Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

31 results about "Packet injection" patented technology

Packet injection (also known as forging packets or spoofing packets) in computer networking, is the process of interfering with an established network connection by means of constructing packets to appear as if they are part of the normal communication stream. The packet injection process allows an unknown third party to disrupt or intercept packets from the consenting parties that are communicating, which can lead to degradation or blockage of users' ability to utilize certain network services or protocols. Packet injection is commonly used in man-in-the-middle attacks and denial-of-service attacks.

Method and apparatus for analyzing one or more firewalls

A method and apparatus are disclosed for analyzing the operation of one or more network gateways, such as firewalls or routers, that perform a packet filtering function in a network environment. Given a user query, the disclosed firewall analysis tool simulates the behavior of the various firewalls, taking into account the topology of the network environment, and determines which portions of the services or machines specified in the original query would manage to reach from the source to the destination. The relevant packet-filtering configuration files are collected and an internal representation of the implied security policy is derived. A graph data structure is used to represent the network topology. A gateway-zone graph permits the firewall analysis tool to determine where given packets will travel in the network, and which gateways will be encountered along those paths. In this manner, the firewall analysis tool can evaluate a query object against each rule-base object, for each gateway node in the gateway-zone graph that is encountered along each path between the source and destination. A graphical user interface is provided for receiving queries, such as whether one or more given services are permitted between one or more given machines, and providing results. A spoofing attack can be simulated by allowing the user to specify where packets are to be injected into the network, which may not be the true location of the source host-group.
Owner:ALCATEL-LUCENT USA INC

Cloud network, measurement system, method and device for cloud network, and storage medium

The embodiment of the invention provides a cloud network, a measurement system and method for the cloud network, equipment and a storage medium. In the embodiment of the invention, aiming at a cloud network, a measurement intention of a tenant in the cloud network is automatically sensed, a measurement rule is generated according to the measurement intention, and a measurement request message is injected into network element equipment on a to-be-measured path by adopting a bypass packet injection mode based on the measurement rule; network quality analysis is carried out by means of the measurement record information generated when the measurement request message passes through different network element devices, and the network quality of the cloud network can be simply, effectively and accurately measured. Furthermore, the measurement process can be greatly simplified through intention of the measurement request of the tenant; through a bypass packet injection mode, the intrusion to the network environment of the tenant is reduced; and meanwhile, an active packet injection mode is adopted, so that the dependence on the actual application traffic of the tenant can be avoided, and the network quality can be measured even if the tenant does not generate the actual application traffic.
Owner:ALIBABA CLOUD COMPUTING LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products