The subject matter described herein relates to passive monitoring of network traffic communications. More specifically, the subject matter relates to methods, systems, and computer readable media for monitoring encrypted network traffic flows.
At present, encrypted secure sockets layer (SSL) traffic constitutes a significant amount of the total network traffic communicated over packet networks. Notably, monitoring and processing SSL traffic are computationally expensive tasks that place a large burden on a network's resources. Many network visibility tools actively handle SSL traffic (e.g., SSL records communicated via packets) by acting as a man-in-the-middle (MITM) entity, thereby decrypting and re-encrypting received SSL traffic while extracting a clear-text copy for use by associated network monitoring tools. In a typical SSL proxy architecture, a client device is configured to negotiate an encrypted connection for a secure session (e.g., SSL session) between itself and an SSL proxy. Likewise, the SSL proxy and a destination server subsequently negotiate a second encrypted connection in order to conduct a secure session between the two servers. More specifically, active SSL inspection methods commonly used today involve terminating the SSL connection at a MITM point, decrypting the encrypted traffic data, creating a copy of clear text data to be sent to the out-of-band analysis tool(s), and then re-encrypting the connection prior to sending the encrypted network traffic to its intended destination server. Since the SSL proxy must decrypt and re-encrypt all network traffic (e.g., record traffic and/or packet traffic) before the traffic can be forwarded to the intended recipient, this technique (sometimes referred to as active SSL inspection or full SSL inspection) can introduce severe performance bottlenecks on the processing of live network traffic.
Accordingly, a need exists for methods, systems, and computer readable media for monitoring encrypted network traffic flows.
Methods, systems, and computer readable for media monitoring encrypted network traffic flows are disclosed. According to one method executed at an encryption aware visibility (EAV) device, the method includes receiving copies of encrypted network traffic flow records belonging to at least one communication session involving a monitored application and obtaining, from a secure session management (SSM) server, session decryption information (SDI) via a secure backchannel interface connection, wherein the session decryption information includes cryptographic keys generated by the SSM server to establish the at least one communication session. The method further includes using the cryptographic keys to decrypt the copies of encrypted network traffic flow records to produce decrypted network traffic flow records.
The subject matter described herein may be implemented in software in combination with hardware and/or firmware. For example, the subject matter described herein may be implemented in software executed by a processor. In one exemplary implementation, the subject matter described herein may be implemented using a non-transitory computer readable medium having stored therein computer executable instructions that when executed by the processor of a computer control the computer to perform steps. Exemplary non-transitory computer readable media suitable for implementing the subject matter described herein include non-transitory devices, such as disk memory devices, chip memory devices, programmable logic devices, field-programmable gate arrays, and application specific integrated circuits. In addition, a computer readable medium that implements the subject matter described herein may be located on a single device or computing platform or may be distributed across multiple devices or computing platforms.
As used herein, the term ‘node’ refers to a physical computing platform including one or more processors, network interfaces, and memory.
As used herein, each of the terms ‘function’, ‘engine’, and ‘module’ refers to hardware, which may also include software and/or firmware, for implementing the feature(s) being described.
As used herein, the term “packet” refers to a network packet or any formatted unit of data capable of being transmitted in a computer network, such as protocol data unit, a frame, a datagram, a user datagram protocol packet, a transport control protocol packet, an SSL record, or the like.
The subject matter described herein will now be explained with reference to the accompanying drawings of which:
The subject matter described herein relates to methods, systems, and computer readable media for monitoring encrypted network traffic flows. In some embodiments, the disclosed subject matter includes an encryption-aware visibility (EAV) device (e.g., an SSL-aware network packet broker device) that is configured to communicate with a secure session management (SSM) server via a secure backchannel interface connection. Notably, the backchannel interface connection may be used by the EAV device to directly obtain cryptographic key information associated with one or more particular SSL sessions that are being monitored by the EAV device. In some embodiments, the backchannel interface connection may comprise a secure communications connection (e.g., an IPsec tunnel or SSL session) that is established between the EAV device and the secure session management server. Per-session cryptographic key information (e.g., public and private key information) obtained via the backchannel interface connection may be referred to herein as session decryption information (SDI) and may include at least private and public cryptographic key pair information that is associated with a monitored session. In some embodiments, the disclosed subject matter may utilize a per-session key sharing backchannel interface connection that is facilitated using a “push mechanism” (e.g., a Hypertext Transport Protocol (HTTP) push) that is executed by the SSM server (e.g., a secure SSL key server). Namely, the SSM server may be configured to automatically send the session decryption information associated with a monitored application or monitored resource to a designated and/or subscribed EAV device. In other embodiments, a query and response mechanism is utilized by the EAV device to solicit the aforementioned session decryption information using query request messages directed to the SSM server. Moreover, embodiments of the disclosed subject matter illustrate exemplary deployments in the context of a forward secrecy architecture that involves the use of SSL. It will be appreciated that other embodiments of the disclosed subject matter can also be deployed in a generally similar manner to provide the monitoring functionality in an Internet protocol security (IPsec) based encryption environment.
In some instances the disclosed subject matter describes the encryption of packets and the decryption of packets as part of the monitoring of network traffic flows. Although the disclosed subject matter pertains largely to the encryption and decryption of SSL-based ‘records’ (which may be communicated via one or more packets), it is understood by persons skilled in the art of SSL communications that any description below regarding the encryption and decryption of packets corresponding to a monitored network traffic flow may also include the encryption and decryption of SSL-based records. In some embodiments, a record is a logical portioning that is present at SSL level (above layer 4) and may span multiple packets (i.e., be included in part via multiple packets).
Reference will now be made in detail to various embodiments of the subject matter described herein, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts.
Network environment 100 may also include a secure session management (SSM) server 106 that operates as an application server hosting a monitored application 114. SSM server 106 may be configured to establish SSL sessions with client device 102 in response to receiving secure session requests (from client application 112). In some embodiments, SSM server 106 can be configured for creating, distributing, and storing session decryption information (e.g., ephemeral cryptographic security keys and associated session identification information) for communication sessions traversing a monitored network environment. For example, secure session management server 106 may establish and utilize a secure backchannel interface connection 120 to communicate the session decryption information to EAV device 105. In some embodiments, secure session management server 106 is responsible for generating the cryptographic public and private key pairs for a monitored application server that is establishing an SSL session with a requesting client (e.g., SSM server 106 providing SSL support requested by a monitored application and/or application server as shown in
In some embodiments, client application 112 may initiate an SSL session with monitored application 114. In such a scenario, session decryption information (e.g., public and private key pair data) may be generated and stored by SSM server 106. In some embodiments, the session decryption information may include elliptic curve Diffie-Hellman ephemeral (ECDHE) cryptographic security keys (e.g., public and private key pair data). Further, SSM server 106 may maintain a key store (not shown in
In some embodiments, EAV device 105 may be configured to permit encrypted network traffic flows 110 communicated between client device 102 and secure session management server 106 (or a monitored application server) to pass through EAV device 105. EAV device 105 may be configured to inspect network traffic flows communicated over sessions that have been designated for monitoring. After identifying an encrypted packet or record associated with a network traffic flow designated for monitoring, EAV device 105 is configured to create a copy of the packet or record and forward the original received packet or record to its intended destination. In some embodiments, EAV device 105 may be alternatively connected to one or more network tap elements or probes (not shown) that are configured to identify and copy packets/records of monitored network traffic flows. Such copies of the network traffic flows are then forwarded to EAV device 105 by the monitoring taps/probes (see
As indicated above, EAV device 105 is further configured to establish a secure backchannel interface connection 120 with secure session management server 106. In some embodiments, backchannel interface connection 120 is established as a separate and dedicated SSL session or an IPsec tunnel between EAV device 105 and secure session management server 106. In some examples, backchannel interface connection 120 may be established and initiated by SSM server 106. SSM server 106 can be provided with the EAV's IP address, port address, and MAC address (as well as a certificate). Based on the address data received, SSM server 106 can establish a backchannel interface connection 120 with EAV device 105 through proper authentication and verification. Such a measure also ensures SSM server 106 is not monitoring or listening to any port where SSM server 106 is providing secured information. In another embodiment, backchannel interface connection 120 may instead be initiated and established by EAV device 105. For example, SSM server 106 monitors and/or listens to a secured port from which server 106 expects communications from EAV device 105. The certificate and authorization needed to securely communicate with SSM server 106 is initially configured in, and subsequently provided by, EAV device 105. In both the examples presented above, SSM server 106 utilizes Hypertext Transport Protocol Secure (HTTPS) along with certificate validations during the establishing of backchannel interface connection 120. In some examples, SSM server 106 may optionally, and/or additionally, implement two-factor authentication based on Open Web Application Security Project (OWASP) and SANS standards for the purposes of guarding against any man-in-the-middle attacks. Further, backchannel interface connection 120 may be established on-premises inside a demilitarized zone (DMZ) to ensure that none of the SDI traverses/flows outside of the network. Similarly, network address translation (NAT) functionality of backchannel interface connection 120 may be prevented by one or more of EAV 105 and SSM server 106.
Once established, backchannel interface connection 120 may be used by EAV device 105 to receive session decryption information (e.g., public and private cryptographic key pair information) for a session originally requested by client device 102. In some embodiments, secure session management server 106 may be configured to initiate the distribution of the session decryption information by automatically “pushing” the session decryption information (e.g., private and public cryptographic key information and session identification information) to one or more subscribed/designated EAV devices 105 at or near the time when the public and private cryptographic key pairs are created (see
In other embodiments, EAV device 105 can use a query/response mechanism to obtain session decryption information (e.g., a public and private key pair) from secure session management server 106 via backchannel interface connection 120 (see
For example, EAV 105 may already possess the session information for any particular session since EAV 105 has access to all the network traffic provided via network monitoring taps (e.g., taps 203-204 depicted in
In some embodiments, after receiving the query request message, SSM server 106 accesses a key store (not shown) using the received public key value to identify the appropriate stored session decryption information (e.g., by locating a matching public key value and corresponding private key value in the key store). SSM server 106 subsequently provides the requested session decryption information (e.g., cryptographic key pair) to the EAV device 105 via secure backchannel interface connection 120. In some embodiments, secure session management server 106 is configured to use an EAV device identifier contained in the received request message to cross-reference the authorization list to determine whether a response message is to be sent to EAV device 105. Notably, if the EAV device identifier (which was included in the original request message from the EAV device) matches an identifier listed in the authorization list, secure session management server 106 may be configured to query the key store and/or send a response message containing the requested session decryption information to the requesting EAV device (e.g., EAV device 105).
After EAV device 105 receives the session decryption information from secure session management server 106 via backchannel interface connection 120, EAV device 105 may decrypt the copied packets and/or records of the encrypted traffic flow(s) 110. In other embodiments, EAV device 105 may receive a copy of encrypted traffic flow(s) 110 from monitoring tap elements or monitoring probe elements if EAV device 105 does not directly receive or handle encrypted traffic flow(s) 110 communicated between client device 102 and SSM server 106. In either scenario, EAV device 105 is configured to decrypt the copies of the obtained encrypted records using the session decryption information received from SSM server 106.
Afterwards, EAV device 105 may then inspect the network traffic flow records and/or packets decrypted with the session decryption information (i.e., private key value) and perform NPB functions (e.g., filtering, sampling, de-duplication, and/or data masking) on the decrypted network traffic flow records and/or packets. For example, after the encrypted network traffic flow packets and/or records are decrypted by EAV device 105 using the obtained session decryption information, the decrypted packets/records are subsequently processed by one or more packet broker filtering rules and/or sampling rules provisioned in EAV device 105. In particular, the rules are used by EAV device 105 to determine which packets and/or records are to be forwarded to one or more out-of-band network tools 108 (e.g., via NPB tool ports). EAV device 105 may also apply processing operations that modify the packets or the associated packet flow (e.g., replication, de-duplication, data masking, etc.) prior to forwarding packets to the appropriate out-of-band network tools 108 (e.g., via NPB tool ports). NPB functions performed by EAV device 105 are conducted at a greater throughput rate as compared to a MITM network element that implements active SSL decrypt/encrypt inspection. After assessing and determining the proper network tool destinations, EAV device 105 forwards the decrypted session records and/or flow metadata accordingly.
It will be appreciated that
In some embodiments, SSM server 206 include a cryptographic key store manager 212 (e.g., SSL key store) and a secure session engine 211. In some embodiments, key store manager 212 may be hosted by a separate SSL key server (not shown) that is distinct from SSM server 206. In such scenarios, the SSM server and the key server may communicate via an implementation dependent application programming interface (API).
SSM server 206 may be configured to create, distribute, and store session-specific cryptographic key pairs that can be used to encrypt and decrypt SSL records and/or packets associated with a monitored SSL session between monitored client 202 and monitored application 210. In some embodiments, SSM server 206 (and/or secure session engine 211) may receive a session initiation request directed to monitored application 210 from client 202 and be configured to establish an SSL session with client 202 to securely communicate data (e.g., data provided by monitored application 210) via records or packets. In such a scenario, secure session engine 211 hosted by SSM server 206 may be configured to generate a public and private cryptographic key pair for use in its SSL session initiation handshake with monitored client 202. Secure session engine 211 may subsequently provide and/or store the generated cryptographic keys with key store manager 212.
Key store manager 212 may be configured to manage and store the cryptographic keys in a local key store. For example, key store manager 212 of SSM server 206 may be configured to store session decryption information that includes an identifier that identifies the session (e.g., a session identifier, session identifier tuple, etc.) and a public key value to be used for establishing a secure session between client 202 and monitored application 210. Session decryption information also include a private key value corresponding to monitored application 210 that is used by SSM server 206 to establish a secure session with monitored client 202. Key store manager 212 is further configured to provide the session decryption information upon request to EAV device 205. For example, key store manager 212 may be configured to “push” the session decryption information to EAV device 205. Further, SSM server 206 and/or key store manager 212 may be adapted to maintain a list of authorized encryption aware EAV devices or system nodes that are associated with a monitoring system. In some embodiments, SSM server 206 and/or key store manager 212 may configured to automatically push both private and public session key and session identification information to one or more subscribed EAV devices at or near the time of creation of the cryptographic key pairs. In instances where SSM server 206 is also the monitored application server (e.g., the same server as depicted in
In some embodiments, SSM server 206 maintains session identifier data that identifies, or can be used to identify, a communications session between the monitored client 202 and monitored application 210, as well as the public and private cryptographic keys associated with that monitored session. Further, secure session engine 211 of SSM server 206 may be configured to maintain a listing of EAV devices that are configured to monitor at least one particular session and provide the session decryption information to the appropriate EAV devices at the time the cryptographic keys are generated by SSM server 206.
As shown in
In some embodiments, each of monitored client 202, tap elements 203 and 204, monitored application 210, SSM server 206, secure session engine 211, and key store manager 212 may be virtualized elements (e.g., virtual instances or virtual machines) in a cloud-based and/or virtualized environment. For example, each of tap elements 203 and 204 may comprise a virtual instance of a software-based monitoring agent application that is used to observe and generate copies of records and/or packets associated with a monitored session. In some examples, the records and/or packets are encrypted for communication between monitored client 202 and monitored application 210 using ECDHE, or some other per-session public/private key encryption technique.
Further, each of monitoring tap elements 203 and 204 may be deployed as virtualized elements in separate cloud computing virtual environments (e.g., network environment 200 may employ network virtualization and/or cloud computing), so as to be embodied by one or more virtual machines or virtual computing clusters. In some embodiments, a virtual monitoring tap agent may be deployed in tandem with a virtual application server that is to be monitored, such that the virtual monitoring tap is capable of observing and passively creating copies of monitored network traffic flow records or packets associated with a secure communication session between monitored client 202 and monitored application 210. The copied monitored network traffic flow records and/or packets retain their original encryption and are forwarded to a virtualized EAV device 205.
As shown in
In some embodiments, SSM server 206 is configured to automatically push the session decryption information to EAV device 205 at the time that the session decryption information is created by SSM server 206. EAV device 205 is configured to store the session decryption information received from SSM server 206 (and/or key store manager 212) via backchannel interface connection 220 in SDI store 216. EAV device 205 may then subsequently use the stored session decryption information to decrypt copies of monitored network traffic flow records (and/or packets) associated with the session, wherein the record copies are provided by the deployed tap elements 203 and 204 (or monitoring probes). In this manner, EAV device 205 is configured to monitor, decrypt and inspect secure session traffic flow records in monitored network environment 200, while avoiding the processing bottleneck(s) associated with prior active SSL monitoring/decryption approaches.
After receiving and decrypting the network traffic flows, EAV device 205 may be configured to accessing a rules module 214, which may contain a number of filtering and sampling rules for processing the decrypted packets and/or records. For example, EAV device may access rules module 214 to perform NPB functions that include tasks such as filtering, sampling, de-duplication, data masking, and the like at a much higher throughput rate than an EAV device that implements active SSL decryption and/or encryption inspection. EAV device 205 may also forward the processed packets to an appropriate network tool (e.g., network tools 208-209) or network tool port.
In some embodiments, secure session engine 211 also checks an authorization list for an EAV device identifier to determine whether an SDI check and/or response message is sent back to EAV device 105. For example, if an EAV device identifier (which was included in the original query message sent by EAV device 105) matches an identifier listed in the authorization list, secure session engine 211 may be configured to query the key store manager and/or send a response message containing the requested session decryption information to the requesting EAV device (e.g., EAV device 105).
Secure session engine 211 subsequently forwards the public key value (or other session identifier) to key store manager 212. Notably, key store manager 212 may use the public key value to locate associated session decryption information, which includes the corresponding private key value. For example, key store manager 212 may search key pair entries in the local key store using the public key value received in the query message to find a matching public key value and its corresponding private key value. This session decryption information is then obtained by key store manager 212 and subsequently provided to EAV device 205. In some embodiments, key store manager 212 and/or SSM server 206 may generate and send a response message that includes the session decryption information requested by EAV device 205. For example, key store manager 212 sends the response message containing the session decryption information to EAV device 205 via the backchannel interface connection 420. Although
After receiving the response message, EAV device 205 is configured to store the session decryption information received from SSM server 206 and to subsequently use this session decryption information to decrypt copies of monitored network traffic flow records (and/or packets) associated with the monitored session. Notably, the record copies are provided to EAV device 205 by the deployed tap elements 203 and 204 (e.g., monitoring probes). As such, EAV device 205 is configured to monitor, decrypt and inspect secure session traffic flow records in real-time in monitored network environment 200, while avoiding the processing bottleneck(s) associated with prior active SSL monitoring/decryption approaches. After decrypting the packets using the session decryption information, EAV device 205 utilizes the session decryption information in a similar fashion as described above in
In step 602, copies of encrypted network traffic flows belonging to at least one communication session (e.g., involving a monitored application) are received. In some embodiments, one or more tap elements or probes is responsible for providing encrypted packet data to an EAV device.
In step 604, session decryption information is obtained from a secure session management server. In some embodiments, an EAV device obtains session decryption information from an SSM server via a secure backchannel interface connection. Notably, the session decryption information includes a cryptographic key pair (e.g., public and private keys) generated by the SSM server for establishing the at least one communication session (e.g., for a session involving the monitored application). In one example, the session decryption information is automatically pushed across the secure backchannel interface connection by the SSM server to an EAV device, which is previously designated (e.g., subscribed) to receive session decryption information for particular session. The session may be designated by the session identifier, such as an SSL-based public key value. In another embodiment, the session decryption information obtained from the secure session management server via the secure backchannel interface connection is received by the EAV device in response to a query message sent by the EAV device to the SSM server.
In step 606, the copies of the encrypted network traffic flows are decrypted using the cryptographic keys to produce decrypted network traffic flows. In some embodiments, the EAV device is configured to use the session decryption information obtained in step 604 to properly identify and decrypt encrypted network traffic flows corresponding to a monitored session.
In addition, the decrypted network traffic flows may be sent to a packet analyzer. For example, the EAV device may be configured to send the decrypted network traffic flows to one or more packet analyzers or out-of-band monitoring tools. In some embodiments, the packet analyzer is a virtual entity residing completely within the virtual environment. In other embodiments, the package analyzer may be a hardware-based packet analyzer that is configured to receive unencrypted network traffic flows from a communicatively connected virtual tap element.
It will be appreciated that process 600 is for illustrative purposes and that different and/or additional actions may be used. It will also be appreciated that various actions described herein may occur in a different order or sequence.
It should be noted that each of the EAV device, the SSM server, and/or functionality described herein may constitute a special purpose computing device. Further, the EAV device, the SSM server, and/or functionality described herein can improve the technological field of monitoring encrypted network traffic flows involving monitored devices and applications by implementing a passive inspection mechanism. For example, an EAV device may be provided with public and private keys associated with a particular monitored session via direct and secure backchannel interface connection. Notably, the EAV device does not need to decrypt and re-encrypt network traffic communicated involving a monitored device/application. As such, the session-aware EAV device can inspect and perform NPB functions, such as filtering, sampling, de-duplication and data masking at a much higher throughput rate than a device that implements active SSL decryption.
It will be understood that various details of the subject matter described herein may be changed without departing from the scope of the subject matter described herein. Furthermore, the foregoing description is for the purpose of illustration only, and not for the purpose of limitation, as the subject matter described herein is defined by the claims as set forth hereinafter.
This application claims the benefit of U.S. Provisional Patent Application No. 62/550,558, filed Aug. 25, 2017, the disclosure of which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
5557678 | Ganesan | Sep 1996 | A |
6330671 | Aziz | Dec 2001 | B1 |
6480488 | Huang | Nov 2002 | B1 |
6684331 | Srivastava | Jan 2004 | B1 |
7340744 | Chandwadkar et al. | Mar 2008 | B2 |
7363353 | Ganesan et al. | Apr 2008 | B2 |
7373412 | Colas et al. | May 2008 | B2 |
7421506 | Ni et al. | Sep 2008 | B2 |
7562213 | Timms | Jul 2009 | B1 |
7634650 | Shah et al. | Dec 2009 | B1 |
7778194 | Yung | Aug 2010 | B1 |
7971240 | Guo et al. | Jun 2011 | B2 |
8270942 | Zabawskyj et al. | Sep 2012 | B2 |
8457126 | Breslin et al. | Jun 2013 | B2 |
8514756 | Ramachandra et al. | Aug 2013 | B1 |
8566247 | Nagel et al. | Oct 2013 | B1 |
8595835 | Kolton et al. | Nov 2013 | B2 |
8601152 | Chou | Dec 2013 | B1 |
8654974 | Anderson et al. | Feb 2014 | B2 |
8788805 | Herne et al. | Jul 2014 | B2 |
8881282 | Aziz et al. | Nov 2014 | B1 |
8929356 | Pandey et al. | Jan 2015 | B2 |
8938611 | Zhu et al. | Jan 2015 | B1 |
8953439 | Lin et al. | Feb 2015 | B1 |
9065642 | Zaverucha et al. | Jun 2015 | B2 |
9298560 | Janakiraman et al. | Mar 2016 | B2 |
9380002 | Johansson et al. | Jun 2016 | B2 |
9392010 | Friedman et al. | Jul 2016 | B2 |
9407643 | Bavington | Aug 2016 | B1 |
9565202 | Kindlund et al. | Feb 2017 | B1 |
9660913 | Newton | May 2017 | B2 |
9673984 | Jiang et al. | Jun 2017 | B2 |
9680869 | Buruganahalli et al. | Jun 2017 | B2 |
9800560 | Guo et al. | Oct 2017 | B1 |
9807121 | Levy | Oct 2017 | B1 |
9882929 | Ettema et al. | Jan 2018 | B1 |
9893883 | Chaubey et al. | Feb 2018 | B1 |
9906401 | Rao | Feb 2018 | B1 |
10063591 | Jiang et al. | Aug 2018 | B1 |
10079810 | Moore et al. | Sep 2018 | B1 |
10079843 | Friedman et al. | Sep 2018 | B2 |
10291651 | Chaubey | May 2019 | B1 |
10326741 | Rothstein et al. | Jun 2019 | B2 |
10404597 | Bakshi | Sep 2019 | B2 |
10419965 | Kadosh et al. | Sep 2019 | B1 |
10482239 | Liu et al. | Nov 2019 | B1 |
10516532 | Taub et al. | Dec 2019 | B2 |
20020116485 | Black et al. | Aug 2002 | A1 |
20030004688 | Gupta et al. | Jan 2003 | A1 |
20030161335 | Fransdonk | Aug 2003 | A1 |
20030163684 | Fransdonk | Aug 2003 | A1 |
20030165241 | Fransdonk | Sep 2003 | A1 |
20040083362 | Park et al. | Apr 2004 | A1 |
20040168050 | Desrochers et al. | Aug 2004 | A1 |
20040268148 | Karjala | Dec 2004 | A1 |
20050050362 | Peles | Mar 2005 | A1 |
20050111437 | Maturi | May 2005 | A1 |
20050160269 | Akimoto | Jul 2005 | A1 |
20060085862 | Witt et al. | Apr 2006 | A1 |
20060259579 | Beverly | Nov 2006 | A1 |
20070022284 | Vishwanathan | Jan 2007 | A1 |
20070033408 | Morten | Feb 2007 | A1 |
20070043940 | Gustave | Feb 2007 | A1 |
20070078929 | Beverly | Apr 2007 | A1 |
20070169190 | Kolton et al. | Jul 2007 | A1 |
20080005782 | Aziz | Jan 2008 | A1 |
20080031141 | Lean et al. | Feb 2008 | A1 |
20080320297 | Sabo et al. | Dec 2008 | A1 |
20090150521 | Tripathi | Jun 2009 | A1 |
20090150527 | Tripathi et al. | Jun 2009 | A1 |
20090150883 | Tripathi et al. | Jun 2009 | A1 |
20090220080 | Herne et al. | Sep 2009 | A1 |
20090222567 | Tripathi et al. | Sep 2009 | A1 |
20090254990 | McGee | Oct 2009 | A1 |
20100250769 | Barreto et al. | Sep 2010 | A1 |
20110231659 | Sinha | Sep 2011 | A1 |
20110286461 | Ichino et al. | Nov 2011 | A1 |
20110289311 | Roy-Chowdhury et al. | Nov 2011 | A1 |
20120082073 | Andreasen et al. | Apr 2012 | A1 |
20120137289 | Nolterieke et al. | May 2012 | A1 |
20120210318 | Sanghvi et al. | Aug 2012 | A1 |
20120236823 | Kompella et al. | Sep 2012 | A1 |
20120304244 | Xie et al. | Nov 2012 | A1 |
20130054761 | Kempf et al. | Feb 2013 | A1 |
20130117847 | Friedman et al. | May 2013 | A1 |
20130239119 | Garg et al. | Sep 2013 | A1 |
20130265883 | Henry et al. | Oct 2013 | A1 |
20130272136 | Ali et al. | Oct 2013 | A1 |
20130301830 | Bar-El | Nov 2013 | A1 |
20130343191 | Kim et al. | Dec 2013 | A1 |
20140010083 | Hamdi et al. | Jan 2014 | A1 |
20140082348 | Chandrasekaran | Mar 2014 | A1 |
20140115702 | Li | Apr 2014 | A1 |
20140189093 | du Toit | Jul 2014 | A1 |
20140189861 | Gupta et al. | Jul 2014 | A1 |
20140189961 | He et al. | Jul 2014 | A1 |
20140226820 | Chopra et al. | Aug 2014 | A1 |
20140351573 | Martini | Nov 2014 | A1 |
20150026313 | Chawla et al. | Jan 2015 | A1 |
20150039889 | Andoni | Feb 2015 | A1 |
20150052345 | Martini | Feb 2015 | A1 |
20150113264 | Wang et al. | Apr 2015 | A1 |
20150124622 | Kovvali et al. | May 2015 | A1 |
20150172219 | Johansson et al. | Jun 2015 | A1 |
20150264083 | Prenger et al. | Sep 2015 | A1 |
20150281954 | Warren | Oct 2015 | A1 |
20150288679 | Ben-Nun et al. | Oct 2015 | A1 |
20150295780 | Hsiao et al. | Oct 2015 | A1 |
20150341212 | Hsiao et al. | Nov 2015 | A1 |
20160014016 | Guichard et al. | Jan 2016 | A1 |
20160080502 | Yadav et al. | Mar 2016 | A1 |
20160105469 | Galloway et al. | Apr 2016 | A1 |
20160105814 | Hurst et al. | Apr 2016 | A1 |
20160119374 | Williams et al. | Apr 2016 | A1 |
20160127517 | Shcherbakov et al. | May 2016 | A1 |
20160142440 | Qian et al. | May 2016 | A1 |
20160248685 | Pignataro et al. | Aug 2016 | A1 |
20160277321 | Johansson et al. | Sep 2016 | A1 |
20160277971 | Hamdi et al. | Sep 2016 | A1 |
20160294784 | Hopkins et al. | Oct 2016 | A1 |
20160344754 | Rayapeta et al. | Nov 2016 | A1 |
20160373185 | Wentzloff et al. | Dec 2016 | A1 |
20170048328 | Korotaev et al. | Feb 2017 | A1 |
20170070531 | Huston, III et al. | Mar 2017 | A1 |
20170237719 | Schwartz et al. | Aug 2017 | A1 |
20170302554 | Chandrasekaran et al. | Oct 2017 | A1 |
20170339022 | Hegde et al. | Nov 2017 | A1 |
20170364794 | Mahkonen et al. | Dec 2017 | A1 |
20180006923 | Gao et al. | Jan 2018 | A1 |
20180091427 | Kumar et al. | Mar 2018 | A1 |
20180097787 | Murthy et al. | Apr 2018 | A1 |
20180097788 | Murthy | Apr 2018 | A1 |
20180097840 | Murthy | Apr 2018 | A1 |
20180124025 | Lam et al. | May 2018 | A1 |
20180176036 | Butcher et al. | Jun 2018 | A1 |
20180176192 | Davis et al. | Jun 2018 | A1 |
20180198838 | Murgia et al. | Jul 2018 | A1 |
20180234322 | Cohn et al. | Aug 2018 | A1 |
20180278419 | Higgins et al. | Sep 2018 | A1 |
20180331912 | Edmison et al. | Nov 2018 | A1 |
20180332078 | Kumar et al. | Nov 2018 | A1 |
20180351970 | Majumder | Dec 2018 | A1 |
20180367422 | Raney et al. | Dec 2018 | A1 |
20180375644 | Karagiannis et al. | Dec 2018 | A1 |
20190058714 | Joshi et al. | Feb 2019 | A1 |
20190116111 | Izard et al. | Apr 2019 | A1 |
20190166049 | Bakshi | May 2019 | A1 |
20190205244 | Smith | Jul 2019 | A1 |
20190260794 | Woodford et al. | Aug 2019 | A1 |
20190303385 | Ching et al. | Oct 2019 | A1 |
20190349403 | Anderson et al. | Nov 2019 | A1 |
20200053064 | Oprisan et al. | Feb 2020 | A1 |
20200067700 | Bergeron | Feb 2020 | A1 |
20200076773 | Monat et al. | Mar 2020 | A1 |
20200104052 | Vijayan et al. | Apr 2020 | A1 |
20200137021 | Janakiraman | Apr 2020 | A1 |
20200137115 | Janakiraman et al. | Apr 2020 | A1 |
Number | Date | Country |
---|---|---|
3528430 | Aug 2019 | EP |
2016176070 | Nov 2016 | WO |
Entry |
---|
Non-Final Office Action for U.S. Appl. No. 15/608,369 (dated Oct. 31, 2019). |
Non-Final Office Action for U.S. Appl. No. 15/608,369 (dated Mar. 7, 2019). |
Schulist et al., “Linux Socket Filtering aka Berkeley Packet Filter (BPF),” Wayback Machine, http://www.kernel.org/doc/Documentation/networking/filter.txt, pp. 1-25 (Jun. 8, 2018). |
Starovoitov, “[PATCH net-next 6/6] samples: bpf: large eBPF program in C,” lkml.org, https://lkml.org/lkml/2014/11/27/10, pp. 1-5 (Nov. 26, 2014). |
Andreyev, “Introducing data center fabric, the next-generation Facebook data center network,” Data Center Engineering, Networking & Traffic, Production Engineering, https://code.fb.com/production-engineering/introducing-data-center-fabric-the-next-generation-facebook-data-center-network/, pp. 1-10 (Nov. 14, 2014). |
Corbet, “Extending extended BPF,” LWN.net, https://lwn.net/Articles/603983/, pp. 1-4 (Jul. 2014). |
Corbet, “BPF: the universal in-kernel virtual machine,” LWN.net, https://lwn.net/Articles/599755/, pp. 1-3 (May 2014). |
Git, “Linux Kernel Source Tree,” https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/samples/bpf/sockex2_kern.c, pp. 1-4 (2018). |
Advisory Action for U.S. Appl. No. 15/608,369 (dated Sep. 13, 2019). |
Nubeva, “Nubeva TLS Decrypt: Out-of-Band Decrypted Visibility for the Cloud,” www.nubeva.com/decryption, pp. 1-8 (Sep. 2019). |
Nubeva, “What is Symmetric Key Intercep Architecture?” https://www.nubeva.com/blog/what-is-symmetric-key-intercept-architecture. pp. 1-4 (Aug. 8, 2019). |
Final Office Action for U.S. Appl. No. 15/608,369 (dated Jun. 27, 2019). |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 15/826,787 (dated Apr. 25, 2019). |
Non-Final Office Action for U.S. Appl. No. 15/826,787 (dated Jan. 3, 2019). |
Solution Brief, “Smart Packet Brokering for Mobile Network Operators,” Brocade, pp. 1 (Jul. 19, 2017). |
Vavilapalli et al., Cord Design Notes, “Cord Monitoring Service,” pp. 1-14 (Mar. 14, 2016). |
ACG Research, “Business Care for Brocade Network Analytics for Mobile Network Operators,” pp. 1-11 (2015). |
Ixia Anue GTP Session Controller, Take Control of GTP Monitoring to Improve Customer QoE and Maximize Network ROI, Solution Brief, Document No. 915-6606-01 Rev. A, pp. 1-2 (Sep. 2013). |
Ixia Network Visibility Solutions, Anue GTP Session Controller 7433, Product Specifications, Document No. 915-6504-01 Rev. B, pp. 1-3 (May 2013). |
Commonly-assigned, co-pending U.S. Appl. No. 16/113,360 for “Monitoring Encrypted Network Traffic Flows in a Virtual Environment Using Dynamic Session Key Acquisition Techniques,” (Unpublished, filed Aug. 27, 2018). |
Commonly-assigned, co-pending U.S. Appl. No. 16/103,598 for “Methods, Systems, and Computer Readable Media for Implementing Bandwidth Limitations on Specific Application Traffic at a Proxy Element,” (Unpublished, filed Aug. 14, 2018). |
“Inspection of SSL Traffic Overview,” Juniper Networks, pp. 1-4 (Jan. 19, 2011). |
Commonly-assigned, co-pending U.S. Appl. No. 16/781,542 for “Methods, Systems, and Computer Readable Media for Processing Network Flor Metadata at a Network Packet Broker,” (Unpublished, filed Feb. 4, 2020). |
Stankovic, “How to solve duplicated NetFlow caused by multiple exporters,” https://www.netvizura.com/blog/how-to-solve-duplicated-netflow-caused-by-multiple-exporters, pp. 1-4 (Accessed Jan. 15, 2020). |
“Jumbo Frame,” Wikipedia, https://en.wikipedia.org/wiki/Jumbo_frame, pp. 1-4 (Jan. 15, 2020). |
“How is the MTU is 65535 in UDP but the ethernet does not allow frame size more than 1500 bytes,” ServerFault, TCPIP, pp. 1-9 (Accessed Jan. 15, 2020). |
“Network Monitoring Step 2: the Next-Generation of Packet Brokers,” MantisNet, pp. 1-6 (2020). |
“cPacket cVu 2440NG/3240NG,” https://www.cpacket.com/resources/cvu-3240-2440-datasheet/, pp. 1-4 (Accessed Jan. 15, 2020). |
“What are Microservices,” An Introduction to Microservices, https://opensource.com/resources/what-are-microservices, pp. 1-8 (Accessed Jan. 15, 2020). |
“IPv6,” Wikipedia, https://en.wikipedia.org/wiki/IPv6, pp. 1-15 (Jan. 8, 2020). |
“About NetFlow,” Watchguard Technologies, Inc., pp. 1-3 (2019). |
“Multiprotocol Label Switching,” Wikipedia, https://en.wikipedia.org/wiki/multiprotocol_label_switching, pp. 1-7 (Dec. 6, 2019). |
“Netflow,” Wikipedia, https://en.wikipedia.org/wiki/NetFlow, pp. 1-9 (Dec. 3, 2019). |
“NetFlow Collector,” Kentipedia, Kentik, pp. 1-4 (Sep. 17, 2019). |
Petryschuk, “NetFlow Basics: an Introduction to Monitoring Network Traffic,” Auvik, https://www.auvik.com/, pp. 1-8 (Mar. 19, 2019). |
“Automatic versus Manual NetFlow Deduplication,” Noction, https://www.noction.com/blog/automatic-manual-netflow-deduplication, pp. 1-7 (Feb. 1, 2019). |
Leskiw, “Understanding Syslog: Servers, Messages & Security,” https://www.networkmanagementsoftware.com/what-is-syslog/, pp. 1-7 (Oct. 2018). |
McGillicuddy, “Next-Generation Network Packet Brokers: Defining the Future of Network Visibility Fabrics,” Enterprise Management Associates (EMA) Research, Niagara Networks, pp. 1-27 (Aug. 2018). |
“Principles of Chaso Engineering,” https://principlesofchaos.org/?lang=ENcontent, pp. 1-3 (May 2018). |
“Network Visibility Network Packet Broker Comparison Table,” Ixia, pp. 1-10 (2017). |
Michael, “NetFlow Deduplication or Flow Deduplication,” Plixer, pp. 1-5 (Dec. 3, 2016). |
“Feature Brief: FlowVUE Application,” Gigamon, pp. 1-3 (2016). |
“cPacket Radically Simplifies How Data Center and Cloud Professionals Pinpoint Problems,” BusinessWire, pp. 1-3 (Jan. 28, 2013). |
Hale, “Netflow V9 Datagram Knowledge Series: Part 2—Netflow V9 Packet Header,” Geek Speak, pp. 1-3 (Sep. 7, 2012). |
“Understanding Flow and Packet Deduplication,” Riverbed Technology, pp. 1-5 (2012). |
“NetFlow Version 9 Flow-Record Format,” Cisco Systems, pp. 1-12 (May 2011). |
Paul, Santanu, “Network Visibility Component with Netflow Jumbo Frame Support,” The IP.com Journal, pp. 1-8 (Aug. 2019). |
Paul, Santanu, “Methods and Systems for Session-Aware Collection of Netflow Statistics,” The IP.com Journal, pp. 1-5 (Jul. 2019). |
Pandey, Shardendu; Johansson, Stefan Jan, “Network Packet Broker with Flow Segmentation Capability,” The IP.com Journal, pp. 1-6 (Jul. 2019). |
Paul, Santanu,“Network Packet Broker with Flow Segmentation Capability,” The IP.com Journal, pp. 1-6 (Aug. 2019). |
Paul, Santanu, “Custom Key Performance Indicator (KPI) Network Visibility System,” The IP.com Journal, pp. 1-4 (Jul. 2019). |
Paul, Santanu, “Self-Healing Network Visibility System,” The IP.com Journal, pp. 1-5 (Jun. 2019). |
Paul, Santanu, “Network Visibility System with Integrated Netflow Over Syslog Reporting Capability,” The IP.com Journal, pp. 1-7 (Jan. 28, 2019). |
Evans, David, “Network Packet Broker with Dynamic Filter Rules,” The IP.com Journal, pp. 1-8 (Jun. 2018). |
Advisory Action and AFCP 2.0 Decision for U.S. Appl. No. 15/608,369 (dated Jul. 1, 2020). |
Non-Final Office Action for U.S. Appl. No. 16/113,360 (dated May 19, 2020). |
Non-Final Office Action for U.S. Appl. No. 16/103,598 (dated May 11, 2020). |
Final Office Action for U.S. Appl. No. 15/608,369 (dated Apr. 22, 2020). |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 15/608,369 (dated Aug. 19, 2020). |
Applicant-Initiated Interview Summary for U.S. Appl. No. 16/103,598 (dated Oct. 22, 2020). |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 16/103,598 (dated Oct. 16, 2020). |
Notice of Allowance and Fee(s) Due and Examiner-Initiated Interview Summary for U.S. Appl. No. 16/113,360 (dated Oct. 15, 2020). |
Non-Final Office Action for U.S. Appl. No. 16/781,542 (dated Sep. 25, 2020). |
Sanchez, “Extended BPF and Data Plane Extensibility: an overview of networking and Linux,” PLUMgrid, pp. 1-37 (2014). |
Number | Date | Country | |
---|---|---|---|
20190068564 A1 | Feb 2019 | US |
Number | Date | Country | |
---|---|---|---|
62550558 | Aug 2017 | US |