主权项 |
1. A method for detecting, in a front-end computer, a threat against a host computer coupled to the front-end computer, the method comprising the front-end computer:
establishing a communication connection between the host computer and a source computer with a handshake procedure through a front-end computer, receiving, in the front-end computer, application data in a data packet from the source computer in response to a successful handshake procedure, the received data is intended to the host computer, acknowledging the receipt of the data packet by the front-end computer, returning the received application data from the front-end computer to the source computer, the received application data being extracted from the received data packet and returned in a new data packet, to the source computer, monitoring, in the front-end computer, when a predetermined message is received from the source computer in response to the return of the received application data to the source computer, and when the predetermined message from the source computer is received in the front-end computer, determining the source computer as a trusted communication party, when the predetermined message from the source computer is not received in the front-end computer, determining the source computer as a threat. |