Supercharge Your Innovation With Domain-Expert AI Agents!

System and method for estimating an amount of acknowledged application data transmitted by encrypted transport

a technology of encrypted transport and acknowledged application data, applied in the field of network monitoring, can solve the problems of inaccessible information and inability to decryption

Active Publication Date: 2018-11-08
NETSCOUT SYSTEMS
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when network traffic is transported using an encrypted transport protocol, without decryption of the packet headers, such information is inaccessible.
In many scenarios, decryption is not an option.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for estimating an amount of acknowledged application data transmitted by encrypted transport
  • System and method for estimating an amount of acknowledged application data transmitted by encrypted transport
  • System and method for estimating an amount of acknowledged application data transmitted by encrypted transport

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014]Reference will now be made to the drawings wherein like reference numerals identify similar structural features or aspects of the subject disclosure. For purposes of explanation and illustration, and not limitation, a block diagram of an exemplary embodiment of a network analytics system in accordance with the disclosure is shown in FIG. 1 and is designated generally by reference character 100. Other embodiments of the network analytics system 100 in accordance with the disclosure, or aspects thereof, are provided in FIGS. 2-11, as will be described.

[0015]Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs. Although any methods and materials similar or equivalent to those described herein can also be used in the practice or testing of the present disclosure, exemplary methods and materials are now described.

[0016]It must be noted that as used h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and computer-implemented method to process bidirectional network traffic having encrypted application data and using an encrypted transport protocol. The method includes estimating a size of encrypted application data in respective packets of the bidirectional network traffic, wherein the packets of the bidirectional network traffic are transported in opposing directions. The method further includes assigning timing criteria to respective application packets transported in the opposing directions that were determined to include a threshold amount of encrypted application data, the timing criteria being based on a time of observation at an observation point of the corresponding application packet, and acknowledging, for respective packets of the application packets, selected application packets that were selected based on the timing criteria assigned to the respective application packets. The method further includes estimating an amount of encrypted application data transported in at least one of the opposing directions based on a sum of the estimated size of the encrypted application data in the respective acknowledged packets transported in the at least one of the opposing directions that were observed during a selected time interval.

Description

FIELD OF THE INVENTION[0001]The present technology relates to network monitoring and, more particularly, methods and systems to estimate an amount f acknowledged application data s by an encrypted transport protocol.BACKGROUND OF THE INVENTION[0002]Network analysis systems analyze data about the amount of application data that has been acknowledged by end points in a network flow. When network traffic is transported using an unencrypted transport protocol, such as transmission control protocol (TCP), information in the packet headers can indicate the amount of application data that has been acknowledged by the end points. For example, information stored in the SEQ and ACK packet headers can provide such information. However, when network traffic is transported using an encrypted transport protocol, without decryption of the packet headers, such information is inaccessible. In many scenarios, decryption is not an option.[0003]Such conventional methods and systems have generally been ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L12/26
CPCH04L43/0894H04L43/12H04L43/08
Inventor KORHONEN, MARK
Owner NETSCOUT SYSTEMS
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More