The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Apr. 22, 2014

Filed:

Mar. 22, 2010
Applicants:

Ron Gula, Marriottsville, MD (US);

Renaud Deraison, New York, NY (US);

Matthew T. Hayton, Rockville, MD (US);

Inventors:

Ron Gula, Marriottsville, MD (US);

Renaud Deraison, New York, NY (US);

Matthew T. Hayton, Rockville, MD (US);

Assignee:

Tenable Network Security, Inc., Columbia, MD (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 11/00 (2006.01); G06F 12/14 (2006.01); G06F 12/16 (2006.01); G08B 23/00 (2006.01); G06F 21/00 (2013.01); G06F 21/56 (2013.01);
U.S. Cl.
CPC ...
G06F 21/00 (2013.01); G06F 21/56 (2013.01); G06F 21/561 (2013.01); G06F 21/562 (2013.01); G06F 21/566 (2013.01);
Abstract

The system and method for passively identifying encrypted and interactive network sessions described herein may distribute a passive vulnerability scanner in a network, wherein the passive vulnerability scanner may observe traffic travelling across the network and reconstruct a network session from the observed traffic. The passive vulnerability scanner may then analyze the reconstructed network session to determine whether the session was encrypted or interactive (e.g., based on randomization, packet timing characteristics, or other qualities measured for the session). Thus, the passive vulnerability scanner may monitor the network in real-time to detect any devices in the network that run encrypted or interactive services or otherwise participate in encrypted or interactive sessions, wherein detecting encrypted and interactive sessions in the network may be used to manage changes and potential vulnerabilities in the network.


Find Patent Forward Citations

Loading…