Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

31 results about "Packet injection" patented technology

Packet injection (also known as forging packets or spoofing packets) in computer networking, is the process of interfering with an established network connection by means of constructing packets to appear as if they are part of the normal communication stream. The packet injection process allows an unknown third party to disrupt or intercept packets from the consenting parties that are communicating, which can lead to degradation or blockage of users' ability to utilize certain network services or protocols. Packet injection is commonly used in man-in-the-middle attacks and denial-of-service attacks.

Method and apparatus for analyzing one or more firewalls

A method and apparatus are disclosed for analyzing the operation of one or more network gateways, such as firewalls or routers, that perform a packet filtering function in a network environment. Given a user query, the disclosed firewall analysis tool simulates the behavior of the various firewalls, taking into account the topology of the network environment, and determines which portions of the services or machines specified in the original query would manage to reach from the source to the destination. The relevant packet-filtering configuration files are collected and an internal representation of the implied security policy is derived. A graph data structure is used to represent the network topology. A gateway-zone graph permits the firewall analysis tool to determine where given packets will travel in the network, and which gateways will be encountered along those paths. In this manner, the firewall analysis tool can evaluate a query object against each rule-base object, for each gateway node in the gateway-zone graph that is encountered along each path between the source and destination. A graphical user interface is provided for receiving queries, such as whether one or more given services are permitted between one or more given machines, and providing results. A spoofing attack can be simulated by allowing the user to specify where packets are to be injected into the network, which may not be the true location of the source host-group.
Owner:ALCATEL-LUCENT USA INC

Electrostatic Mass Spectrometer with Encoded Frequent Pulses

A method, apparatus and algorithms are disclosed for operating an open electrostatic trap (E-trap) or a multi-pass TOF mass spectrometer with an extended flight path. A string of start pulses with non equal time intervals is employed for triggering ion packet injection into the analyzer, a long spectrum is acquired to accept ions from the entire string and a true spectrum is reconstructed by eliminating or accounting overlapping signals at the data analysis stage while using logical analysis of peak groups. The method is particularly useful for tandem mass spectrometry wherein spectra are sparse. The method improves the duty cycle, the dynamic range and the space charge throughput of the analyzer and of the detector, so as the response time of the E-trap analyzer. It allows flight extension without degrading E-trap sensitivity.
Owner:LECO CORPORATION

Methods for effective network-security inspection in virtualized environments

The present invention discloses methods for effective network-security inspection in virtualized environments, the methods including the steps of: providing a data packet, embodied in machine-readable signals, being sent from a sending virtual machine to a receiving virtual machine via a virtual switch; intercepting the data packet by a sending security agent associated with the sending virtual machine; injecting the data packet into an inspecting security agent associated with a security virtual machine via a direct transmission channel which bypasses the virtual switch; forwarding the data packet to the security virtual machine by employing a packet-forwarding mechanism; determining, by the security virtual machine, whether the data packet is allowed for transmission; upon determining the data packet is allowed, injecting the data packet back into the sending security agent via the direct transmission channel; and forwarding the data packet to the receiving virtual machine via the virtual switch.
Owner:CHECK POINT SOFTWARE TECH LTD

Side tones packets injection (STPI) for PAR reduction

A method and system for reducing the power to average ratio (PAR) at the transmitter after the up sampling and interpolation filter. In the time domain, Side Tone Packets Injection (STPI) system and method detects the optimal peaks that will result in having a low PAR at a sampling rate of T / K and combines an optimal binary and a PAR-lowering sequence and an upsampled, interpolated original discrete time signal at the scale of one extended symbol for multi-carrier modulation and at the scale M of symbols for single-carrier modulation. STPI does not require peaks search and processing at the scale of many time samples, does not require iterative Fast Fourier Transform (FFT) and Inverse Fast Fourier Transform (IFFT) processing thus, allowing the receiver not to perform extra demodulation.
Owner:IKANOS COMMUNICATIONS

Fuzzing system and method of distributed computing environment (DCE) remote procedure call (RPC)

Provided are a fuzzing system and method of a distributed computing environment (DCE) remote procedure call (RPC) object. The fuzzing system includes a file manager, a random data generator, a RPC packet, and a packet injector. The file manager obtains necessary information by parsing and analyzing an idl file for a target object for fuzzing and a file having information about a Named Pipe file. The random data generator generates a random value using a system clock as a factor. The RPC packet creator embodies protocols used for RPC communication by functions and generating a RPC packet for RPC communication. The packet injector inserts the necessary information and the random value into the generated RPC packet and transmits the generated RPC packet to the target object for fuzzing.
Owner:ELECTRONICS & TELECOMM RES INST

Network interface card fault injection methods and apparatuses

The present invention provides a network interface card fault injection method. The method is characterized by comprising the steps of when a hypervisor loads a network interface card driver in a startup phase, invoking, by an interface of a network device in the hypervisor, a first interface implementation module of the network interface card driver; loading a fault injection module into the hypervisor in a fault injection mode; replacing the first interface implementation module of the network interface card driver with a second interface implementation module in the fault injection module, so as to enable the interface to invoke the second interface implementation module; acquiring a fault description instruction, and then sending the fault description instruction to the fault injection module, so as to enable the fault injection module to acquire a fault injection parameter carried in the fault description instruction; and when the interface of the network device invokes the second interface implementation module, injecting, by using the second interface implementation module, the fault injection parameter into a data package processed by network interface card hardware.
Owner:HONOR DEVICE CO LTD

Cloud network, measurement system, method and device for cloud network, and storage medium

The embodiment of the invention provides a cloud network, a measurement system and method for the cloud network, equipment and a storage medium. In the embodiment of the invention, aiming at a cloud network, a measurement intention of a tenant in the cloud network is automatically sensed, a measurement rule is generated according to the measurement intention, and a measurement request message is injected into network element equipment on a to-be-measured path by adopting a bypass packet injection mode based on the measurement rule; network quality analysis is carried out by means of the measurement record information generated when the measurement request message passes through different network element devices, and the network quality of the cloud network can be simply, effectively and accurately measured. Furthermore, the measurement process can be greatly simplified through intention of the measurement request of the tenant; through a bypass packet injection mode, the intrusion to the network environment of the tenant is reduced; and meanwhile, an active packet injection mode is adopted, so that the dependence on the actual application traffic of the tenant can be avoided, and the network quality can be measured even if the tenant does not generate the actual application traffic.
Owner:ALIBABA CLOUD COMPUTING LTD

System and method for protecting user privacy by misleading network sniffing tool in smart home environment

The invention provides a system and method for protecting user privacy by misleading a network sniffing tool in a smart home environment. The system comprises a network feature learning module, a privacy protection strategy making module and a network data packet injection module. Based on a data packet sniffing analysis technology and a data packet injection technology in a wireless network environment, the system can independently run in third-party hardware, and can be conveniently and quickly deployed in a smart home environment. Any part of the smart home environment is not modified, normal operation of the smart home environment is not affected, any external support is not needed, the flexibility is high, and the adaptability is high. According to the invention, a false user is simulated in a real smart home environment by injecting a wireless network data packet. Because the simulation strategy is based on the network feature information in the real smart home environment, the simulated false user is not different from the real user and cannot be distinguished and identified by an attacker, thereby achieving the purpose of protecting the privacy of the user in the smart homeenvironment.
Owner:NANJING UNIV

Network detection method and device, electronic equipment and storage medium

The invention discloses a network detection method and device, electronic equipment and a storage medium, and the method comprises the steps: constructing a first data packet based on first information and second information; the first information represents an IP address and an MAC address of a source end object of a first link of the data plane; the second information represents the IP address of the next hop in the first link; based on a response data packet obtained by injecting the first data packet into the source end object of the first link, obtaining an MAC address of a next hop; constructing a second data packet based on the first information, the second information and the MAC address of the next hop; and determining a network detection result of the first link according to a forwarding result of the second data packet in the first link. Based on the network detection method, a user does not need to manually configure the next-hop MAC address, the configuration difficulty of network detection is reduced, and more users can complete network detection configuration.
Owner:SANGFOR TECH INC

On-chip network optimization method based on approximate calculation

The invention discloses an on-chip network optimization method based on approximate calculation. The on-chip network optimization method based on the approximate calculation comprises a data clipper,a data restorer, a flow predictor, a global controller, and a local controller; the data clipper clips the data before a data packet is injected into a network port to shorten the data packet length;the data restorer recovers the lost data after receiving a clipped data packet; the flow predictor predicts data flow in a next regulation interval based on past node communication conditions; the global controller is used for calculating an approximately calculated optimal configuration of each node based on global information and user quality requirements under a global viewing angle, and sending control information to each node; and the local controller performs data loss rate configuration on each data packet waiting to be injected into the network according to the received control information. The on-chip network optimization method based on the approximate calculation can optimize the performance and power consumption of the on-chip network at a low cost without violating the requirements for output quality of the user.
Owner:SOUTH CHINA UNIV OF TECH +1

Method for controlling data packet sending rate of energy efficiency router of internet

The invention discloses a method for controlling the data packet sending rate of an energy efficiency router of the internet, and belongs to the technical field of internet. The method is finished through the following steps: measuring the speed rate of a data packet arriving in a router port; establishing an energy efficiency router data packet sending rate control model; getting the data packet seeding rate by a genetic search method; and injecting the data packet into a link. By controlling the data packet sending rate of the router, the aim of improving the energy efficiency of the link is improved; meanwhile, the overall optimal control rate can be obtained by solving an energy efficiency optimizing module by the genetic search method to avoid locally optimal solution.
Owner:LIAONING PLANNING & DESIGNING INST OF POST & TELECOMM CO LTD

Method, apparatus and computer storage medium for deadlock-free adaptive routing in two-dimensional mesh network based on the overlapping virtual network partitioning scheme

This patent provides a deadlock-free adaptive routing apparatus, method and computer storage medium for packets in two-dimensional mesh network based on the overlapping virtual network partitioning scheme, including: according to the offset between the source node and the destination node of the packet along the x-dimension or y-dimension, then use the x dimension and the y dimension to partition the two-dimensional mesh network into virtual networks; corresponding to each of the partitioned virtual networks, corresponding packet classes are respectively set, then merge virtual networks; based on the class the packet, inject the packet into the corresponding merged virtual network to route. This routing method balances utilization of the channels and improves efficiency of the data transmission.
Owner:TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products