SYSTEMS AND METHODS FOR TESTING KNOWN BAD DESTINATIONS IN A PRODUCTION NETWORK

The disclosure is directed to a system for testing known bad destinations while in a production network. The system can include a source controller and a destination controller in a production network. The source controller and the destination controller can have a configuration of a predetermined s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Holzberger,, JR., Paul E, Seely, Jeff, Key, Christopher B
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Holzberger,, JR., Paul E
Seely, Jeff
Key, Christopher B
description The disclosure is directed to a system for testing known bad destinations while in a production network. The system can include a source controller and a destination controller in a production network. The source controller and the destination controller can have a configuration of a predetermined set of one or more known bad external destinations to test a security control device of the production network intermediary to the source controller and the destination controller. The source controller can be configured to communicate test traffic generated to a known bad external destination. The test traffic can pass through the security control device with a network identifier of the known bad external destination. The destination controller can be configured to receive the test traffic forwarded by a network device of the production network. The security control device can be validated whether or not the security control device applied security controls on the test traffic using the network identifier of the known bad external destination.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2020280576A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2020280576A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2020280576A13</originalsourceid><addsrcrecordid>eNrjZPALjgwOcfUNVnD0c1HwdQ3x8HcJVnDzD1IIcQ0O8fRzV_D28w_3U3BydFFwAYs4hnj6-wUrePopOCoEBPm7hDqDBBT8XEPC_YO8eRhY0xJzilN5oTQ3g7Kba4izh25qQX58anFBYnJqXmpJfGiwkQEQWhiYmps5GhoTpwoA5tgvnw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SYSTEMS AND METHODS FOR TESTING KNOWN BAD DESTINATIONS IN A PRODUCTION NETWORK</title><source>esp@cenet</source><creator>Holzberger,, JR., Paul E ; Seely, Jeff ; Key, Christopher B</creator><creatorcontrib>Holzberger,, JR., Paul E ; Seely, Jeff ; Key, Christopher B</creatorcontrib><description>The disclosure is directed to a system for testing known bad destinations while in a production network. The system can include a source controller and a destination controller in a production network. The source controller and the destination controller can have a configuration of a predetermined set of one or more known bad external destinations to test a security control device of the production network intermediary to the source controller and the destination controller. The source controller can be configured to communicate test traffic generated to a known bad external destination. The test traffic can pass through the security control device with a network identifier of the known bad external destination. The destination controller can be configured to receive the test traffic forwarded by a network device of the production network. The security control device can be validated whether or not the security control device applied security controls on the test traffic using the network identifier of the known bad external destination.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200903&amp;DB=EPODOC&amp;CC=US&amp;NR=2020280576A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200903&amp;DB=EPODOC&amp;CC=US&amp;NR=2020280576A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Holzberger,, JR., Paul E</creatorcontrib><creatorcontrib>Seely, Jeff</creatorcontrib><creatorcontrib>Key, Christopher B</creatorcontrib><title>SYSTEMS AND METHODS FOR TESTING KNOWN BAD DESTINATIONS IN A PRODUCTION NETWORK</title><description>The disclosure is directed to a system for testing known bad destinations while in a production network. The system can include a source controller and a destination controller in a production network. The source controller and the destination controller can have a configuration of a predetermined set of one or more known bad external destinations to test a security control device of the production network intermediary to the source controller and the destination controller. The source controller can be configured to communicate test traffic generated to a known bad external destination. The test traffic can pass through the security control device with a network identifier of the known bad external destination. The destination controller can be configured to receive the test traffic forwarded by a network device of the production network. The security control device can be validated whether or not the security control device applied security controls on the test traffic using the network identifier of the known bad external destination.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPALjgwOcfUNVnD0c1HwdQ3x8HcJVnDzD1IIcQ0O8fRzV_D28w_3U3BydFFwAYs4hnj6-wUrePopOCoEBPm7hDqDBBT8XEPC_YO8eRhY0xJzilN5oTQ3g7Kba4izh25qQX58anFBYnJqXmpJfGiwkQEQWhiYmps5GhoTpwoA5tgvnw</recordid><startdate>20200903</startdate><enddate>20200903</enddate><creator>Holzberger,, JR., Paul E</creator><creator>Seely, Jeff</creator><creator>Key, Christopher B</creator><scope>EVB</scope></search><sort><creationdate>20200903</creationdate><title>SYSTEMS AND METHODS FOR TESTING KNOWN BAD DESTINATIONS IN A PRODUCTION NETWORK</title><author>Holzberger,, JR., Paul E ; Seely, Jeff ; Key, Christopher B</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2020280576A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2020</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Holzberger,, JR., Paul E</creatorcontrib><creatorcontrib>Seely, Jeff</creatorcontrib><creatorcontrib>Key, Christopher B</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Holzberger,, JR., Paul E</au><au>Seely, Jeff</au><au>Key, Christopher B</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SYSTEMS AND METHODS FOR TESTING KNOWN BAD DESTINATIONS IN A PRODUCTION NETWORK</title><date>2020-09-03</date><risdate>2020</risdate><abstract>The disclosure is directed to a system for testing known bad destinations while in a production network. The system can include a source controller and a destination controller in a production network. The source controller and the destination controller can have a configuration of a predetermined set of one or more known bad external destinations to test a security control device of the production network intermediary to the source controller and the destination controller. The source controller can be configured to communicate test traffic generated to a known bad external destination. The test traffic can pass through the security control device with a network identifier of the known bad external destination. The destination controller can be configured to receive the test traffic forwarded by a network device of the production network. The security control device can be validated whether or not the security control device applied security controls on the test traffic using the network identifier of the known bad external destination.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2020280576A1
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title SYSTEMS AND METHODS FOR TESTING KNOWN BAD DESTINATIONS IN A PRODUCTION NETWORK
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T19%3A43%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Holzberger,,%20JR.,%20Paul%20E&rft.date=2020-09-03&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2020280576A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true