发明名称 |
Applying fine-grain policy action to encapsulated network attacks |
摘要 |
An intrusion detection system inspects encapsulated packet flows and, upon detecting a malicious encapsulated packet flow, may close an encapsulated network session corresponding to the malicious flow or drop sub-packets of the malicious flow without acting against non-malicious sub-packets and/or sessions. In one example, a network device includes a flow analysis module that receives a packet flow packets, each packet comprising a packet header and one or more sub-packets each corresponding to respective network sessions, an attack detection module that identifies at least one of the network sessions as a malicious network session, a policy action module that executes a policy action on the sub-packet corresponding to the malicious network session based on the identification of the malicious network session, and a forwarding component that forms a reconstructed packet comprising the packet header and the sub-packets excluding the sub-packet corresponding to the malicious network session and forwards the reconstructed packet. |
申请公布号 |
US9398043(B1) |
申请公布日期 |
2016.07.19 |
申请号 |
US200912409634 |
申请日期 |
2009.03.24 |
申请人 |
Juniper Networks, Inc. |
发明人 |
Yang Siying |
分类号 |
H04L29/06 |
主分类号 |
H04L29/06 |
代理机构 |
Shumaker & Sieffert, P.A. |
代理人 |
Shumaker & Sieffert, P.A. |
主权项 |
1. A method comprising:
receiving, with an intrusion prevention device, a packet of a packet flow, the packet comprising a packet header and a plurality of sub-packets encapsulated within a payload of the packet, each of the plurality of sub-packets corresponding to respective encapsulated network sessions, wherein the intrusion prevention device is positioned between a source of the packet and a destination for the packet; analyzing, with the intrusion prevention device, each of the plurality of sub-packets encapsulated within the packet; identifying, with the intrusion prevention device, one of the encapsulated network sessions as a malicious encapsulated network session based on the analysis of the plurality of sub-packets; executing, with the intrusion prevention device, a targeted policy action on the one of the sub-packets corresponding to the malicious encapsulated network session based on the identification of the encapsulated network session as a malicious encapsulated network session; forming, with the intrusion prevention device, a reconstructed packet comprising the packet header and the plurality of sub-packets excluding at least the sub-packet corresponding to the malicious encapsulated network session; and forwarding the reconstructed packet with the intrusion prevention device. |
地址 |
Sunnyvale CA US |