Method for traffic tunneling in distributed network for detecting malicious content, involves transmitting address resolution protocol probe to central server, where ARP probe is indicative of whether given emitter is ready to establish peer-to-peer connection with given gateway
2023-07-04
专利权人FACCT NETWORK SECURITY LLC (FACC-Non-standard) ; FUTURE STOCK CO (FUTU-Non-standard) ; FACCT NETWORK SECURITY LLC (FACC-Non-standard)
申请日期2023-07-04
专利号US2025016180-A1; RU2832621-C1; SG10202400952-A
成果简介NOVELTY - The method involves transmitting a request for receiving a gateway data from a given gateway to a central server, the request including an IP address of the given gateway at the WireGuard level, a public key, a UDP address (510). An address resolution protocol (ARP) probe is transmitted to the central server, where the ARP probe is indicative of whether a given emitter is ready to establish a peer-to-peer (P2P) connection with the given gateway (520). The gateway data is updated in a neighbor table hosted on the emitter in response to receiving a response to the probe. An outgoing traffic packet including two levels of encapsulation over a transport protocol is forwarded to the gateway for natting the outgoing packet to an external server. USE - Method for traffic tunneling in distributed network for detecting malicious content. ADVANTAGE - The method enables setting up a direct peer-to-peer transmission of traffic between two electronic devices of a distributed network, while bypassing a central server. The central server is used at a preparatory stage for setting up the direct tunneling between the peers and as a backup route, thus achieving higher operation ability and fault tolerance of the distributed network. DETAILED DESCRIPTION - INDEPENDENT CLAIMS are included for: (1) a method for traffic tunneling in a distributed network for malware detonation; (2) an electronic device for traffic tunneling in a distributed network for detecting malicious content; (3) a server for traffic tunneling in a distributed network for malware detonation. DESCRIPTION OF DRAWING(S) - The drawing shows a flowchart diagram of a connection establishment stage of a second method for tunneling the traffic in the he distributed network. 510Transmitting a request for receiving a gateway data from a given gateway to a central server, the request including an IP address of the given gateway at the WireGuard level, a public key, a UDP address 520Transmitting address resolution protocol probe to the central server, where the ARP probe is indicative of whether a given emitter is ready to establish a peer-to-peer connection with the given gateway 530Receiving the ARP probe from the emitter on the central server and a transmitting it to the WireGward IP address of the gateway 540Receiving the ARP probe containing the REQUEST ENABLE value in the OPERATION field from the emitter on the gateway 544Sending the request for receiving the WireGuard IP address, the public key and the UPD address from the gateway 546Adding the emitter as the peer on the WireGuard interface on the gateway 550Transmitting the standard ARP response directly to the emitter 560Updating the gateway data in a neighbor table hosted on the given emitter in response to receiving from the central server, a response to the uw ARP probe
IPC 分类号H04L-009/40 ; G06F-021/60 ; H04L-061/2592
国家俄罗斯
专业领域信息技术
语种英语
成果类型专利
文献类型科技成果
条目标识符http://119.78.100.226:8889/handle/3KE4DYBR/21407
专题中国科学院新疆生态与地理研究所
作者单位
1.FACCT NETWORK SECURITY LLC (FACC-Non-standard)
2.FUTURE STOCK CO (FUTU-Non-standard)
3.FACCT NETWORK SECURITY LLC (FACC-Non-standard)
推荐引用方式
GB/T 7714
MITIN A,MITIN A V,ARSENIY M. Method for traffic tunneling in distributed network for detecting malicious content, involves transmitting address resolution protocol probe to central server, where ARP probe is indicative of whether given emitter is ready to establish peer-to-peer connection with given gateway. US2025016180-A1; RU2832621-C1; SG10202400952-A[P]. 2023.
条目包含的文件
条目无相关文件。
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。