The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jan. 30, 2018

Filed:

Jan. 30, 2016
Applicant:

Juniper Networks, Inc., Sunnyvale, CA (US);

Inventors:

Anil Kaushik, Bangalore, IN;

Vineet Verma, San Jose, CA (US);

Stephen Grau, Pleasanton, CA (US);

Sreenivas Voruganti, Bangalore, IN;

Abhishek Kumar, Bangalore, IN;

Assignee:

Juniper Networks, Inc., Sunnyvale, CA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 11/07 (2006.01); G06F 12/02 (2006.01); G06F 12/08 (2016.01); G06F 21/00 (2013.01); G06F 21/50 (2013.01); G06F 21/55 (2013.01); G06F 21/56 (2013.01); H04L 29/06 (2006.01);
U.S. Cl.
CPC ...
H04L 63/1416 (2013.01); H04L 63/1466 (2013.01); H04L 67/42 (2013.01);
Abstract

A computer-implemented method for detecting cache-poisoning attacks in networks using SDPs may include maintaining a cache of service information that identifies services provided by client devices connected to a network using an SDP. The method may also include detecting a cache-poisoning attack by (1) receiving, from a client device connected to the network, an SDP message related to a service allegedly provided via the network, (2) identifying, within the SDP message, an attribute of the service allegedly provided via the network, and then (3) determining that the client device is attempting to corrupt the cache of service information by determining that the identified attribute of the service suggests that the service is illegitimate. Finally, the method may include performing a security action to mitigate the cache-poisoning attack in response to detecting the cache-poisoning attack. Various other methods, systems, and computer-readable media are also disclosed.


Find Patent Forward Citations

Loading…