at 575a, allowing data from application 60 to flow to host manager 80.
- Host manager 80 may send connection data to policy module 85 at 575b, and policy module 85 may correlate the connection data with metadata from metadata cache 95 at 580 to apply appropriate network policy at 585.
- network policy permits the connection, so the connection may be released to server 45 at 590 and data may flow between server 45 and application 60 at 595.
- host manager 80 may cache the initial connection packet for a brief period, enabling a connection to proceed when metadata is received at 570b without waiting for application 60 to retransmit the initial connection packet, which can make traffic flow faster.
- firewall agent 75 can cache the initial connection packet and retransmit it when it receives a discovery redirect.
- a firewall agent may have no information on a firewall (not even configuration information).
- the firewall agent may allow a new flow through to a firewall without sending metadata. If the firewall receives the new flow without metadata, the flow may be processed substantially similarly to receiving a flow from a firewall agent having a stale firewall cache entry, such as described above with reference to FIGURE 4 and FIGURE 5. In such a scenario, the firewall agent incurs no overhead for flows over unmanaged routes.
- a host agent may also send a PING message to a preconfigured address to force discovery for a particular path, such as by sending a PING message to a public Internet address to force discovery for the Internet path.
- a host agent may also send such a PING message on initial connection to a new network device.
- a firewall cache may be updated in response to a discovery redirect, such as at 460 and 545.
- a firewall agent may update its firewall cache by adding the subnet associated with the redirect message (e.g., a /24 entry for IPv4, /64 for IPv6).
- the firewall agent may compare the entry to the firewall/port identified in the discovery redirect. If the firewall/port from the discovery redirect does not match the firewall/port in the applicable firewall cache entry, the firewall cache may be updated by adding a new entry for the discovery target with a mask length incrementally modified (i.e., splitting the entry by incrementally increasing or decreasing the granularity of the entry for the discovery target) over the matching entry.
- a firewall cache entry may be split by adding a more specific entry (e.g., /24 for IPv4 or /64 for IPv6) and then generalized if overlapping discovery redirects are received.
- a firewall's routing knowledge may also be used to determine granularity or subnets associated with an exempt zone may be conveyed to a firewall agent in some embodiments.
- Network environment 10 may also operate seamlessly with unmanaged routes. For example, a firewall agent may intercept a new connection from an application to a server and determine from a firewall cache that the route is unmanaged. The firewall agent may release the connection and the connection with the server may be established with no additional packet overhead.
- FIGURE 6 is an example packet data unit (PDU) format 600 that may be associated with exchanging metadata over a metadata channel in example embodiments of network environment 10.
- PDU format 600 may include, for example, network flow data 605 and session descriptor data 610.
- Network flow data 605 may provide information associated with a new flow from a source, such as an application on a managed host.
- network flow data 605 may identify a protocol (short protocol) (e.g., TCP, UDP, ICMP, GRE, IPSec, etc.), the IP address of the source node (IPaddress source_address), the port number of the process opening the connection (short source_port), the IP address of the destination node (IPaddress dest_address), and the port number of the process receiving the connection on the destination node (short dest_port).
- protocol short protocol
- Session descriptor 610 may provide information about a user associated with the application opening the connection, such as a secure ID (string sid), a domain associated with the user (string domain), and a user name (string user), as well as information about the application, such as the full path of the application (string application_path).
- Other information in session descriptor 610 may provide data about the state of the source node (e.g., a host), including the state of a host firewall (boolean FW_enabled) and antivirus software running on the host (boolean AV_enabled), and information about interfaces on the source node (Interface interfacesf]).
- PDU format 600 is merely illustrative, though, and may be readily adapted to provide alternative or additional metadata, such as information about an intrusion prevention system, routing information, additional vendor information, etc.
- Network environment 10 may provide significant advantages, some of which have already been discussed. For example, network environment 10 can provide security of host/firewall interlock data with low protocol overhead. Network environment 10 may be readily adapted to reuse standard code packages, leveraging configuration data, protocols such as DTLS, and timers in TCP and application layer protocols. [0061] In the examples provided above, as well as numerous other potential examples, interaction may be described in terms of two, three, or four network elements. However, the number of network elements has been limited for purposes of clarity and example only. In certain cases, it may be easier to describe one or more of the functionalities of a given set of operations by only referencing a limited number of network elements.
- network environment 10 is readily scalable and can accommodate a large number of components, as well as more complicated/sophisticated arrangements and configurations. Accordingly, the examples provided should not limit the scope or inhibit the broad teachings of network environment 10 as potentially applied to a myriad of other architectures. Additionally, although described with reference to particular scenarios, where a particular module, such as policy module 85, is provided within a network element, these modules can be provided externally, or consolidated and/or combined in any suitable fashion. In certain instances, such modules may be provided in a single proprietary unit.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
Description
SYSTEM AND METHOD FOR REDIRECTED FIREWALL DISCOVERY
IN A NETWORK ENVIRONMENT
TECHNICAL FIELD
[0001] This specification relates in general to the field of network security, and more particularly, to a system and method for redirected firewall discovery in a network environment.
BACKGROUND
[0002] The field of network security has become increasingly important in today's society. The Internet has enabled interconnection of different computer networks all over the world. However, the Internet has also presented many opportunities for malicious operators to exploit these networks. Certain types of malicious software (e.g., bots) can be configured to receive commands from a remote operator once the software has infected a host computer. The software can be instructed to perform any number of malicious actions, such as sending out spam or malicious emails from the host computer, stealing sensitive information from a business or individual associated with the host computer, propagating to other host computers, and/or assisting with distributed denial of service attacks. In addition, the malicious operator can sell or otherwise give access to other malicious operators, thereby escalating the exploitation of the host computers. Thus, the ability to effectively protect and maintain stable computers and systems continues to present significant challenges for component manufacturers, system designers, and network operators.
BRIEF DESCRIPTION OF THE DRAWINGS
[0003] To provide a more complete understanding of the present disclosure and features and advantages thereof, reference is made to the following description, taken in
conjunction with the accompanying figures, wherein like reference numerals represent like parts, in which:
[0004] FIGURE 1 is a simplified block diagram illustrating an example embodiment of a network environment in which a firewall may be discovered through host redirection according to this specification;
[0005] FIGURE 2 is simplified block diagram illustrating additional details that may be associated with one potential embodiment of the network environment;
[0006] FIGURE 3 is a simplified interaction diagram illustrating potential operations that may be associated with example embodiments of the network environment;
[0007] FIGURE 4 is a simplified interaction diagram illustrating potential operations that may be associated with example embodiments of the network environment with a stale firewall cache that identifies an invalid firewall for a managed route;
[0008] FIGURE 5 is a simplified interaction diagram illustrating potential operations that may be associated with other example embodiments of the network environment with a stale firewall cache that identifies an invalid firewall for a managed route; and
[0009] FIGURE 6 is an example packet data unit format that may be associated with exchanging metadata in example embodiments of the network environment.
DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS
OVERVIEW
[0010] A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the flow.
[0011] In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
EXAMPLE EMBODIMENTS
[0012] Turning to FIGURE 1, FIGURE 1 is a simplified block diagram of an example embodiment of a network environment 10 in which a firewall may be discovered through host redirection. In the embodiment illustrated in FIGURE 1, network environment 10 can include Internet 15, user hosts 20a and 20b, a firewall 25, a policy server 30, a mail server 35, and a web server 40. In general, user hosts 20a-20b may be any type of termination node in a network connection, including but not limited to a desktop computer, a server, a laptop, a mobile telephone, or any other type of device that can receive or establish a connection with another node, such as mail server 35 or web server 40. Firewall 25 may control communications between user hosts 20a-20b and other nodes attached to Internet 15 or another network, such as by blocking unauthorized access while permitting authorized communications. In some instances, firewall 25 may be coupled to or integrated with an intrusion prevention system, network access control device, web gateway, email gateway, or any other type of gateway between Internet 15 and user hosts 20a-20b. Moreover, the location of firewall 25 in the routing topology close to user hosts 20a-20b is arbitrary. Policy server 30 may be coupled to or integrated with firewall 25, and may be used to manage user hosts 20a-20b and to administer and distribute network policies. Thus, in this example embodiment, user hosts 20a-20b may communicate with servers attached to Internet 15, such as mail server 35 or web server 40, by establishing a connection through firewall 25 if permitted by policies implemented in firewall 25 and managed by policy server 30.
[0013] Each of the elements of FIGURE 1 may couple to one another through simple interfaces or through any other suitable connection (wired or wireless), which provides a viable pathway for network communications. Additionally, any one or more of these elements may be combined or removed from the architecture based on particular configuration needs. Network environment 10 may include a configuration capable of transmission control protocol/Internet protocol (TCP/IP) communications for the transmission or reception of packets in a network. Network environment 10 may also operate in conjunction with a user datagram protocol/IP (UDP/IP) or any other suitable protocol where appropriate and based on particular needs.
[0014] For purposes of illustrating the techniques for providing network security in example embodiments, it is important to understand the activities occurring within a given
network. The following foundational information may be viewed as a basis from which the present disclosure may be properly explained. Such information is offered earnestly for purposes of explanation only and, accordingly, should not be construed in any way to limit the broad scope of the present disclosure and its potential applications.
[0015] Typical network environments used in organizations and by individuals include the ability to communicate electronically with other networks using the internet, for example, to access web pages hosted on servers connected to the Internet, to send or receive electronic mail (i.e., email) messages, or to exchange files. However, malicious users continue to develop new tactics for using the Internet to spread malware and to gain access to confidential information. Malware generally includes any software designed to access and/or control a computer without the informed consent of the computer owner, and is most commonly used as a label for any hostile, intrusive, or annoying software such as a computer virus, bot, spyware, adware, etc. Once compromised, malware may subvert a host and use it for malicious activity, such as spamming or information theft. Malware also typically includes one or more propagation vectors that enable it to spread within an organization's network or across other networks to other organizations or individuals. Common propagation vectors include exploiting known vulnerabilities on hosts within the local network and sending emails having a malicious program attached or providing malicious links within the emails.
[0016] One way in which malware may operate is to deceive a user by using a different network protocol exchange than the user expects. The malware may be packaged so as to convince the user to allow access to run it in some innocuous way, thus al lowing it access to the network, which often may require passing through a firewall or other security measure. The malware may then exploit the access to engage in alternative or additional activities not contemplated by the user. For example, a game may send email messages or a word processor may open a web connection. At the same time, the malware may also use standard protocols to deceive the firewall into permitting the malware to establish remote connections.
[0017] Botnets, for example, use malware and are an increasing threat to computer security. In many cases they employ sophisticated attack schemes that include a combination of well-known and new vulnerabilities. Botnets generally use a client-server
architecture where a type of malicious software (i.e., a bot) is placed on a host computer and communicates with a command and control (C&C) server, which may be controlled by a malicious user (e.g., a botnet operator). Usually, a botnet is composed of a large number of bots that are controlled by the operator using a C&C protocol through various channels, including Internet Relay Chat (IRC) and peer-to-peer (P2P) communication. The bot may receive commands from the C&C server to perform particular malicious activities and, accordingly, may execute such commands. The bot may also send any results or pilfered information back to the C&C server.
[0018] A bot is often designed to initiate communication with the C&C server and to masquerade as normal web browser traffic. For example, a bot may use a port typically used to communicate with a web server. Such bots, therefore, may not be detected by existing technologies without performing more detailed packet inspection of the web traffic. Moreover, once a bot is discovered, the botnet operator may simply find another way to masquerade network traffic by the bot to continue to present as normal web traffic. More recently, botnet operators have crafted bots to use encryption protocols such as, for example, secure socket layer (SSL), thereby encrypting malicious network traffic. Such encrypted traffic may use a Hypertext Transfer Protocol Secure (HTTPS) port so that only the endpoints involved in the encrypted session can decrypt the data. Thus, existing firewalls and other network intrusion prevention technologies may be unable to perform any meaningful inspection of the web traffic, and bots may continue to infect host computers within networks.
[0019] Other software security technology focused on preventing unauthorized program files from executing on a host computer may have undesirable side effects for end users or employees of a business or other organizational entity. Network or Information Technology (IT) administrators may be charged with crafting extensive policies relevant to all facets of the business entity to enable employees to obtain software and other electronic data from desirable and trusted network resources. Without extensive policies in place, employees may be prevented from downloading software and other electronic data from network resources that are not specifically authorized, even if such software and other data facilitate legitimate and necessary business activities. Such systems may be so restrictive that if unauthorized software is found on a host computer, any host computer activities may
be suspended pending network administrator intervention. Moreover, at the network level there may simply be too many applications to effectively track and incorporate into policies. Large whitelists or blacklists can be difficult to maintain and may degrade network performance, and some applications may not be susceptible to easy identification.
[0020] Information may be shared between a host and a firewall to collectively and mutually achieve better security, though. For example, a host may understand an application as an executable fife that is running a process with specific authentication, while the firewall may understand the application as a protocol in a TCP connection, which may also be correlated to a particular user authentication. The host may share session descriptors and other metadata with the firewall, and the firewall may share network policy with the host as needed to correlate application activities with expected network behavior. Network policy may include elements of security policy as well as other network specific parameters, such as quality of service (QoS) and routing. A host may also be associated with a universally unique identifier (UUID), which can be used to correlate connections and activities originating behind network address translators.
[0021] A host may also notify the firewall of additional network connections to the host. If a host has both wireless and wired connections active simultaneously, for example, there may be a risk of data received on one connection being transmitted on the other, so it may be desirable to restrict access to sensitive data. A host may also notify the firewall if the connection is associated with a virtual machine, or if the host has mountable read/write media, such as a USB stick attached.
[0022] In some embodiments of network environment 10, a host may include multiple attachment points, causing it to have multiple IP addresses. In other embodiments, a host may use the IP version 6 (IPv6), perhaps including Privacy Extensions (RFC4941), causing it to have one or more registered and known IPv6 addresses and one or more hidden or private IPv6 addresses. In these embodiments, an interlocked firewall may readily use dynamic information sharing to discover the user-to-host mapping for all the addresses on a host.
[0023] This dynamic information sharing between an interlocked host and firewall in network environment 10 may provide several benefits over conventional architectures. For example, by coordinating firewall policy with a host, a firewall can manage routes
differently, such as by allowing or denying traffic depending on which of multiple users on a host may be attempting to establish a connection. Moreover, only applications that may need to be granufarly controlled need to be controlled by the firewall. Thus, the firewall may control arbitrary or evasive applications, provide higher effective throughput, and control mobile-user traffic. In addition, traffic that does not need to be completely allowed or denied can be rate-limited. Arbitrary or evasive applications can also be rate-limited with process information available on a firewall, and differentiated services can be provided for managed and unmanaged hosts.
[0024] Many hosts may only use a single firewall for all routes. An agent running on a host may maintain a firewall cache that can identify this firewall. In a more complex scenario, a host may use more than one firewall, in which case it is important that the host understand which firewall will process a given flow. The firewall cache can provide routes through more than one firewall by mapping a given network route to a particular firewall . Routes are generally managed or unmanaged. A "managed route" generally refers to a route through a firewall that may be configured to accept metadata for network flows, while an "unmanaged route" is a route through a firewall that may not accept metadata. A firewall cache may associate a network (e.g., identified by a network destination and network mask) with a firewall designated for managing flows to the network, for example, or may associate an unmanaged route to a null value. The firewall cache may be initialized or configured by an administrator, providing separate configurations for each named network and/or default configurations for the first time a network is used. Some configurations may define one firewall for Internet addresses, initially based on an assumption that all global IP addresses are on the Internet.
[0025] Session descriptors generally include information about a host and an application associated with a given network session. For example, a session descriptor may include a UUID associated with the host and the user credentials of a process owner. Since a user can run separate processes with different user credentials, such information may be particularly advantageous for Citrix and terminal services. A session descriptor may additionally include a filename, pathname or other unique identifier of an application file (e.g., C:\... \WINWORD.EXE) that is running the process attempting to establish a network connection. For example, in some embodiments the application may be identified by a hash
function of the application's executable file, so as to make it more difficult for a malicious user to spoof the application name. A firewall may correlate this information with an application identifier or protocol to ensure that the application is performing as expected. A session descriptor may also contain information about the host environment, such as software installed on the host and the current configuration and state of the software, permitting the firewall to act as a network access control device. For example, a session descriptor may indicate whether the local anti-virus system is up to date and running. If Host-based Data Loss Prevention (HDLP) software is available, a session descriptor may also include file-typing information for file transfer. HDLP normally determines the type of file being transmitted out of the network (e.g., PDF, Word, etc.). The firewall may have additional policies about certain file types being transmitted over particular protocols, which may not be visible directly to an HDLP program.
[0026] Session descriptors and other metadata may be exchanged over an out-of- band communication channel (a "metadata channel") in some embodiments of network environment 10, which may be implemented with a protocol that provides authentication and/or encryption for communication privacy. In more particular embodiments, a Datagram Transport Layer Security (DTLS) protocol may be used to provide a metadata channel with communication privacy, and a host and a firewall may use certificates based on a common certificate authority. A policy server may distribute certificates to a host and firewall in some embodiments, while an external certificate authority may be used in other embodiments. Some protocols, including DTLS, may also be used to establish a back channel from a firewall to a host, which may be used for error messages and diagnostics, for example.
[0027] A host can send metadata to a firewall before opening a new network flow such that, in general, metadata arrives at the firewall before the first packet of a new flow. More particularly, a firewall agent on the host may intercept the first packet of a new flow and send a session descriptor and other metadata associated with the flow, such as source IP address and port, destination IP address and port, and protocol. The firewall may maintain a metadata cache and correlate a network flow with metadata if the firewall agent releases the flow. More particularly, the firewall may correlate metadata with network flow data, which broadly refers to information that associates a given network flow with a source
node (i.e., a node sending or attempting to send a packet) and a destination node (i.e., a node to which a packet is addressed) or destination nodes (e.g., broadcast or multicast address). Flow data may also include other information about the flow, such as a protocol family or protocol, for example.
[0028] For example, TCP generally opens a new flow (generally referred to as a "connection" in the context of a TCP flow) with a handshake - a host sends a first packet with one of the TCP flag bits (i.e., the SYN bit) set to indicate that a three-way handshake is in progress. Thus, an agent on a source node may intercept a new TCP connection by detecting an application on the source node sending a SYN packet (i.e., a packet with the SYN bit set) and holding the SYN packet. The agent may be able to identify a firewall for managing the route to a destination node associated with the new connection, such as by locating the route and its associated firewall in a firewall cache, and send metadata to the firewall (which the firewall can cache) over a secure metadata channel. The connection request may then be released by sending the SYN packet to the firewall, and the firewall may correlate the source IP, destination IP, protocol, etc.
[0029] Flows are not limited to communications using a reliable protocol such as TCP; a flow may also include communications using an unreliable protocol such as UDP or IP. In other embodiments, an agent may track flows that use an unreliable protocol and intercept a new flow by holding the first packet of a flow while it transmits metadata. The agent may also be able to retransmit the metadata by caching a hash of the first packet of a flow and comparing the hash to the hash of subsequent packets to determine if the first packet is being retransmitted by an application. In yet other embodiments, a firewall may track flows and cache the first packet until metadata arrives. In still yet other embodiments, metadata may be sent with every packet in a flow using an unreliable protocol, or never sent. Caches of first packet data can be very short-lived (e.g. less than one second to five seconds).
[0030] However, a host may not always be able to identify or locate such a firewall. For example, a host may move from one network to another (e.g., a laptop moving from a home network to a corporate network), may have a misconfigured routing table, a stale table entry, or a missing table entry, which may cause the host to send metadata to the
incorrect firewall (or send no metadata at all). If a host cannot determine the location of a firewall, an additional mechanism is needed.
[0031] In accordance with embodiments disclosed herein, network environment 10 may provide a system and method for redirection-based discovery of an interlocked firewall. A firewall can maintain a list of managed hosts, which may be identified within a given subnet range or identified explicitly by IP address or hostname, for example. In some embodiments, a policy server may provide the list to a firewall. The firewall may cache or drop the initial connection packet (e.g., a SYN packet) and send a firewall-host discovery redirect to any managed host that attempts to open a connection without sending appropriate metadata. In more particular embodiments, network environment 10 can decrease redirect traffic volume by not sending discovery redirects for local link or local broadcasts (e.g., netbios probes on port 137).
[0032] Managed hosts and firewalls may also maintain a shared secret (e.g., a password, key, etc.) for authentication of redirect packets. The shared secret may be distributed by a policy server or manually configured, for example, and a firewall may share the same secret with more than one host, including all hosts within a site. In certain embodiments, the shared secret may be a function of time. In yet other embodiments, managed hosts and firewalls may use asymmetric key cryptography (i.e., public key cryptography) to secure redirect packets.
[0033] In more particular embodiments, a discovery redirect may be implemented in an Internet Control Message Protocol (ICMP) packet, such as an ICMP Destination Unreachable (DU) packet for administratively prohibited communications (i.e., ICMP type 3, code 13). An ICMP DU packet may include the IP header and TCP (or UDP) headers of the original packet, and may further include a magic number and a hash-based message authentication code (HMAC). In such an embodiment, the magic number may be a 32-bit identifier (e.g., 0x46484131 or "FHA1"), which may also act as a protocol version number. In general, an HMAC is a message authentication code (MAC) involving a cryptographic hash function in combination with a shared secret (e.g., a secret key). A MAC (and an HMAC) may be used to simultaneously verify both the data integrity and the authenticity of a message. An HMAC may include, for example, the host-firewall shared secret, source IP
address, destination IP address, IP identification, firewall IP address, and TCP initial sequence number.
[0034] In other embodiments, a firewall may have a public/private key pair that it can use to establish a metadata channel (e.g., a DTLS connection). The firewall's private key may be used to encrypt a hash of the discovery redirect packet (using RSA for example). The encrypted hash can be inserted into the discovery redirect, and a host can validate the discovery redirect by decrypting the hash using the firewall's public key. For example, an ICMP DU packet may be used as described above, but replacing the HMAC with the encrypted hash.
[0035] While a host may ignore most of these types of ICMP DU packets, the host can take appropriate action when it receives a discovery redirect packet with an HMAC or encrypted hash. For example, a host may calculate an HMAC using its shared key and authenticate the message by comparing the calculated HMAC to the HMAC received in the discovery redirect packet. If the message is authentic, a host may update its firewall cache to reflect the firewall information in the discovery redirect packet and send metadata to the firewall for the given connection.
[0036] Turning to FIGURE 2, FIGURE 2 is a simplified block diagram illustrating additional details that may be associated with potential embodiments of network environment 10. FIGURE 2 includes Internet 15, user host 20a, firewall 25, and a server 45. Each of user host 20a and firewall 25 may include a respective processor 50a-50b, a respective memory element 55a-55b, and various hardware and/or software modules. More particularly, user host 20a may include an application 60, a configuration database 65, a client certificate 70, and a firewall agent 75, which may maintain a firewall cache 77. Firewall 25 may include a host manager 80 and a policy module 85, as well as a log 90, a metadata cache 95, and a server certificate 97.
[0037] In one example implementation, user hosts 20a-20b, firewall 25, and/or policy server 30 are network elements, which are meant to encompass network appliances, servers, routers, switches, gateways, bridges, loadbafancers, processors, modules, or any other suitable device, component, element, or object operable to exchange information in a network environment. Network elements may include any suitable hardware, software, components, modules, or objects that facilitate the operations thereof, as well as suitable
interfaces for receiving, transmitting, and/or otherwise communicating data or information in a network environment. This may be inclusive of appropriate algorithms and communication protocols that allow for the effective exchange of data or information. However, user hosts 20a-20b may be distinguished from other network elements, as they tend to serve as a terminal point for a network connection, in contrast to a gateway or router that tends to serve as an intermediate point in a network connection. User hosts 20a-20b may also be representative of wireless network nodes, such as an i-Phone, i-Pad, Android phone, or other similar telecommunications devices.
[0038] In regards to the internal structure associated with network environment 10, each of user hosts 20a-20b, firewall 25, and/or policy server 30 can include memory elements for storing information to be used in the operations outlined herein. Each of user hosts 20a-20b, firewall 25, and/or policy server 30 may keep information in any suitable memory element (e.g., random access memory (RAM), read-only memory (ROM), erasable programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), application specific integrated circuit (ASIC), etc.), software, hardware, or in any other suitable component, device, element, or object where appropriate and based on particular needs. Any of the memory items discussed herein (e.g., memory elements 55a-55b) should be construed as being encompassed within the broad term 'memory element.' The information being used, tracked, sent, or received by user hosts 20a-20b, firewall 25, and/or policy server 30 could be provided in any database, register, queue, table, cache, control list, or other storage structure, all of which can be referenced at any suitable timeframe. Any such storage options may be included within the broad term 'memory element' as used herein.
[0039] In certain example implementations, the functions outlined herein may be implemented by logic encoded in one or more tangible media (e.g., embedded logic provided in an ASIC, digital signal processor (DSP) instructions, software (potentially inclusive of object code and source code) to be executed by a processor, or other similar machine, etc.), which may be inclusive of non-transitory media. In some of these instances, memory elements (as shown in FIGURE 2) can store data used for the operations described herein. This includes the memory elements being able to store software, logic, code, or processor instructions that are executed to carry out the activities described herein.
[0040] In one example implementation, user hosts 20a-20b, firewall 25, and/or policy server 30 may include software modules (e.g., firewall agent 75 and/or host manager 80) to achieve, or to foster, operations as outlined herein. In other embodiments, such operations may be carried out by hardware, implemented externally to these elements, or included in some other network device to achieve the intended functionality. Alternatively, these elements may include software (or reciprocating software) that can coordinate in order to achieve the operations, as outlined herein. In still other embodiments, one or all of these devices may include any suitable algorithms, hardware, software, components, modules, interfaces, or objects that facilitate the operations thereof.
[0041] Additionally, each of user hosts 20a-20b, firewall 25, and/or policy server 30 may include a processor that can execute software or an algorithm to perform activities as discussed herein. A processor can execute any type of instructions associated with the data to achieve the operations detailed herein. In one example, the processors (as shown in FIGURE 2) could transform an element or an article (e.g., data) from one state or thing to another state or thing. In another example, the activities outlined herein may be implemented with fixed logic or programmable logic (e.g., software/computer instructions executed by a processor) and the elements identified herein could be some type of a programmable processor, programmable digital logic (e.g., a field programmable gate array (FPGA), an EPROM, an EEPROM) or an ASIC that includes digital logic, software, code, electronic instructions, or any suitable combination thereof. Any of the potential processing elements, modules, and machines described herein should be construed as being encompassed within the broad term 'processor.'
[0042] FIGURE 3 is a simplified interaction diagram illustrating potential operations that may be associated with example embodiments of network environment 10 with a firewall cache that identifies a firewall for a managed route. FIGURE 3 includes application 60, firewall agent 75, and firewall cache 77, which may be installed in a user host, such as user host 20a, for example. FIGURE 3 also illustrates host manager 80, metadata cache 95, and policy module 85, which may be installed in a firewall such as firewall 25, for example. An intranet 78, Internet 15, and server 45 are also depicted in FIGURE 3.
[0043] An application such as application 60 may attempt to open a new TCP connection at 305, with a server such as server 45, for example. Firewall agent 75 may intercept and hold the new connection, consulting firewall cache 77 (which may be initialized from configuration) at 310 to identify a firewall associated with the route to server 45. In the particular example of FIGURE 3, a firewall associated with host manager 80 (e.g., firewall 25) may be identified and a connection (e.g., a DTLS connection) to the firewall may be opened at 315, using a certificate (e.g., client certificate 70) distributed by a policy server, for example. The connection may also be added to firewall cache 77 at 320 for future connections. Firewall agent 75 may send metadata for the connection to host manager 80 at 325a via a DTLS packet, for example. Host manager 80 may store the metadata in metadata cache 95 at 325b. Firewall agent 75 may release the connection at 330a, allowing data from application 60 to flow to host manager 80. Host manager 80 may provide connection data (i.e., TCP flow data, such as source IP address/port, destination IP address/port, protocol, etc.) to policy module 85 at 330b, and policy module 85 may correlate the connection data with metadata from metadata cache 95 at 335 to apply appropriate network policy at 340. In the example of FIGURE 3, network policy permits the connection, so the connection may be released to server 45 at 345 and data may flow between server 45 and application 60 at 350.
[0044] FIGURE 4 is a simplified interaction diagram illustrating potential operations that may be associated with example embodiments of network environment 10 with a stale firewall cache that identifies an invalid firewall for a managed route. FIGURE 4 includes application 60, firewall agent 75, and firewall cache 77, which may be installed in a user host, such as user host 20a, for example. FIGURE 4 also illustrates host manager 80, metadata cache 95, and policy module 85, which may be installed in a firewall such as firewall 25, for example. An intranet 78, Internet 15, server 45, and an invalid firewall 100 are also depicted in FIGURE 4.
[0045] An application such as application 60 may attempt to open a new flow at 405, with a server such as server 45, for example. Firewall agent 75 may intercept and hold the new flow, and consult firewall cache 77 (which may be initialized from configuration) at 410 to identify a firewall associated with the route to server 45. In the particular example of FIGURE 4, firewall cache 77 may include a stale entry that identifies firewall 100 for the
route to server 45, such as might occur if a laptop or other mobile device moves from one network to another. Thus, firewall agent 75 may open, attempt to open, or believe it has previously opened a connection (e.g., a DTLS connection) to firewall 100 at 415, using a certificate distributed by a policy server, for example. The DTLS connection to firewall 100 may also be added to firewall cache 77 at 420 for future connections. Firewall agent 75 may fail to open a DTLS connection at 415, or it may send metadata for the connection to firewall 100 via a DTLS packet at 425 if it believes a connection is already open. Firewall 100 may never receive the metadata since it may no longer even be accessible to firewall agent 75 (e.g., there is no route to firewall 100), in which case the metadata is lost in transmission. If firewall 100 receives the metadata, it may be added to a metadata cache associated with firewall 100, but may be ignored since firewall 100 is no longer responsible for managing the route to server 45 in this particular example. Firewall agent 75 may release the new flow and data from application 60 may flow to host manager 80 at 430a. Host manager 80 may provide flow data to policy module 85 at 430b, and policy module 85 may attempt to correlate the flow data with metadata from metadata cache 95 at 435 to apply appropriate network policy at 440. However, since metadata for the flow was sent to another firewall (e.g., firewall 100) in this example scenario, policy module 85 may be unable to retrieve the metadata for the flow at 435. In the example of FIGURE 4, though, network policy may permit the flow without metadata, so the flow may be released to server 45 at 445 and data may flow between server 45 and application 60 at 450.
[0046] Policy module 85 may log the event (i.e., releasing a new flow without metadata) and notify host manager 80 at 455a. Host manager 80 may send a discovery redirect to firewall agent 75 at 455b, which may include an HMAC based on a shared secret. Firewall agent 75 can receive the discovery redirect, and may also authenticate the discovery redirect based on the HMAC, for example, and update firewall cache 77 accordingly at 460. Firewall agent 75 may also open a connection (e.g., a DTLS connection) to host manager 80 and send metadata at 465. Host manager 80 may store in the metadata in metadata cache 95 at 470. The metadata can be audited along with the flow, which is already passing through the firewall associated with host manager 80.
[0047] FIGURE 5 is a simplified interaction diagram illustrating potential operations that may be associated with other example embodiments of network environment 10 with a stale firewall cache that identifies an invalid firewall for a managed route. FIGURE 5 includes application 60, firewall agent 75, and firewall cache 77, which may be installed in a user host, such as user host 20a, for example. FIGURE 5 also illustrates host manager 80, metadata cache 95, and policy module 85, which may be installed in a firewall such as firewall 25, for example. An intranet 78, Internet 15, server 45, and invalid firewall 100 are also depicted in FIGURE 5.
[0048] An application such as application 60 may attempt to open a new TCP connection at 505, with a server such as server 45, for example. Firewall agent 75 may intercept and hold the new connection, and consult firewall cache 77 at 510 to identify a firewall associated with the route to server 45. In the particular example of FIGURE 5, firewall cache 77 may include a stale entry that identifies firewall 100 for the route to server 45, such as might occur if a laptop or other mobile device moves from one network to another. Firewall cache 77 may also identify an open connection 515 to firewall 100 in this scenario. Thus, firewall agent 75 may send metadata for the connection to firewall 100 via a DTLS packet at 520, but since firewall 100 is no longer responsible for managing the route to server 45 in this particular example, this metadata may be generally ignored by firewall 100. Firewall agent 75 may release the connection and data from application 60 may flow to host manager 80 at 525a. Host manager 80 may provide connection data to policy module 85 at 525b, and policy module 85 may attempt to correlate the connection data with metadata from metadata cache 95 at 530 to apply appropriate network policy at 535. However, since metadata for the connection was sent to another firewall (e.g., firewall 100) in this example scenario, policy module 85 may be unable to retrieve the metadata for the connection at 530. In the example of FIGURE 5, network policy may block the connection without metadata at 535, so the firewall (e.g., host manager 80 or policy module 85) may drop the initial connection packet, without attempting to reset the connection (e.g., by sending a TCP RST packet).
[0049] Policy module 85 may log the event (i.e., dropping the initial connection packet because no metadata was received) and notify host manager 80 at 540a. Host manager 80 may send a discovery redirect to firewall agent 75 at 540b. Firewall agent 75
can receive the discovery redirect, and may aiso authenticate the discovery redirect based on an HMAC, for example, and update firewall cache 77 accordingly at 545. In the general case, application 60 retransmits its connection request at 550 if the firewall drops the initial connection packet (without resetting the connection) and application 60 does not receive an acknowledgement (e.g., an ACK packet) from server 45. Firewall agent 75 may again intercept and hold the connection, and consult firewall cache 77 at 555 to identify a firewall associated with the route to server 45. Updated firewall cache 77 may then identify a firewall associated with host manager 80 (e.g., firewall 25). Firewall agent 75 may also open a connection (e.g., a DTLS connection) to host manager 80 at 560 and add the new connection to firewall cache 77 at 565 for future connections. Firewall 75 may send metadata at 570a, which host manager 80 may store in metadata cache 95 at 570b.
[0050] Firewall agent 75 may release the connection at 575a, allowing data from application 60 to flow to host manager 80. Host manager 80 may send connection data to policy module 85 at 575b, and policy module 85 may correlate the connection data with metadata from metadata cache 95 at 580 to apply appropriate network policy at 585. In the example of FIGURE 5, network policy permits the connection, so the connection may be released to server 45 at 590 and data may flow between server 45 and application 60 at 595.
[0051] In another embodiment, host manager 80 may cache the initial connection packet for a brief period, enabling a connection to proceed when metadata is received at 570b without waiting for application 60 to retransmit the initial connection packet, which can make traffic flow faster. In yet another embodiment, firewall agent 75 can cache the initial connection packet and retransmit it when it receives a discovery redirect.
[0052] In various other scenarios, a firewall agent may have no information on a firewall (not even configuration information). In some embodiments, the firewall agent may allow a new flow through to a firewall without sending metadata. If the firewall receives the new flow without metadata, the flow may be processed substantially similarly to receiving a flow from a firewall agent having a stale firewall cache entry, such as described above with reference to FIGURE 4 and FIGURE 5. In such a scenario, the firewall agent incurs no overhead for flows over unmanaged routes.
IS
[0053] A host agent may also send a PING message to a preconfigured address to force discovery for a particular path, such as by sending a PING message to a public Internet address to force discovery for the Internet path. A host agent may also send such a PING message on initial connection to a new network device.
[0054] As illustrated in various example embodiments above, a firewall cache may be updated in response to a discovery redirect, such as at 460 and 545. In more particular embodiments, a firewall agent may update its firewall cache by adding the subnet associated with the redirect message (e.g., a /24 entry for IPv4, /64 for IPv6). Alternatively, a firewall agent may search the firewall cache for the longest prefix matching the target address and add a new entry associating the firewall/port identified in the discovery redirect with the target address masked by eight bits (i.e., target/8 = firewalhport) for IPv4 or by sixteen bits (i.e., target/16 = firewalhport) for IPv6.
[0055] If a matching entry is found in the firewall cache, the firewall agent may compare the entry to the firewall/port identified in the discovery redirect. If the firewall/port from the discovery redirect does not match the firewall/port in the applicable firewall cache entry, the firewall cache may be updated by adding a new entry for the discovery target with a mask length incrementally modified (i.e., splitting the entry by incrementally increasing or decreasing the granularity of the entry for the discovery target) over the matching entry.
[0056] For example, the mask length of an entry may be increased by eight bits and the resulting network identifier associated with the discovery target. If the entry cannot be split further (i.e., the mask length is already 32 bits for an IPv4 address), the entry may be replaced such that the entry associates the discovery target with the firewall/port in the discovery redirect (i.e., replace the entry with target/32 = redirect firewalhport).
[0057] In another example, a firewall cache entry may be split by adding a more specific entry (e.g., /24 for IPv4 or /64 for IPv6) and then generalized if overlapping discovery redirects are received. A firewall's routing knowledge may also be used to determine granularity or subnets associated with an exempt zone may be conveyed to a firewall agent in some embodiments.
[0058] Network environment 10 may also operate seamlessly with unmanaged routes. For example, a firewall agent may intercept a new connection from an application to a server and determine from a firewall cache that the route is unmanaged. The firewall agent may release the connection and the connection with the server may be established with no additional packet overhead.
[0059] FIGURE 6 is an example packet data unit (PDU) format 600 that may be associated with exchanging metadata over a metadata channel in example embodiments of network environment 10. PDU format 600 may include, for example, network flow data 605 and session descriptor data 610. Network flow data 605 may provide information associated with a new flow from a source, such as an application on a managed host. In PDU format 600, for instance, network flow data 605 may identify a protocol (short protocol) (e.g., TCP, UDP, ICMP, GRE, IPSec, etc.), the IP address of the source node (IPaddress source_address), the port number of the process opening the connection (short source_port), the IP address of the destination node (IPaddress dest_address), and the port number of the process receiving the connection on the destination node (short dest_port). Session descriptor 610 may provide information about a user associated with the application opening the connection, such as a secure ID (string sid), a domain associated with the user (string domain), and a user name (string user), as well as information about the application, such as the full path of the application (string application_path). Other information in session descriptor 610 may provide data about the state of the source node (e.g., a host), including the state of a host firewall (boolean FW_enabled) and antivirus software running on the host (boolean AV_enabled), and information about interfaces on the source node (Interface interfacesf]). PDU format 600 is merely illustrative, though, and may be readily adapted to provide alternative or additional metadata, such as information about an intrusion prevention system, routing information, additional vendor information, etc.
[0060] Network environment 10 may provide significant advantages, some of which have already been discussed. For example, network environment 10 can provide security of host/firewall interlock data with low protocol overhead. Network environment 10 may be readily adapted to reuse standard code packages, leveraging configuration data, protocols such as DTLS, and timers in TCP and application layer protocols.
[0061] In the examples provided above, as well as numerous other potential examples, interaction may be described in terms of two, three, or four network elements. However, the number of network elements has been limited for purposes of clarity and example only. In certain cases, it may be easier to describe one or more of the functionalities of a given set of operations by only referencing a limited number of network elements. It should be appreciated that network environment 10 is readily scalable and can accommodate a large number of components, as well as more complicated/sophisticated arrangements and configurations. Accordingly, the examples provided should not limit the scope or inhibit the broad teachings of network environment 10 as potentially applied to a myriad of other architectures. Additionally, although described with reference to particular scenarios, where a particular module, such as policy module 85, is provided within a network element, these modules can be provided externally, or consolidated and/or combined in any suitable fashion. In certain instances, such modules may be provided in a single proprietary unit.
[0062] It is also important to note that the steps in the appended diagrams illustrate only some of the possible scenarios and patterns that may be executed by, or within, network environment 10. Some of these steps may be deleted or removed where appropriate, or these steps may be modified or changed considerably without departing from the scope of teachings provided herein. In addition, a number of these operations have been described as being executed concurrently with, or in parallel to, one or more additional operations. However, the timing of these operations may be altered considerably. The preceding operational flows have been offered for purposes of example and discussion. Substantial flexibility is provided by network environment 10 in that any suitable arrangements, chronologies, configurations, and timing mechanisms may be provided without departing from the teachings provided herein.
[0063] Numerous other changes, substitutions, variations, alterations, and modifications may be ascertained to one skilled in the art and it is intended that the present disclosure encompass all such changes, substitutions, variations, alterations, and modifications as falling within the scope of the appended claims. In order to assist the United States Patent and Trademark Office (USPTO) and, additionally, any readers of any patent issued on this application in interpreting the claims appended hereto, Applicant
wishes to note that the Applicant: (a) does not intend any of the appended claims to invoke paragraph six (6) of 35 U.S.C. section 112 as it exists on the date of the filing hereof unless the words "means for" or "step for" are specifically used in the particular claims; and (b) does not intend, by any statement in the specification, to limit this disclosure in any way that is not otherwise reflected in the appended claims.
Claims
1. A method, comprising:
receiving metadata from a host over a metadata channel;
intercepting a network flow from the host; and
correlating the metadata with the network flow to apply a network policy to the network flow.
2. The method of Claim 1, wherein the metadata channel uses a Datagram Transport Layer Security protocol.
3. A method, comprising:
intercepting a network flow from a source node;
sending a discovery redirect to the source node;
receiving metadata associated with the network flow; and
correlating the metadata with the network flow to apply a network policy to the network flow.
4. The method of Claim 3, wherein the discovery redirect is an Internet Control Message Protocol packet.
5. The method of Claim 3, wherein the discovery redirect is an Internet Control Message Protocol Destination Unreachable packet.
6. The method of Claim 3, wherein the discovery redirect is an Internet Control Message Protocol Destination Unreachable packet for administratively prohibited communications.
7. The method of Claim 3, wherein the discovery redirect comprises a hash- based message authentication code.
8. The method of Claim 3, wherein the discovery redirect comprises a hash- based message authentication code with a shared secret.
9. The method of Claim 3, wherein the discovery redirect comprises a private key encryption of a hash of the discovery redirect.
10. The method of Claim 3, wherein the metadata is received on a metadata channel.
11. The method of Claim 3, wherein the metadata is received using a Datagram Transport Layer Security protocol.
12. The method of Claim 3, further comprising caching a first packet in the network flow.
13. A method, comprising:
intercepting a network flow from a source node to a destination node;
identifying a firewall for managing a route to the destination node;
sending metadata associated with the network flow to the firewall; and
releasing the network flow.
14. The method of Claim 13, wherein the network flow uses a Transmission Control Protocol and intercepting the network flow comprises detecting a SYN packet from the source node.
15. The method of Claim 13, wherein the network flow uses an unreliable protocol and intercepting the network flow comprises caching a first packet of the flow until the metadata is sent.
16. The method of Claim 13, wherein the metadata is sent using a Datagram Transport Layer Security protocol.
17. The method of Claim 13, further comprising:
receiving a discovery redirect from a second firewall; and
sending the metadata to the second firewall over a metadata channel.
18. The method of Claim 13, further comprising:
receiving a discovery redirect from a second firewall;
updating a firewall cache to identify the second firewall for managing the route to the destination; and
sending the metadata to the second firewall over a metadata channel.
19. The method of Claim 13, further comprising
receiving a discovery redirect from a second firewall; and
sending the metadata to the second firewall using a Datagram Transport Layer Security protocol.
20. The method of Claim 13, further comprising:
receiving a discovery redirect from a second firewall;
authenticating the discovery redirect with a message authentication code; and sending the metadata to the second firewall over a metadata channel.
21. The method of Claim 13, further comprising:
receiving a discovery redirect from a second firewall;
authenticating the discovery redirect with a public key decryption of a hash of the discovery redirect; and
sending the metadata to the second firewall over a metadata channel.
22. The method of Claim 13, further comprising:
caching a first packet in the network flow;
receiving a discovery redirect from a second firewall;
sending the metadata to the second firewall over a metadata channel; and sending the first packet to the second firewall.
23. The method of Claim 13, further comprising:
receiving a discovery redirect from a second firewall;
updating a firewall cache to identify the second firewall for managing the route to the destination; and
sending the metadata to the second firewall over a metadata channel;
wherein updating the firewall cache comprises adding a new entry for the destination node with a mask length incrementally modified over a prior entry for the destination node.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP12842144.3A EP2769509B1 (en) | 2011-10-17 | 2012-09-26 | System and method for redirected firewall discovery in a network environment |
CN201280053580.XA CN103907330B (en) | 2011-10-17 | 2012-09-26 | It is used for the system and method that fire wall finds for redirecting in a network environment |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/275,249 | 2011-10-17 | ||
US13/275,249 US8713668B2 (en) | 2011-10-17 | 2011-10-17 | System and method for redirected firewall discovery in a network environment |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013058944A1 true WO2013058944A1 (en) | 2013-04-25 |
Family
ID=48086899
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2012/057312 WO2013058944A1 (en) | 2011-10-17 | 2012-09-26 | System and method for redirected firewall discovery in a network environment |
Country Status (4)
Country | Link |
---|---|
US (4) | US8713668B2 (en) |
EP (1) | EP2769509B1 (en) |
CN (1) | CN103907330B (en) |
WO (1) | WO2013058944A1 (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8713668B2 (en) | 2011-10-17 | 2014-04-29 | Mcafee, Inc. | System and method for redirected firewall discovery in a network environment |
US8739272B1 (en) | 2012-04-02 | 2014-05-27 | Mcafee, Inc. | System and method for interlocking a host and a gateway |
US8800024B2 (en) | 2011-10-17 | 2014-08-05 | Mcafee, Inc. | System and method for host-initiated firewall discovery in a network environment |
US8869265B2 (en) | 2009-08-21 | 2014-10-21 | Mcafee, Inc. | System and method for enforcing security policies in a virtual environment |
US8925101B2 (en) | 2010-07-28 | 2014-12-30 | Mcafee, Inc. | System and method for local protection against malicious software |
US8938800B2 (en) | 2010-07-28 | 2015-01-20 | Mcafee, Inc. | System and method for network level protection against malicious software |
US8973146B2 (en) | 2012-12-27 | 2015-03-03 | Mcafee, Inc. | Herd based scan avoidance system in a network environment |
US9112830B2 (en) | 2011-02-23 | 2015-08-18 | Mcafee, Inc. | System and method for interlocking a host and a gateway |
US9134998B2 (en) | 2006-02-02 | 2015-09-15 | Mcafee, Inc. | Enforcing alignment of approved changes and deployed changes in the software change life-cycle |
WO2015171864A1 (en) * | 2014-05-08 | 2015-11-12 | WANSecurity, Inc. | System and methods for reducing impact of malicious activity on operations of a wide area network |
US9424154B2 (en) | 2007-01-10 | 2016-08-23 | Mcafee, Inc. | Method of and system for computer system state checks |
US9578052B2 (en) | 2013-10-24 | 2017-02-21 | Mcafee, Inc. | Agent assisted malicious application blocking in a network environment |
US9576142B2 (en) | 2006-03-27 | 2017-02-21 | Mcafee, Inc. | Execution environment file inventory |
US9594881B2 (en) | 2011-09-09 | 2017-03-14 | Mcafee, Inc. | System and method for passive threat detection using virtual memory inspection |
US9864868B2 (en) | 2007-01-10 | 2018-01-09 | Mcafee, Llc | Method and apparatus for process enforced configuration management |
Families Citing this family (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7856661B1 (en) | 2005-07-14 | 2010-12-21 | Mcafee, Inc. | Classification of software on networked systems |
US9860274B2 (en) | 2006-09-13 | 2018-01-02 | Sophos Limited | Policy management |
US8856960B2 (en) * | 2012-02-09 | 2014-10-07 | Alcatel Lucent | Data leakage prevention for cloud and enterprise networks |
US8751615B2 (en) * | 2012-07-18 | 2014-06-10 | Accedian Networks Inc. | Systems and methods of discovering and controlling devices without explicit addressing |
US9491189B2 (en) * | 2013-08-26 | 2016-11-08 | Guardicore Ltd. | Revival and redirection of blocked connections for intention inspection in computer networks |
US9635114B2 (en) * | 2014-01-24 | 2017-04-25 | Netapp, Inc. | Externally initiated application session endpoint migration |
US9667637B2 (en) | 2014-06-09 | 2017-05-30 | Guardicore Ltd. | Network-based detection of authentication failures |
US10122760B2 (en) * | 2015-04-30 | 2018-11-06 | Drawbridge Networks, Inc. | Computer network security system |
CN107710812B (en) * | 2015-07-16 | 2021-08-17 | 诺基亚技术有限公司 | User plane enhancement to support intra-bearer sub-flow QOS differentiation |
US10200308B2 (en) | 2016-01-27 | 2019-02-05 | Oracle International Corporation | System and method for supporting a scalable representation of link stability and availability in a high performance computing environment |
US11271870B2 (en) | 2016-01-27 | 2022-03-08 | Oracle International Corporation | System and method for supporting scalable bit map based P_Key table in a high performance computing environment |
US11533307B2 (en) * | 2016-03-28 | 2022-12-20 | Zscaler, Inc. | Enforcing security policies on mobile devices in a hybrid architecture |
WO2018004600A1 (en) | 2016-06-30 | 2018-01-04 | Sophos Limited | Proactive network security using a health heartbeat |
US10225161B2 (en) * | 2016-10-31 | 2019-03-05 | Accedian Networks Inc. | Precise statistics computation for communication networks |
US11146578B2 (en) | 2016-12-16 | 2021-10-12 | Patternex, Inc. | Method and system for employing graph analysis for detecting malicious activity in time evolving networks |
WO2018148058A1 (en) * | 2017-02-10 | 2018-08-16 | Edgewise Networks, Inc. | Network application security policy enforcement |
US10439985B2 (en) | 2017-02-15 | 2019-10-08 | Edgewise Networks, Inc. | Network application security policy generation |
CN107147588B (en) * | 2017-05-16 | 2020-03-31 | 网宿科技股份有限公司 | Flow guiding method and device |
US10958623B2 (en) * | 2017-05-26 | 2021-03-23 | Futurewei Technologies, Inc. | Identity and metadata based firewalls in identity enabled networks |
US11487868B2 (en) * | 2017-08-01 | 2022-11-01 | Pc Matic, Inc. | System, method, and apparatus for computer security |
US10560428B2 (en) * | 2017-08-17 | 2020-02-11 | Texas Instruments Incorporated | Flexible hybrid firewall architecture |
US10997303B2 (en) | 2017-09-12 | 2021-05-04 | Sophos Limited | Managing untyped network traffic flows |
US10374803B2 (en) | 2017-10-06 | 2019-08-06 | Stealthpath, Inc. | Methods for internet communication security |
US10630642B2 (en) | 2017-10-06 | 2020-04-21 | Stealthpath, Inc. | Methods for internet communication security |
US10397186B2 (en) | 2017-10-06 | 2019-08-27 | Stealthpath, Inc. | Methods for internet communication security |
US10361859B2 (en) | 2017-10-06 | 2019-07-23 | Stealthpath, Inc. | Methods for internet communication security |
US10375019B2 (en) | 2017-10-06 | 2019-08-06 | Stealthpath, Inc. | Methods for internet communication security |
US10367811B2 (en) | 2017-10-06 | 2019-07-30 | Stealthpath, Inc. | Methods for internet communication security |
US10621341B2 (en) | 2017-10-30 | 2020-04-14 | Bank Of America Corporation | Cross platform user event record aggregation system |
US10728256B2 (en) | 2017-10-30 | 2020-07-28 | Bank Of America Corporation | Cross channel authentication elevation via logic repository |
US10721246B2 (en) * | 2017-10-30 | 2020-07-21 | Bank Of America Corporation | System for across rail silo system integration and logic repository |
WO2019094655A1 (en) | 2017-11-10 | 2019-05-16 | Edgewise Networks, Inc. | Automated load balancer discovery |
US11140195B2 (en) | 2018-04-04 | 2021-10-05 | Sophos Limited | Secure endpoint in a heterogenous enterprise network |
US10972431B2 (en) | 2018-04-04 | 2021-04-06 | Sophos Limited | Device management based on groups of network adapters |
US10862864B2 (en) * | 2018-04-04 | 2020-12-08 | Sophos Limited | Network device with transparent heartbeat processing |
US11271950B2 (en) | 2018-04-04 | 2022-03-08 | Sophos Limited | Securing endpoints in a heterogenous enterprise network |
US11616758B2 (en) | 2018-04-04 | 2023-03-28 | Sophos Limited | Network device for securing endpoints in a heterogeneous enterprise network |
US10826941B2 (en) | 2018-05-10 | 2020-11-03 | Fortinet, Inc. | Systems and methods for centrally managed host and network firewall services |
US11563722B2 (en) | 2019-08-22 | 2023-01-24 | Hewlett Packard Enterprise Development Lp | Firewall coordination in a network |
US11228431B2 (en) * | 2019-09-20 | 2022-01-18 | General Electric Company | Communication systems and methods for authenticating data packets within network flow |
US11558423B2 (en) | 2019-09-27 | 2023-01-17 | Stealthpath, Inc. | Methods for zero trust security with high quality of service |
CN110891059A (en) * | 2019-11-26 | 2020-03-17 | 武汉卓云智方科技有限公司 | Internet safety management platform |
EP4221092A1 (en) * | 2020-10-30 | 2023-08-02 | Palo Alto Networks, Inc. | Flow metadata exchanges between network and security functions for a security service |
US11095612B1 (en) | 2020-10-30 | 2021-08-17 | Palo Alto Networks, Inc. | Flow metadata exchanges between network and security functions for a security service |
US11785048B2 (en) | 2020-10-30 | 2023-10-10 | Palo Alto Networks, Inc. | Consistent monitoring and analytics for security insights for network and security functions for a security service |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1383295A (en) * | 2001-04-25 | 2002-12-04 | 数位联合电信股份有限公司 | Redirectable network access system |
JP2004524598A (en) * | 2000-09-25 | 2004-08-12 | クロスビーム システムズ, インク. | Flow scheduling and architecture for network application devices |
US20090328185A1 (en) * | 2004-11-04 | 2009-12-31 | Eric Van Den Berg | Detecting exploit code in network flows |
US20100188976A1 (en) | 2009-01-26 | 2010-07-29 | Rahman Shahriar I | Dynamic Management of Network Flows |
Family Cites Families (372)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4982430A (en) | 1985-04-24 | 1991-01-01 | General Instrument Corporation | Bootstrap channel security arrangement for communication network |
US4688169A (en) | 1985-05-30 | 1987-08-18 | Joshi Bhagirath S | Computer software security system |
US5155847A (en) | 1988-08-03 | 1992-10-13 | Minicom Data Corporation | Method and apparatus for updating software at remote locations |
US5560008A (en) | 1989-05-15 | 1996-09-24 | International Business Machines Corporation | Remote authentication and authorization in a distributed data processing system |
CA2010591C (en) | 1989-10-20 | 1999-01-26 | Phillip M. Adams | Kernels, description tables and device drivers |
US5222134A (en) | 1990-11-07 | 1993-06-22 | Tau Systems Corporation | Secure system for activating personal computer software at remote locations |
US5390314A (en) | 1992-10-09 | 1995-02-14 | American Airlines, Inc. | Method and apparatus for developing scripts that access mainframe resources that can be executed on various computer systems having different interface languages without modification |
US5339261A (en) | 1992-10-22 | 1994-08-16 | Base 10 Systems, Inc. | System for operating application software in a safety critical environment |
US5584009A (en) | 1993-10-18 | 1996-12-10 | Cyrix Corporation | System and method of retiring store data from a write buffer |
JP3777196B2 (en) | 1994-05-10 | 2006-05-24 | 富士通株式会社 | Communication control device for client / server system |
JP3042341B2 (en) | 1994-11-30 | 2000-05-15 | 日本電気株式会社 | Local I / O Control Method for Cluster-Coupled Multiprocessor System |
US6282712B1 (en) | 1995-03-10 | 2001-08-28 | Microsoft Corporation | Automatic software installation on heterogeneous networked computer systems |
US5699513A (en) | 1995-03-31 | 1997-12-16 | Motorola, Inc. | Method for secure network access via message intercept |
US5787427A (en) | 1996-01-03 | 1998-07-28 | International Business Machines Corporation | Information handling system, method, and article of manufacture for efficient object security processing by grouping objects sharing common control access policies |
US5842017A (en) | 1996-01-29 | 1998-11-24 | Digital Equipment Corporation | Method and apparatus for forming a translation unit |
US5907709A (en) | 1996-02-08 | 1999-05-25 | Inprise Corporation | Development system with methods for detecting invalid use and management of resources and memory at runtime |
US5884298A (en) | 1996-03-29 | 1999-03-16 | Cygnet Storage Solutions, Inc. | Method for accessing and updating a library of optical discs |
US5907708A (en) | 1996-06-03 | 1999-05-25 | Sun Microsystems, Inc. | System and method for facilitating avoidance of an exception of a predetermined type in a digital computer system by providing fix-up code for an instruction in response to detection of an exception condition resulting from execution thereof |
US5787177A (en) | 1996-08-01 | 1998-07-28 | Harris Corporation | Integrated network security access control system |
US5926832A (en) | 1996-09-26 | 1999-07-20 | Transmeta Corporation | Method and apparatus for aliasing memory data in an advanced microprocessor |
US5991881A (en) | 1996-11-08 | 1999-11-23 | Harris Corporation | Network surveillance system |
US5987611A (en) | 1996-12-31 | 1999-11-16 | Zone Labs, Inc. | System and methodology for managing internet access on a per application basis for client computers connected to the internet |
US6141698A (en) | 1997-01-29 | 2000-10-31 | Network Commerce Inc. | Method and system for injecting new code into existing application code |
US7821926B2 (en) | 1997-03-10 | 2010-10-26 | Sonicwall, Inc. | Generalized policy server |
US5944839A (en) | 1997-03-19 | 1999-08-31 | Symantec Corporation | System and method for automatically maintaining a computer system |
US6587877B1 (en) | 1997-03-25 | 2003-07-01 | Lucent Technologies Inc. | Management of time and expense when communicating between a host and a communication network |
US6192475B1 (en) | 1997-03-31 | 2001-02-20 | David R. Wallace | System and method for cloaking software |
US6167522A (en) | 1997-04-01 | 2000-12-26 | Sun Microsystems, Inc. | Method and apparatus for providing security for servers executing application programs received via a network |
US6356957B2 (en) | 1997-04-03 | 2002-03-12 | Hewlett-Packard Company | Method for emulating native object oriented foundation classes on a target object oriented programming system using a template library |
US5987557A (en) | 1997-06-19 | 1999-11-16 | Sun Microsystems, Inc. | Method and apparatus for implementing hardware protection domains in a system with no memory management unit (MMU) |
US6073142A (en) | 1997-06-23 | 2000-06-06 | Park City Group | Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments |
US6275938B1 (en) | 1997-08-28 | 2001-08-14 | Microsoft Corporation | Security enhancement for untrusted executable code |
US6192401B1 (en) | 1997-10-21 | 2001-02-20 | Sun Microsystems, Inc. | System and method for determining cluster membership in a heterogeneous distributed system |
US6393465B2 (en) | 1997-11-25 | 2002-05-21 | Nixmail Corporation | Junk electronic mail detector and eliminator |
US5987610A (en) | 1998-02-12 | 1999-11-16 | Ameritech Corporation | Computer virus screening methods and systems |
KR100621677B1 (en) | 1998-05-06 | 2006-09-07 | 마츠시타 덴끼 산교 가부시키가이샤 | Method and system for digital data transmission/reception |
US6795966B1 (en) | 1998-05-15 | 2004-09-21 | Vmware, Inc. | Mechanism for restoring, porting, replicating and checkpointing computer systems using state extraction |
US6442686B1 (en) | 1998-07-02 | 2002-08-27 | Networks Associates Technology, Inc. | System and methodology for messaging server-based management and enforcement of crypto policies |
US6182142B1 (en) | 1998-07-10 | 2001-01-30 | Encommerce, Inc. | Distributed access management of information resources |
US6338149B1 (en) | 1998-07-31 | 2002-01-08 | Westinghouse Electric Company Llc | Change monitoring system for a computer system |
US6546425B1 (en) | 1998-10-09 | 2003-04-08 | Netmotion Wireless, Inc. | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
JP3753873B2 (en) | 1998-11-11 | 2006-03-08 | 株式会社島津製作所 | Spectrophotometer |
JP3522141B2 (en) | 1999-01-28 | 2004-04-26 | 富士通株式会社 | Automatic generation method of program inheriting correction program, automatic program generation device, and recording medium recording program for automatically generating program inheriting correction program |
US6969352B2 (en) | 1999-06-22 | 2005-11-29 | Teratech Corporation | Ultrasound probe with integrated electronics |
US6453468B1 (en) | 1999-06-30 | 2002-09-17 | B-Hub, Inc. | Methods for improving reliability while upgrading software programs in a clustered computer system |
US6496477B1 (en) | 1999-07-09 | 2002-12-17 | Texas Instruments Incorporated | Processes, articles, and packets for network path diversity in media over packet applications |
US6567857B1 (en) | 1999-07-29 | 2003-05-20 | Sun Microsystems, Inc. | Method and apparatus for dynamic proxy insertion in network traffic flow |
US7340684B2 (en) | 1999-08-19 | 2008-03-04 | National Instruments Corporation | System and method for programmatically generating a second graphical program based on a first graphical program |
US7406603B1 (en) | 1999-08-31 | 2008-07-29 | Intertrust Technologies Corp. | Data protection systems and methods |
US6256773B1 (en) | 1999-08-31 | 2001-07-03 | Accenture Llp | System, method and article of manufacture for configuration management in a development architecture framework |
US6990591B1 (en) | 1999-11-18 | 2006-01-24 | Secureworks, Inc. | Method and system for remotely configuring and monitoring a communication device |
US6321267B1 (en) | 1999-11-23 | 2001-11-20 | Escom Corporation | Method and apparatus for filtering junk email |
US6662219B1 (en) | 1999-12-15 | 2003-12-09 | Microsoft Corporation | System for determining at subgroup of nodes relative weight to represent cluster by obtaining exclusive possession of quorum resource |
US6526418B1 (en) | 1999-12-16 | 2003-02-25 | Livevault Corporation | Systems and methods for backing up data files |
US6460050B1 (en) | 1999-12-22 | 2002-10-01 | Mark Raymond Pace | Distributed content identification system |
US7836494B2 (en) | 1999-12-29 | 2010-11-16 | Intel Corporation | System and method for regulating the flow of information to or from an application |
US6769008B1 (en) | 2000-01-10 | 2004-07-27 | Sun Microsystems, Inc. | Method and apparatus for dynamically altering configurations of clustered computer systems |
WO2001069439A1 (en) | 2000-03-17 | 2001-09-20 | Filesx Ltd. | Accelerating responses to requests made by users to an internet |
US6748534B1 (en) | 2000-03-31 | 2004-06-08 | Networks Associates, Inc. | System and method for partitioned distributed scanning of a large dataset for viruses and other malware |
US6941470B1 (en) | 2000-04-07 | 2005-09-06 | Everdream Corporation | Protected execution environments within a computer system |
CA2305078A1 (en) | 2000-04-12 | 2001-10-12 | Cloakware Corporation | Tamper resistant software - mass data encoding |
US7325127B2 (en) | 2000-04-25 | 2008-01-29 | Secure Data In Motion, Inc. | Security server system |
US6377808B1 (en) | 2000-04-27 | 2002-04-23 | Motorola, Inc. | Method and apparatus for routing data in a communication system |
AU2001262958A1 (en) | 2000-04-28 | 2001-11-12 | Internet Security Systems, Inc. | Method and system for managing computer security information |
US6769115B1 (en) | 2000-05-01 | 2004-07-27 | Emc Corporation | Adaptive interface for a software development environment |
US6847993B1 (en) | 2000-05-31 | 2005-01-25 | International Business Machines Corporation | Method, system and program products for managing cluster configurations |
US6934755B1 (en) | 2000-06-02 | 2005-08-23 | Sun Microsystems, Inc. | System and method for migrating processes on a network |
US6611925B1 (en) | 2000-06-13 | 2003-08-26 | Networks Associates Technology, Inc. | Single point of entry/origination item scanning within an enterprise or workgroup |
US20030061506A1 (en) | 2001-04-05 | 2003-03-27 | Geoffrey Cooper | System and method for security policy |
US6901519B1 (en) | 2000-06-22 | 2005-05-31 | Infobahn, Inc. | E-mail virus protection system and method |
US8204999B2 (en) | 2000-07-10 | 2012-06-19 | Oracle International Corporation | Query string processing |
US7093239B1 (en) | 2000-07-14 | 2006-08-15 | Internet Security Systems, Inc. | Computer immune system and method for detecting unwanted code in a computer system |
US7350204B2 (en) | 2000-07-24 | 2008-03-25 | Microsoft Corporation | Policies for secure software execution |
EP1307988B1 (en) | 2000-08-04 | 2004-04-21 | Xtradyne Technologies Aktiengesellschaft | Method and system for session based authorization and access control for networked application objects |
AUPQ968100A0 (en) | 2000-08-25 | 2000-09-21 | Telstra Corporation Limited | A management system |
EP1407576A4 (en) | 2000-09-01 | 2005-07-27 | Tut Systems Inc | A method and system to implement policy-based network traffic management |
US7707305B2 (en) | 2000-10-17 | 2010-04-27 | Cisco Technology, Inc. | Methods and apparatus for protecting against overload conditions on nodes of a distributed network |
US7606898B1 (en) | 2000-10-24 | 2009-10-20 | Microsoft Corporation | System and method for distributed management of shared computers |
US7146305B2 (en) | 2000-10-24 | 2006-12-05 | Vcis, Inc. | Analytical virtual machine |
US7054930B1 (en) | 2000-10-26 | 2006-05-30 | Cisco Technology, Inc. | System and method for propagating filters |
US6930985B1 (en) | 2000-10-26 | 2005-08-16 | Extreme Networks, Inc. | Method and apparatus for management of configuration in a network |
US6834301B1 (en) | 2000-11-08 | 2004-12-21 | Networks Associates Technology, Inc. | System and method for configuration, management, and monitoring of a computer network using inheritance |
US6766334B1 (en) | 2000-11-21 | 2004-07-20 | Microsoft Corporation | Project-based configuration management method and apparatus |
US20020069367A1 (en) | 2000-12-06 | 2002-06-06 | Glen Tindal | Network operating system data directory |
US6907600B2 (en) | 2000-12-27 | 2005-06-14 | Intel Corporation | Virtual translation lookaside buffer |
JP2002244898A (en) | 2001-02-19 | 2002-08-30 | Hitachi Ltd | Database managing program and database system |
US6993012B2 (en) * | 2001-02-20 | 2006-01-31 | Innomedia Pte, Ltd | Method for communicating audio data in a packet switched network |
US7739497B1 (en) * | 2001-03-21 | 2010-06-15 | Verizon Corporate Services Group Inc. | Method and apparatus for anonymous IP datagram exchange using dynamic network address translation |
WO2002093334A2 (en) | 2001-04-06 | 2002-11-21 | Symantec Corporation | Temporal access control for computer virus outbreaks |
US6918110B2 (en) | 2001-04-11 | 2005-07-12 | Hewlett-Packard Development Company, L.P. | Dynamic instrumentation of an executable program by means of causing a breakpoint at the entry point of a function and providing instrumentation code |
US6715050B2 (en) | 2001-05-31 | 2004-03-30 | Oracle International Corporation | Storage access keys |
US6988101B2 (en) | 2001-05-31 | 2006-01-17 | International Business Machines Corporation | Method, system, and computer program product for providing an extensible file system for accessing a foreign file system from a local data processing system |
US6988124B2 (en) | 2001-06-06 | 2006-01-17 | Microsoft Corporation | Locating potentially identical objects across multiple computers based on stochastic partitioning of workload |
US7290266B2 (en) | 2001-06-14 | 2007-10-30 | Cisco Technology, Inc. | Access control by a real-time stateful reference monitor with a state collection training mode and a lockdown mode for detecting predetermined patterns of events indicative of requests for operating system resources resulting in a decision to allow or block activity identified in a sequence of events based on a rule set defining a processing policy |
US7065767B2 (en) | 2001-06-29 | 2006-06-20 | Intel Corporation | Managed hosting server auditing and change tracking |
US7069330B1 (en) | 2001-07-05 | 2006-06-27 | Mcafee, Inc. | Control of interaction between client computer applications and network resources |
US20030023736A1 (en) | 2001-07-12 | 2003-01-30 | Kurt Abkemeier | Method and system for filtering messages |
US20030014667A1 (en) | 2001-07-16 | 2003-01-16 | Andrei Kolichtchak | Buffer overflow attack detection and suppression |
US6877088B2 (en) | 2001-08-08 | 2005-04-05 | Sun Microsystems, Inc. | Methods and apparatus for controlling speculative execution of instructions based on a multiaccess memory condition |
US7007302B1 (en) | 2001-08-31 | 2006-02-28 | Mcafee, Inc. | Efficient management and blocking of malicious code and hacking attempts in a network environment |
US7010796B1 (en) | 2001-09-28 | 2006-03-07 | Emc Corporation | Methods and apparatus providing remote operation of an application programming interface |
US7278161B2 (en) | 2001-10-01 | 2007-10-02 | International Business Machines Corporation | Protecting a data processing system from attack by a vandal who uses a vulnerability scanner |
US7177267B2 (en) | 2001-11-09 | 2007-02-13 | Adc Dsl Systems, Inc. | Hardware monitoring and configuration management |
US7853643B1 (en) | 2001-11-21 | 2010-12-14 | Blue Titan Software, Inc. | Web services-based computing resource lifecycle management |
EP1315066A1 (en) | 2001-11-21 | 2003-05-28 | BRITISH TELECOMMUNICATIONS public limited company | Computer security system |
US7346781B2 (en) | 2001-12-06 | 2008-03-18 | Mcafee, Inc. | Initiating execution of a computer program from an encrypted version of a computer program |
US6959373B2 (en) | 2001-12-10 | 2005-10-25 | Incipient, Inc. | Dynamic and variable length extents |
US7039949B2 (en) | 2001-12-10 | 2006-05-02 | Brian Ross Cartmell | Method and system for blocking unwanted communications |
US7159036B2 (en) | 2001-12-10 | 2007-01-02 | Mcafee, Inc. | Updating data from a source computer to groups of destination computers |
US10033700B2 (en) | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights |
JP4522705B2 (en) | 2001-12-13 | 2010-08-11 | 独立行政法人科学技術振興機構 | Software safety execution system |
US7398389B2 (en) | 2001-12-20 | 2008-07-08 | Coretrace Corporation | Kernel-based network security infrastructure |
US7096500B2 (en) | 2001-12-21 | 2006-08-22 | Mcafee, Inc. | Predictive malware scanning of internet data |
JP3906356B2 (en) | 2001-12-27 | 2007-04-18 | 独立行政法人情報通信研究機構 | Syntax analysis method and apparatus |
US7743415B2 (en) | 2002-01-31 | 2010-06-22 | Riverbed Technology, Inc. | Denial of service attacks characterization |
US20030167399A1 (en) | 2002-03-01 | 2003-09-04 | Yves Audebert | Method and system for performing post issuance configuration and data changes to a personal security device using a communications pipe |
US6941449B2 (en) | 2002-03-04 | 2005-09-06 | Hewlett-Packard Development Company, L.P. | Method and apparatus for performing critical tasks using speculative operations |
US7600021B2 (en) | 2002-04-03 | 2009-10-06 | Microsoft Corporation | Delta replication of source files and packages across networked resources |
US20070253430A1 (en) | 2002-04-23 | 2007-11-01 | Minami John S | Gigabit Ethernet Adapter |
US7370360B2 (en) | 2002-05-13 | 2008-05-06 | International Business Machines Corporation | Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine |
US20030221190A1 (en) | 2002-05-22 | 2003-11-27 | Sun Microsystems, Inc. | System and method for performing patch installation on multiple devices |
US7823148B2 (en) | 2002-05-22 | 2010-10-26 | Oracle America, Inc. | System and method for performing patch installation via a graphical user interface |
US7024404B1 (en) | 2002-05-28 | 2006-04-04 | The State University Rutgers | Retrieval and display of data objects using a cross-group ranking metric |
US8843903B1 (en) | 2003-06-11 | 2014-09-23 | Symantec Corporation | Process tracking application layered system |
US7512977B2 (en) | 2003-06-11 | 2009-03-31 | Symantec Corporation | Intrustion protection system utilizing layers |
US7823203B2 (en) | 2002-06-17 | 2010-10-26 | At&T Intellectual Property Ii, L.P. | Method and device for detecting computer network intrusions |
US7139916B2 (en) | 2002-06-28 | 2006-11-21 | Ebay, Inc. | Method and system for monitoring user interaction with a computer |
US8924484B2 (en) | 2002-07-16 | 2014-12-30 | Sonicwall, Inc. | Active e-mail filter with challenge-response |
US7522906B2 (en) | 2002-08-09 | 2009-04-21 | Wavelink Corporation | Mobile unit configuration management for WLANs |
JP2004078507A (en) | 2002-08-16 | 2004-03-11 | Sony Corp | Access control device, access control method and computer program |
US20040111461A1 (en) | 2002-08-28 | 2004-06-10 | Claudatos Christopher H. | Managing and controlling user applications with network switches |
US7624347B2 (en) | 2002-09-17 | 2009-11-24 | At&T Intellectual Property I, L.P. | System and method for forwarding full header information in email messages |
US7546333B2 (en) | 2002-10-23 | 2009-06-09 | Netapp, Inc. | Methods and systems for predictive change management for access paths in networks |
US20040088398A1 (en) | 2002-11-06 | 2004-05-06 | Barlow Douglas B. | Systems and methods for providing autoconfiguration and management of nodes |
US7353501B2 (en) | 2002-11-18 | 2008-04-01 | Microsoft Corporation | Generic wrapper scheme |
US7865931B1 (en) | 2002-11-25 | 2011-01-04 | Accenture Global Services Limited | Universal authorization and access control security measure for applications |
US7346927B2 (en) | 2002-12-12 | 2008-03-18 | Access Business Group International Llc | System and method for storing and accessing secure data |
US20040143749A1 (en) | 2003-01-16 | 2004-07-22 | Platformlogic, Inc. | Behavior-based host-based intrusion prevention system |
US20040167906A1 (en) | 2003-02-25 | 2004-08-26 | Smith Randolph C. | System consolidation tool and method for patching multiple servers |
US7024548B1 (en) | 2003-03-10 | 2006-04-04 | Cisco Technology, Inc. | Methods and apparatus for auditing and tracking changes to an existing configuration of a computerized device |
US7529754B2 (en) | 2003-03-14 | 2009-05-05 | Websense, Inc. | System and method of monitoring and controlling application files |
WO2004095285A1 (en) | 2003-03-28 | 2004-11-04 | Matsushita Electric Industrial Co.,Ltd. | Recording medium, recording device using the same, and reproduction device |
US8209680B1 (en) | 2003-04-11 | 2012-06-26 | Vmware, Inc. | System and method for disk imaging on diverse computers |
US7607010B2 (en) | 2003-04-12 | 2009-10-20 | Deep Nines, Inc. | System and method for network edge data protection |
US20050108516A1 (en) | 2003-04-17 | 2005-05-19 | Robert Balzer | By-pass and tampering protection for application wrappers |
US20040230963A1 (en) | 2003-05-12 | 2004-11-18 | Rothman Michael A. | Method for updating firmware in an operating system agnostic manner |
DE10324189A1 (en) | 2003-05-28 | 2004-12-16 | Robert Bosch Gmbh | Method for controlling access to a resource of an application in a data processing device |
US7657599B2 (en) | 2003-05-29 | 2010-02-02 | Mindshare Design, Inc. | Systems and methods for automatically updating electronic mail access lists |
US20050108562A1 (en) | 2003-06-18 | 2005-05-19 | Khazan Roger I. | Technique for detecting executable malicious code using a combination of static and dynamic analyses |
US7827602B2 (en) * | 2003-06-30 | 2010-11-02 | At&T Intellectual Property I, L.P. | Network firewall host application identification and authentication |
US7454489B2 (en) * | 2003-07-01 | 2008-11-18 | International Business Machines Corporation | System and method for accessing clusters of servers from the internet network |
US7283517B2 (en) | 2003-07-22 | 2007-10-16 | Innomedia Pte | Stand alone multi-media terminal adapter with network address translation and port partitioning |
US7463590B2 (en) | 2003-07-25 | 2008-12-09 | Reflex Security, Inc. | System and method for threat detection and response |
US7526541B2 (en) | 2003-07-29 | 2009-04-28 | Enterasys Networks, Inc. | System and method for dynamic network policy management |
US7886093B1 (en) | 2003-07-31 | 2011-02-08 | Hewlett-Packard Development Company, L.P. | Electronic device network supporting compression and decompression in electronic devices |
US7925722B1 (en) | 2003-08-01 | 2011-04-12 | Avocent Corporation | Method and apparatus for discovery and installation of network devices through a network |
US7401104B2 (en) | 2003-08-21 | 2008-07-15 | Microsoft Corporation | Systems and methods for synchronizing computer systems through an intermediary file system share or device |
US7464408B1 (en) | 2003-08-29 | 2008-12-09 | Solidcore Systems, Inc. | Damage containment by translation |
US8539063B1 (en) | 2003-08-29 | 2013-09-17 | Mcafee, Inc. | Method and system for containment of networked application client software by explicit human input |
US7386888B2 (en) | 2003-08-29 | 2008-06-10 | Trend Micro, Inc. | Network isolation techniques suitable for virus protection |
US20050065935A1 (en) | 2003-09-16 | 2005-03-24 | Chebolu Anil Kumar | Client comparison of network content with server-based categorization |
US7360097B2 (en) | 2003-09-30 | 2008-04-15 | Check Point Software Technologies, Inc. | System providing methodology for securing interfaces of executable files |
US20050081053A1 (en) | 2003-10-10 | 2005-04-14 | International Business Machines Corlporation | Systems and methods for efficient computer virus detection |
US7930351B2 (en) | 2003-10-14 | 2011-04-19 | At&T Intellectual Property I, L.P. | Identifying undesired email messages having attachments |
US7280956B2 (en) | 2003-10-24 | 2007-10-09 | Microsoft Corporation | System, method, and computer program product for file encryption, decryption and transfer |
US7814554B1 (en) | 2003-11-06 | 2010-10-12 | Gary Dean Ragner | Dynamic associative storage security for long-term memory storage devices |
US20050114672A1 (en) | 2003-11-20 | 2005-05-26 | Encryptx Corporation | Data rights management of digital information in a portable software permission wrapper |
US20040172551A1 (en) | 2003-12-09 | 2004-09-02 | Michael Connor | First response computer virus blocking. |
US7600219B2 (en) | 2003-12-10 | 2009-10-06 | Sap Ag | Method and system to monitor software interface updates and assess backward compatibility |
US7546594B2 (en) | 2003-12-15 | 2009-06-09 | Microsoft Corporation | System and method for updating installation components using an installation component delta patch in a networked environment |
US7840968B1 (en) | 2003-12-17 | 2010-11-23 | Mcafee, Inc. | Method and system for containment of usage of language interfaces |
JP2005202523A (en) | 2004-01-13 | 2005-07-28 | Sony Corp | Computer device and process control method |
US7272654B1 (en) | 2004-03-04 | 2007-09-18 | Sandbox Networks, Inc. | Virtualizing network-attached-storage (NAS) with a compact table that stores lossy hashes of file names and parent handles rather than full names |
JP4480422B2 (en) | 2004-03-05 | 2010-06-16 | 富士通株式会社 | Unauthorized access prevention method, apparatus, system, and program |
US7783735B1 (en) | 2004-03-22 | 2010-08-24 | Mcafee, Inc. | Containment of network communication |
JP2005275839A (en) | 2004-03-25 | 2005-10-06 | Nec Corp | Software use permission method and system |
US7966658B2 (en) | 2004-04-08 | 2011-06-21 | The Regents Of The University Of California | Detecting public network attacks using signatures and fast content analysis |
EP1745342A2 (en) | 2004-04-19 | 2007-01-24 | Securewave S.A. | On-line centralized and local authorization of executable files |
US7890946B2 (en) | 2004-05-11 | 2011-02-15 | Microsoft Corporation | Efficient patching |
US20060004875A1 (en) | 2004-05-11 | 2006-01-05 | Microsoft Corporation | CMDB schema |
EP1767031B1 (en) | 2004-05-24 | 2009-12-09 | Computer Associates Think, Inc. | System and method for automatically configuring a mobile device |
US7818377B2 (en) | 2004-05-24 | 2010-10-19 | Microsoft Corporation | Extended message rule architecture |
US7506170B2 (en) | 2004-05-28 | 2009-03-17 | Microsoft Corporation | Method for secure access to multiple secure networks |
US20050273858A1 (en) | 2004-06-07 | 2005-12-08 | Erez Zadok | Stackable file systems and methods thereof |
US7624445B2 (en) | 2004-06-15 | 2009-11-24 | International Business Machines Corporation | System for dynamic network reconfiguration and quarantine in response to threat conditions |
JP4341517B2 (en) | 2004-06-21 | 2009-10-07 | 日本電気株式会社 | Security policy management system, security policy management method and program |
US7694150B1 (en) | 2004-06-22 | 2010-04-06 | Cisco Technology, Inc | System and methods for integration of behavioral and signature based security |
US20050289538A1 (en) | 2004-06-23 | 2005-12-29 | International Business Machines Corporation | Deploying an application software on a virtual deployment target |
US7203864B2 (en) | 2004-06-25 | 2007-04-10 | Hewlett-Packard Development Company, L.P. | Method and system for clustering computers into peer groups and comparing individual computers to their peers |
US7908653B2 (en) | 2004-06-29 | 2011-03-15 | Intel Corporation | Method of improving computer security through sandboxing |
KR101214326B1 (en) | 2004-07-09 | 2012-12-21 | 텔레폰악티에볼라겟엘엠에릭슨(펍) | Method and arrangement for providing different services in a multimedia communication system |
US20060015501A1 (en) | 2004-07-19 | 2006-01-19 | International Business Machines Corporation | System, method and program product to determine a time interval at which to check conditions to permit access to a file |
US7937455B2 (en) | 2004-07-28 | 2011-05-03 | Oracle International Corporation | Methods and systems for modifying nodes in a cluster environment |
JP2006059217A (en) | 2004-08-23 | 2006-03-02 | Mitsubishi Electric Corp | Software memory image generation apparatus and built-in device software update system and program |
US7703090B2 (en) | 2004-08-31 | 2010-04-20 | Microsoft Corporation | Patch un-installation |
US7873955B1 (en) | 2004-09-07 | 2011-01-18 | Mcafee, Inc. | Solidifying the executable software set of a computer |
US7392374B2 (en) | 2004-09-21 | 2008-06-24 | Hewlett-Packard Development Company, L.P. | Moving kernel configurations |
US7561515B2 (en) | 2004-09-27 | 2009-07-14 | Intel Corporation | Role-based network traffic-flow rate control |
US8146145B2 (en) * | 2004-09-30 | 2012-03-27 | Rockstar Bidco Lp | Method and apparatus for enabling enhanced control of traffic propagation through a network firewall |
US7685632B2 (en) | 2004-10-01 | 2010-03-23 | Microsoft Corporation | Access authorization having a centralized policy |
US7506364B2 (en) | 2004-10-01 | 2009-03-17 | Microsoft Corporation | Integrated access authorization |
US20060080656A1 (en) | 2004-10-12 | 2006-04-13 | Microsoft Corporation | Methods and instructions for patch management |
US9329905B2 (en) | 2004-10-15 | 2016-05-03 | Emc Corporation | Method and apparatus for configuring, monitoring and/or managing resource groups including a virtual machine |
US8099060B2 (en) | 2004-10-29 | 2012-01-17 | Research In Motion Limited | Wireless/wired mobile communication device with option to automatically block wireless communication when connected for wired communication |
US7765538B2 (en) | 2004-10-29 | 2010-07-27 | Hewlett-Packard Development Company, L.P. | Method and apparatus for determining which program patches to recommend for installation |
US20060101277A1 (en) | 2004-11-10 | 2006-05-11 | Meenan Patrick A | Detecting and remedying unauthorized computer programs |
US7698744B2 (en) | 2004-12-03 | 2010-04-13 | Whitecell Software Inc. | Secure system for allowing the execution of authorized computer program code |
US8479193B2 (en) | 2004-12-17 | 2013-07-02 | Intel Corporation | Method, apparatus and system for enhancing the usability of virtual machines |
US7765544B2 (en) | 2004-12-17 | 2010-07-27 | Intel Corporation | Method, apparatus and system for improving security in a virtual machine host |
US7607170B2 (en) | 2004-12-22 | 2009-10-20 | Radware Ltd. | Stateful attack protection |
US7752667B2 (en) | 2004-12-28 | 2010-07-06 | Lenovo (Singapore) Pte Ltd. | Rapid virus scan using file signature created during file write |
EP1842354B1 (en) | 2005-01-24 | 2014-11-05 | Citrix Systems, Inc. | Systems and methods for performing caching of dynamically generated objects in a network |
US7302558B2 (en) | 2005-01-25 | 2007-11-27 | Goldman Sachs & Co. | Systems and methods to facilitate the creation and configuration management of computing systems |
US7385938B1 (en) | 2005-02-02 | 2008-06-10 | At&T Corp. | Method and apparatus for adjusting a network device configuration change distribution schedule |
US20130247027A1 (en) | 2005-02-16 | 2013-09-19 | Solidcore Systems, Inc. | Distribution and installation of solidified software on a computer |
US8056138B2 (en) | 2005-02-26 | 2011-11-08 | International Business Machines Corporation | System, method, and service for detecting improper manipulation of an application |
US7836504B2 (en) | 2005-03-01 | 2010-11-16 | Microsoft Corporation | On-access scan of memory for malware |
US7685635B2 (en) | 2005-03-11 | 2010-03-23 | Microsoft Corporation | Systems and methods for multi-level intercept processing in a virtual machine environment |
TW200707417A (en) | 2005-03-18 | 2007-02-16 | Sony Corp | Reproducing apparatus, reproducing method, program, program storage medium, data delivery system, data structure, and manufacturing method of recording medium |
US7552479B1 (en) | 2005-03-22 | 2009-06-23 | Symantec Corporation | Detecting shellcode that modifies IAT entries |
JP2006270894A (en) | 2005-03-25 | 2006-10-05 | Fuji Xerox Co Ltd | Gateway unit, terminal device, communications system and program |
US7770151B2 (en) | 2005-04-07 | 2010-08-03 | International Business Machines Corporation | Automatic generation of solution deployment descriptors |
US7349931B2 (en) | 2005-04-14 | 2008-03-25 | Webroot Software, Inc. | System and method for scanning obfuscated files for pestware |
US8590044B2 (en) | 2005-04-14 | 2013-11-19 | International Business Machines Corporation | Selective virus scanning system and method |
US7562385B2 (en) | 2005-04-20 | 2009-07-14 | Fuji Xerox Co., Ltd. | Systems and methods for dynamic authentication using physical keys |
US7603552B1 (en) | 2005-05-04 | 2009-10-13 | Mcafee, Inc. | Piracy prevention using unique module translation |
US7363463B2 (en) | 2005-05-13 | 2008-04-22 | Microsoft Corporation | Method and system for caching address translations from multiple address spaces in virtual machines |
US8001245B2 (en) * | 2005-06-01 | 2011-08-16 | International Business Machines Corporation | System and method for autonomically configurable router |
WO2006137057A2 (en) | 2005-06-21 | 2006-12-28 | Onigma Ltd. | A method and a system for providing comprehensive protection against leakage of sensitive information assets using host based agents, content- meta-data and rules-based policies |
US8839450B2 (en) | 2007-08-02 | 2014-09-16 | Intel Corporation | Secure vault service for software components within an execution environment |
CN101218568A (en) | 2005-07-11 | 2008-07-09 | 微软公司 | Per-user and system granular audit policy implementation |
US7739721B2 (en) | 2005-07-11 | 2010-06-15 | Microsoft Corporation | Per-user and system granular audit policy implementation |
US7856661B1 (en) | 2005-07-14 | 2010-12-21 | Mcafee, Inc. | Classification of software on networked systems |
US7983254B2 (en) * | 2005-07-20 | 2011-07-19 | Verizon Business Global Llc | Method and system for securing real-time media streams in support of interdomain traversal |
US7984493B2 (en) | 2005-07-22 | 2011-07-19 | Alcatel-Lucent | DNS based enforcement for confinement and detection of network malicious activities |
JP2009507271A (en) | 2005-07-29 | 2009-02-19 | ビットナイン・インコーポレーテッド | Network security system and method |
US7895651B2 (en) | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
US7962616B2 (en) | 2005-08-11 | 2011-06-14 | Micro Focus (Us), Inc. | Real-time activity monitoring and reporting |
US8327353B2 (en) | 2005-08-30 | 2012-12-04 | Microsoft Corporation | Hierarchical virtualization with a multi-level virtualization mechanism |
US7340574B2 (en) | 2005-08-30 | 2008-03-04 | Rockwell Automation Technologies, Inc. | Method and apparatus for synchronizing an industrial controller with a redundant controller |
US8166474B1 (en) | 2005-09-19 | 2012-04-24 | Vmware, Inc. | System and methods for implementing network traffic management for virtual and physical machines |
US20070074199A1 (en) | 2005-09-27 | 2007-03-29 | Sebastian Schoenberg | Method and apparatus for delivering microcode updates through virtual machine operations |
EP1770915A1 (en) | 2005-09-29 | 2007-04-04 | Matsushita Electric Industrial Co., Ltd. | Policy control in the evolved system architecture |
US7712132B1 (en) | 2005-10-06 | 2010-05-04 | Ogilvie John W | Detecting surreptitious spyware |
US8131825B2 (en) | 2005-10-07 | 2012-03-06 | Citrix Systems, Inc. | Method and a system for responding locally to requests for file metadata associated with files stored remotely |
US7725737B2 (en) | 2005-10-14 | 2010-05-25 | Check Point Software Technologies, Inc. | System and methodology providing secure workspace environment |
US20070169079A1 (en) | 2005-11-08 | 2007-07-19 | Microsoft Corporation | Software update management |
US7836303B2 (en) | 2005-12-09 | 2010-11-16 | University Of Washington | Web browser operating system |
US7856538B2 (en) | 2005-12-12 | 2010-12-21 | Systex, Inc. | Methods, systems and computer readable medium for detecting memory overflow conditions |
US20070143851A1 (en) | 2005-12-21 | 2007-06-21 | Fiberlink | Method and systems for controlling access to computing resources based on known security vulnerabilities |
US8296437B2 (en) * | 2005-12-29 | 2012-10-23 | Logmein, Inc. | Server-mediated setup and maintenance of peer-to-peer client computer communications |
US20070168861A1 (en) | 2006-01-17 | 2007-07-19 | Bell Denise A | Method for indicating completion status of user initiated and system created tasks |
US20070174429A1 (en) | 2006-01-24 | 2007-07-26 | Citrix Systems, Inc. | Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment |
US7757269B1 (en) | 2006-02-02 | 2010-07-13 | Mcafee, Inc. | Enforcing alignment of approved changes and deployed changes in the software change life-cycle |
WO2007099273A1 (en) | 2006-03-03 | 2007-09-07 | Arm Limited | Monitoring values of signals within an integrated circuit |
JPWO2007100045A1 (en) | 2006-03-03 | 2009-07-23 | 日本電気株式会社 | COMMUNICATION CONTROL DEVICE, COMMUNICATION CONTROL SYSTEM, COMMUNICATION CONTROL METHOD, AND COMMUNICATION CONTROL PROGRAM |
US8621433B2 (en) | 2006-03-20 | 2013-12-31 | Microsoft Corporation | Managing version information for software components |
US7895573B1 (en) | 2006-03-27 | 2011-02-22 | Mcafee, Inc. | Execution environment file inventory |
US7752233B2 (en) | 2006-03-29 | 2010-07-06 | Massachusetts Institute Of Technology | Techniques for clustering a set of objects |
KR20070099201A (en) | 2006-04-03 | 2007-10-09 | 삼성전자주식회사 | Method of security management for mobile wireless device and apparatus for security management using the same |
US7870387B1 (en) | 2006-04-07 | 2011-01-11 | Mcafee, Inc. | Program-based authorization |
US8015563B2 (en) | 2006-04-14 | 2011-09-06 | Microsoft Corporation | Managing virtual machines with system-wide policies |
US7966659B1 (en) | 2006-04-18 | 2011-06-21 | Rockwell Automation Technologies, Inc. | Distributed learn mode for configuring a firewall, security authority, intrusion detection/prevention devices, and the like |
US8352930B1 (en) | 2006-04-24 | 2013-01-08 | Mcafee, Inc. | Software modification by group to minimize breakage |
US8458673B2 (en) | 2006-04-26 | 2013-06-04 | Flexera Software Llc | Computer-implemented method and system for binding digital rights management executable code to a software application |
US7849502B1 (en) | 2006-04-29 | 2010-12-07 | Ironport Systems, Inc. | Apparatus for monitoring network traffic |
US8555404B1 (en) | 2006-05-18 | 2013-10-08 | Mcafee, Inc. | Connectivity-based authorization |
US20080082662A1 (en) | 2006-05-19 | 2008-04-03 | Richard Dandliker | Method and apparatus for controlling access to network resources based on reputation |
US8291409B2 (en) | 2006-05-22 | 2012-10-16 | Microsoft Corporation | Updating virtual machine with patch on host that does not have network access |
US20070276950A1 (en) | 2006-05-26 | 2007-11-29 | Rajesh Dadhia | Firewall For Dynamically Activated Resources |
US7761912B2 (en) | 2006-06-06 | 2010-07-20 | Microsoft Corporation | Reputation driven firewall |
US7809704B2 (en) | 2006-06-15 | 2010-10-05 | Microsoft Corporation | Combining spectral and probabilistic clustering |
US7831997B2 (en) | 2006-06-22 | 2010-11-09 | Intel Corporation | Secure and automatic provisioning of computer systems having embedded network devices |
US8009566B2 (en) | 2006-06-26 | 2011-08-30 | Palo Alto Networks, Inc. | Packet classification in a network security device |
US20070300215A1 (en) | 2006-06-26 | 2007-12-27 | Bardsley Jeffrey S | Methods, systems, and computer program products for obtaining and utilizing a score indicative of an overall performance effect of a software update on a software host |
US8365294B2 (en) | 2006-06-30 | 2013-01-29 | Intel Corporation | Hardware platform authentication and multi-platform validation |
US7950056B1 (en) | 2006-06-30 | 2011-05-24 | Symantec Corporation | Behavior based processing of a new version or variant of a previously characterized program |
US8468526B2 (en) | 2006-06-30 | 2013-06-18 | Intel Corporation | Concurrent thread execution using user-level asynchronous signaling |
US8572721B2 (en) | 2006-08-03 | 2013-10-29 | Citrix Systems, Inc. | Methods and systems for routing packets in a VPN-client-to-VPN-client connection via an SSL/VPN network appliance |
US8495181B2 (en) | 2006-08-03 | 2013-07-23 | Citrix Systems, Inc | Systems and methods for application based interception SSI/VPN traffic |
US8015388B1 (en) | 2006-08-04 | 2011-09-06 | Vmware, Inc. | Bypassing guest page table walk for shadow page table entries not present in guest page table |
US20080059123A1 (en) | 2006-08-29 | 2008-03-06 | Microsoft Corporation | Management of host compliance evaluation |
EP1901192A1 (en) | 2006-09-14 | 2008-03-19 | British Telecommunications Public Limited Company | Mobile application registration |
US8161475B2 (en) | 2006-09-29 | 2012-04-17 | Microsoft Corporation | Automatic load and balancing for virtual machines to meet resource requirements |
US7769731B2 (en) | 2006-10-04 | 2010-08-03 | International Business Machines Corporation | Using file backup software to generate an alert when a file modification policy is violated |
US8584199B1 (en) | 2006-10-17 | 2013-11-12 | A10 Networks, Inc. | System and method to apply a packet routing policy to an application session |
US9697019B1 (en) | 2006-10-17 | 2017-07-04 | Manageiq, Inc. | Adapt a virtual machine to comply with system enforced policies and derive an optimized variant of the adapted virtual machine |
US8055904B1 (en) | 2006-10-19 | 2011-11-08 | United Services Automobile Assocation (USAA) | Systems and methods for software application security management |
US7979749B2 (en) | 2006-11-15 | 2011-07-12 | International Business Machines Corporation | Method and infrastructure for detecting and/or servicing a failing/failed operating system instance |
US7689817B2 (en) | 2006-11-16 | 2010-03-30 | Intel Corporation | Methods and apparatus for defeating malware |
US8091127B2 (en) | 2006-12-11 | 2012-01-03 | International Business Machines Corporation | Heuristic malware detection |
US20080155336A1 (en) | 2006-12-20 | 2008-06-26 | International Business Machines Corporation | Method, system and program product for dynamically identifying components contributing to service degradation |
US8336046B2 (en) | 2006-12-29 | 2012-12-18 | Intel Corporation | Dynamic VM cloning on request from application based on mapping of virtual hardware configuration to the identified physical hardware resources |
US7996836B1 (en) | 2006-12-29 | 2011-08-09 | Symantec Corporation | Using a hypervisor to provide computer security |
US8381209B2 (en) | 2007-01-03 | 2013-02-19 | International Business Machines Corporation | Moveable access control list (ACL) mechanisms for hypervisors and virtual machines and virtual port firewalls |
US8254568B2 (en) | 2007-01-07 | 2012-08-28 | Apple Inc. | Secure booting a computing device |
US9424154B2 (en) | 2007-01-10 | 2016-08-23 | Mcafee, Inc. | Method of and system for computer system state checks |
US8332929B1 (en) | 2007-01-10 | 2012-12-11 | Mcafee, Inc. | Method and apparatus for process enforced configuration management |
US20080178278A1 (en) * | 2007-01-22 | 2008-07-24 | Doron Grinstein | Providing A Generic Gateway For Accessing Protected Resources |
US8380987B2 (en) | 2007-01-25 | 2013-02-19 | Microsoft Corporation | Protection agents and privilege modes |
JP4715774B2 (en) | 2007-03-02 | 2011-07-06 | 日本電気株式会社 | Replication method, replication system, storage device, program |
US8276201B2 (en) | 2007-03-22 | 2012-09-25 | International Business Machines Corporation | Integrity protection in data processing systems |
US20080282080A1 (en) | 2007-05-11 | 2008-11-13 | Nortel Networks Limited | Method and apparatus for adapting a communication network according to information provided by a trusted client |
US20080295173A1 (en) | 2007-05-21 | 2008-11-27 | Tsvetomir Iliev Tsvetanov | Pattern-based network defense mechanism |
US7930327B2 (en) | 2007-05-21 | 2011-04-19 | International Business Machines Corporation | Method and apparatus for obtaining the absolute path name of an open file system object from its file descriptor |
US20080301770A1 (en) | 2007-05-31 | 2008-12-04 | Kinder Nathan G | Identity based virtual machine selector |
US20090007100A1 (en) | 2007-06-28 | 2009-01-01 | Microsoft Corporation | Suspending a Running Operating System to Enable Security Scanning |
US8763115B2 (en) | 2007-08-08 | 2014-06-24 | Vmware, Inc. | Impeding progress of malicious guest software |
CN101370004A (en) * | 2007-08-16 | 2009-02-18 | 华为技术有限公司 | Distribution method and multicast apparatus for multicast conversation security policy |
US20090049172A1 (en) | 2007-08-16 | 2009-02-19 | Robert Miller | Concurrent Node Self-Start in a Peer Cluster |
US8295306B2 (en) * | 2007-08-28 | 2012-10-23 | Cisco Technologies, Inc. | Layer-4 transparent secure transport protocol for end-to-end application protection |
US8332375B2 (en) | 2007-08-29 | 2012-12-11 | Nirvanix, Inc. | Method and system for moving requested files from one storage location to another |
US8250641B2 (en) | 2007-09-17 | 2012-08-21 | Intel Corporation | Method and apparatus for dynamic switching and real time security control on virtualized systems |
US8261265B2 (en) | 2007-10-30 | 2012-09-04 | Vmware, Inc. | Transparent VMM-assisted user-mode execution control transfer |
US8195931B1 (en) | 2007-10-31 | 2012-06-05 | Mcafee, Inc. | Application change control |
JP5238235B2 (en) | 2007-12-07 | 2013-07-17 | 株式会社日立製作所 | Management apparatus and management method |
US8515075B1 (en) | 2008-01-31 | 2013-08-20 | Mcafee, Inc. | Method of and system for malicious software detection using critical address space protection |
US8788805B2 (en) | 2008-02-29 | 2014-07-22 | Cisco Technology, Inc. | Application-level service access to encrypted data streams |
US8336094B2 (en) | 2008-03-27 | 2012-12-18 | Juniper Networks, Inc. | Hierarchical firewalls |
US8321931B2 (en) | 2008-03-31 | 2012-11-27 | Intel Corporation | Method and apparatus for sequential hypervisor invocation |
US8615502B2 (en) | 2008-04-18 | 2013-12-24 | Mcafee, Inc. | Method of and system for reverse mapping vnode pointers |
US8234709B2 (en) | 2008-06-20 | 2012-07-31 | Symantec Operating Corporation | Streaming malware definition updates |
US8352240B2 (en) | 2008-06-20 | 2013-01-08 | Vmware, Inc. | Decoupling dynamic program analysis from execution across heterogeneous systems |
CA2726310C (en) | 2008-08-07 | 2013-10-08 | Serge Nabutovsky | Link exchange system and method |
US8065714B2 (en) | 2008-09-12 | 2011-11-22 | Hytrust, Inc. | Methods and systems for securely managing virtualization platform |
US8726391B1 (en) | 2008-10-10 | 2014-05-13 | Symantec Corporation | Scheduling malware signature updates in relation to threat awareness and environmental safety |
US9141381B2 (en) | 2008-10-27 | 2015-09-22 | Vmware, Inc. | Version control environment for virtual machines |
CN101741820B (en) * | 2008-11-13 | 2013-12-18 | 华为技术有限公司 | Method, system and device for recognizing and determining color graphic adapter (CGA) public key |
JP4770921B2 (en) | 2008-12-01 | 2011-09-14 | 日本電気株式会社 | Gateway server, file management system, file management method and program |
US8544003B1 (en) | 2008-12-11 | 2013-09-24 | Mcafee, Inc. | System and method for managing virtual machine configurations |
US8904520B1 (en) | 2009-03-19 | 2014-12-02 | Symantec Corporation | Communication-based reputation system |
US8387046B1 (en) | 2009-03-26 | 2013-02-26 | Symantec Corporation | Security driver for hypervisors and operating systems of virtualized datacenters |
US8060722B2 (en) | 2009-03-27 | 2011-11-15 | Vmware, Inc. | Hardware assistance for shadow page table coherence with guest page mappings |
US20100299277A1 (en) | 2009-05-19 | 2010-11-25 | Randy Emelo | System and method for creating and enhancing mentoring relationships |
US8205035B2 (en) * | 2009-06-22 | 2012-06-19 | Citrix Systems, Inc. | Systems and methods for integration between application firewall and caching |
US8359422B2 (en) | 2009-06-26 | 2013-01-22 | Vmware, Inc. | System and method to reduce trace faults in software MMU virtualization |
GB2471716A (en) | 2009-07-10 | 2011-01-12 | F Secure Oyj | Anti-virus scan management using intermediate results |
JP2010016834A (en) | 2009-07-16 | 2010-01-21 | Nippon Telegr & Teleph Corp <Ntt> | Filtering method |
US8341627B2 (en) | 2009-08-21 | 2012-12-25 | Mcafee, Inc. | Method and system for providing user space address protection from writable memory area in a virtual environment |
US8381284B2 (en) | 2009-08-21 | 2013-02-19 | Mcafee, Inc. | System and method for enforcing security policies in a virtual environment |
US8572695B2 (en) | 2009-09-08 | 2013-10-29 | Ricoh Co., Ltd | Method for applying a physical seal authorization to documents in electronic workflows |
US8234408B2 (en) | 2009-09-10 | 2012-07-31 | Cloudshield Technologies, Inc. | Differentiating unique systems sharing a common address |
US20110072129A1 (en) * | 2009-09-21 | 2011-03-24 | At&T Intellectual Property I, L.P. | Icmp proxy device |
US9552497B2 (en) | 2009-11-10 | 2017-01-24 | Mcafee, Inc. | System and method for preventing data loss using virtual machine wrapped applications |
US9390263B2 (en) | 2010-03-31 | 2016-07-12 | Sophos Limited | Use of an application controller to monitor and control software file and application environments |
US8875292B1 (en) | 2010-04-05 | 2014-10-28 | Symantec Corporation | Systems and methods for managing malware signatures |
US8813209B2 (en) * | 2010-06-03 | 2014-08-19 | International Business Machines Corporation | Automating network reconfiguration during migrations |
US8925101B2 (en) | 2010-07-28 | 2014-12-30 | Mcafee, Inc. | System and method for local protection against malicious software |
US8938800B2 (en) | 2010-07-28 | 2015-01-20 | Mcafee, Inc. | System and method for network level protection against malicious software |
US8549003B1 (en) | 2010-09-12 | 2013-10-01 | Mcafee, Inc. | System and method for clustering host inventories |
EP2622525A1 (en) | 2010-09-30 | 2013-08-07 | Hewlett-Packard Development Company, L.P. | Virtual machines for virus scanning |
US9075993B2 (en) | 2011-01-24 | 2015-07-07 | Mcafee, Inc. | System and method for selectively grouping and managing program files |
US9112830B2 (en) | 2011-02-23 | 2015-08-18 | Mcafee, Inc. | System and method for interlocking a host and a gateway |
US20130247192A1 (en) | 2011-03-01 | 2013-09-19 | Sven Krasser | System and method for botnet detection by comprehensive email behavioral analysis |
US9552215B2 (en) | 2011-03-08 | 2017-01-24 | Rackspace Us, Inc. | Method and system for transferring a virtual machine |
US9122877B2 (en) | 2011-03-21 | 2015-09-01 | Mcafee, Inc. | System and method for malware and network reputation correlation |
US8776234B2 (en) | 2011-04-20 | 2014-07-08 | Kaspersky Lab, Zao | System and method for dynamic generation of anti-virus databases |
US9594881B2 (en) | 2011-09-09 | 2017-03-14 | Mcafee, Inc. | System and method for passive threat detection using virtual memory inspection |
US8694738B2 (en) | 2011-10-11 | 2014-04-08 | Mcafee, Inc. | System and method for critical address space protection in a hypervisor environment |
US9069586B2 (en) | 2011-10-13 | 2015-06-30 | Mcafee, Inc. | System and method for kernel rootkit protection in a hypervisor environment |
US8973144B2 (en) | 2011-10-13 | 2015-03-03 | Mcafee, Inc. | System and method for kernel rootkit protection in a hypervisor environment |
US8800024B2 (en) | 2011-10-17 | 2014-08-05 | Mcafee, Inc. | System and method for host-initiated firewall discovery in a network environment |
US8713668B2 (en) | 2011-10-17 | 2014-04-29 | Mcafee, Inc. | System and method for redirected firewall discovery in a network environment |
US8713684B2 (en) | 2012-02-24 | 2014-04-29 | Appthority, Inc. | Quantifying the risks of applications for mobile devices |
US8793489B2 (en) | 2012-03-01 | 2014-07-29 | Humanconcepts, Llc | Method and system for controlling data access to organizational data maintained in hierarchical |
US8739272B1 (en) | 2012-04-02 | 2014-05-27 | Mcafee, Inc. | System and method for interlocking a host and a gateway |
US8931043B2 (en) | 2012-04-10 | 2015-01-06 | Mcafee Inc. | System and method for determining and using local reputations of users and hosts to protect information in a network environment |
US9292688B2 (en) | 2012-09-26 | 2016-03-22 | Northrop Grumman Systems Corporation | System and method for automated machine-learning, zero-day malware detection |
US8973146B2 (en) | 2012-12-27 | 2015-03-03 | Mcafee, Inc. | Herd based scan avoidance system in a network environment |
WO2014143000A1 (en) | 2013-03-15 | 2014-09-18 | Mcafee, Inc. | Server-assisted anti-malware |
WO2014142986A1 (en) | 2013-03-15 | 2014-09-18 | Mcafee, Inc. | Server-assisted anti-malware client |
CN105580023B (en) | 2013-10-24 | 2019-08-16 | 迈克菲股份有限公司 | The malicious application of agency's auxiliary in network environment prevents |
-
2011
- 2011-10-17 US US13/275,249 patent/US8713668B2/en active Active
-
2012
- 2012-09-26 EP EP12842144.3A patent/EP2769509B1/en active Active
- 2012-09-26 WO PCT/US2012/057312 patent/WO2013058944A1/en active Application Filing
- 2012-09-26 CN CN201280053580.XA patent/CN103907330B/en active Active
-
2014
- 2014-04-28 US US14/263,164 patent/US9356909B2/en active Active
-
2016
- 2016-05-28 US US15/168,004 patent/US9882876B2/en active Active
-
2017
- 2017-08-24 US US15/686,059 patent/US10652210B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004524598A (en) * | 2000-09-25 | 2004-08-12 | クロスビーム システムズ, インク. | Flow scheduling and architecture for network application devices |
CN1383295A (en) * | 2001-04-25 | 2002-12-04 | 数位联合电信股份有限公司 | Redirectable network access system |
US20090328185A1 (en) * | 2004-11-04 | 2009-12-31 | Eric Van Den Berg | Detecting exploit code in network flows |
US20100188976A1 (en) | 2009-01-26 | 2010-07-29 | Rahman Shahriar I | Dynamic Management of Network Flows |
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9134998B2 (en) | 2006-02-02 | 2015-09-15 | Mcafee, Inc. | Enforcing alignment of approved changes and deployed changes in the software change life-cycle |
US9602515B2 (en) | 2006-02-02 | 2017-03-21 | Mcafee, Inc. | Enforcing alignment of approved changes and deployed changes in the software change life-cycle |
US10360382B2 (en) | 2006-03-27 | 2019-07-23 | Mcafee, Llc | Execution environment file inventory |
US9576142B2 (en) | 2006-03-27 | 2017-02-21 | Mcafee, Inc. | Execution environment file inventory |
US9424154B2 (en) | 2007-01-10 | 2016-08-23 | Mcafee, Inc. | Method of and system for computer system state checks |
US9864868B2 (en) | 2007-01-10 | 2018-01-09 | Mcafee, Llc | Method and apparatus for process enforced configuration management |
US8869265B2 (en) | 2009-08-21 | 2014-10-21 | Mcafee, Inc. | System and method for enforcing security policies in a virtual environment |
US9652607B2 (en) | 2009-08-21 | 2017-05-16 | Mcafee, Inc. | System and method for enforcing security policies in a virtual environment |
US8925101B2 (en) | 2010-07-28 | 2014-12-30 | Mcafee, Inc. | System and method for local protection against malicious software |
US8938800B2 (en) | 2010-07-28 | 2015-01-20 | Mcafee, Inc. | System and method for network level protection against malicious software |
US9832227B2 (en) | 2010-07-28 | 2017-11-28 | Mcafee, Llc | System and method for network level protection against malicious software |
US9467470B2 (en) | 2010-07-28 | 2016-10-11 | Mcafee, Inc. | System and method for local protection against malicious software |
US9112830B2 (en) | 2011-02-23 | 2015-08-18 | Mcafee, Inc. | System and method for interlocking a host and a gateway |
US9866528B2 (en) | 2011-02-23 | 2018-01-09 | Mcafee, Llc | System and method for interlocking a host and a gateway |
US9594881B2 (en) | 2011-09-09 | 2017-03-14 | Mcafee, Inc. | System and method for passive threat detection using virtual memory inspection |
US10652210B2 (en) | 2011-10-17 | 2020-05-12 | Mcafee, Llc | System and method for redirected firewall discovery in a network environment |
US9356909B2 (en) | 2011-10-17 | 2016-05-31 | Mcafee, Inc. | System and method for redirected firewall discovery in a network environment |
US8713668B2 (en) | 2011-10-17 | 2014-04-29 | Mcafee, Inc. | System and method for redirected firewall discovery in a network environment |
US8800024B2 (en) | 2011-10-17 | 2014-08-05 | Mcafee, Inc. | System and method for host-initiated firewall discovery in a network environment |
US9882876B2 (en) | 2011-10-17 | 2018-01-30 | Mcafee, Llc | System and method for redirected firewall discovery in a network environment |
US8739272B1 (en) | 2012-04-02 | 2014-05-27 | Mcafee, Inc. | System and method for interlocking a host and a gateway |
US9413785B2 (en) | 2012-04-02 | 2016-08-09 | Mcafee, Inc. | System and method for interlocking a host and a gateway |
US10171611B2 (en) | 2012-12-27 | 2019-01-01 | Mcafee, Llc | Herd based scan avoidance system in a network environment |
US8973146B2 (en) | 2012-12-27 | 2015-03-03 | Mcafee, Inc. | Herd based scan avoidance system in a network environment |
US10205743B2 (en) | 2013-10-24 | 2019-02-12 | Mcafee, Llc | Agent assisted malicious application blocking in a network environment |
US10645115B2 (en) | 2013-10-24 | 2020-05-05 | Mcafee, Llc | Agent assisted malicious application blocking in a network environment |
US9578052B2 (en) | 2013-10-24 | 2017-02-21 | Mcafee, Inc. | Agent assisted malicious application blocking in a network environment |
US11171984B2 (en) | 2013-10-24 | 2021-11-09 | Mcafee, Llc | Agent assisted malicious application blocking in a network environment |
US9609018B2 (en) | 2014-05-08 | 2017-03-28 | WANSecurity, Inc. | System and methods for reducing impact of malicious activity on operations of a wide area network |
WO2015171864A1 (en) * | 2014-05-08 | 2015-11-12 | WANSecurity, Inc. | System and methods for reducing impact of malicious activity on operations of a wide area network |
Also Published As
Publication number | Publication date |
---|---|
US10652210B2 (en) | 2020-05-12 |
US8713668B2 (en) | 2014-04-29 |
CN103907330A (en) | 2014-07-02 |
US9882876B2 (en) | 2018-01-30 |
EP2769509A1 (en) | 2014-08-27 |
EP2769509A4 (en) | 2015-03-11 |
EP2769509B1 (en) | 2018-08-08 |
US20130097658A1 (en) | 2013-04-18 |
US20170374030A1 (en) | 2017-12-28 |
US9356909B2 (en) | 2016-05-31 |
US20140237584A1 (en) | 2014-08-21 |
US20160352683A1 (en) | 2016-12-01 |
CN103907330B (en) | 2017-06-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10652210B2 (en) | System and method for redirected firewall discovery in a network environment | |
US8800024B2 (en) | System and method for host-initiated firewall discovery in a network environment | |
US12003485B2 (en) | Outbound/inbound lateral traffic punting based on process risk | |
US9866528B2 (en) | System and method for interlocking a host and a gateway | |
US10855656B2 (en) | Fine-grained firewall policy enforcement using session app ID and endpoint process ID correlation | |
Thimmaraju et al. | Outsmarting network security with SDN teleportation | |
CN111295640B (en) | Fine-grained firewall policy enforcement using session App ID and endpoint process ID correlation | |
AU2015255263B2 (en) | System and method for interlocking a host and a gateway | |
Thangavel et al. | Session Hijacking over Cloud Environment: A Literature Survey |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12842144 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012842144 Country of ref document: EP |