scispace - formally typeset
Search or ask a question
Author

Asbjørn Sørhaug

Bio: Asbjørn Sørhaug is an academic researcher. The author has contributed to research in topics: Network tap. The author has an hindex of 1, co-authored 1 publications receiving 246 citations.
Topics: Network tap

Papers
More filters
Patent
24 Feb 1997
TL;DR: In this paper, a bi-directional network medium monitor including a tap apparatus connected inserted in a network media, including a transceiver and a clock recovery element for each medium and medium monitor connection, is presented.
Abstract: A bi-directional network medium monitor including a tap apparatus connected inserted in a network media, e.g. Fiber Optic (FX) and Twisted Pair (TX), comprising a transceiver and a clock recovery element for each medium and medium monitor connection, and a bi-directional serial data multiplexer which directs the medium data while in the serial data format. Also, the medium monitor may interrupt medium data transfer in either medium direction and insert its data for diagnostic or other network purposes. Thus, the apparatus according to the present invention is operable to monitor a network at the maximum data rates currently used while providing no significantly network data delay.

246 citations


Cited by
More filters
Patent
Ashar Aziz1, Henry Uyeno, Jay Manni, Amin Sukhera, Stuart Staniford 
23 Feb 2012
TL;DR: In this paper, an electronic message is analyzed for malware contained in the message and the analysis may include replaying the suspicious URL in a virtual environment which simulates the intended computing device to receive the electronic message, if the replayed URL is determined to be malicious, the malicious URL is added to a black list which is updated throughout the computer system.
Abstract: An electronic message is analyzed for malware contained in the message. Text of an electronic message may be analyzed to detect and process malware content in the electronic message itself. The present technology may analyze an electronic message and attachments to electronic messages to detect a uniform resource location (URL), identify whether the URL is suspicious, and analyze all suspicious URLs to determine if they are malware. The analysis may include re-playing the suspicious URL in a virtual environment which simulates the intended computing device to receive the electronic message. If the re-played URL is determined to be malicious, the malicious URL is added to a black list which is updated throughout the computer system.

262 citations

Patent
28 Jul 2006
TL;DR: In this article, a dynamic signature creation and enforcement system can comprise a tap configured to copy network data from a communication network, and a controller coupled to the tap, which is configured to analyze the copy of the network data with a heuristic to determine if the data is suspicious, flag the data as suspicious based on the heuristic determination.
Abstract: A dynamic signature creation and enforcement system can comprise a tap configured to copy network data from a communication network, and a controller coupled to the tap. The controller is configured to receive the copy of the network data from the tap, analyze the copy of the network data with a heuristic to determine if the network data is suspicious, flag the network data as suspicious based on the heuristic determination, simulate transmission of the network data to a destination device to identify unauthorized activity, generate an unauthorized activity signature based on the identification, and transmit the unauthorized activity signature to a digital device configured to enforce the unauthorized activity signature.

254 citations

Patent
Ashar Aziz1
13 Jun 2006
TL;DR: In this paper, a suspicious activity capture system can comprise a tap configured to copy network data from a communication network, and a controller coupled to the tap, which is configured to analyze the copy of the network data with a heuristic to flag the data as suspicious and simulate transmission of the data to a destination device.
Abstract: A suspicious activity capture system can comprise a tap configured to copy network data from a communication network, and a controller coupled to the tap. The controller is coupled to the tap and is configured to receive the copy of the network data from the tap, analyze the copy of the network data with a heuristic to flag the network data as suspicious, and simulate transmission of the network data to a destination device.

248 citations

Patent
30 Sep 2009
TL;DR: In this paper, a system and method for network-based file analysis for malware detection is described, where a binary file including the binary packet is extracted from the network content and determined whether the extracted binary file is detected to be malware.
Abstract: A system and method are disclosed for network-based file analysis for malware detection. Network content is received from a network tap. A binary packet is identified in the network content. A binary file, including the binary packet, is extracted from the network content. It is determined whether the extracted binary file is detected to be malware.

243 citations

Patent
19 Jun 2006
TL;DR: In this paper, the authors propose a suspicious activity capture system, which consists of a tap configured to copy network data from a communication network, and a controller coupled to the tap.
Abstract: A suspicious activity capture system can comprise a tap configured to copy network data from a communication network, and a controller coupled to the tap. The controller is configured to receive the copy of the network data from the tap, analyze the copy of the network data with a heuristic to determine if the network data is suspicious, flag the network data as suspicious based on the heuristic determination, and concurrently simulate transmission of the network data to a plurality of destination devices.

235 citations