DETECTION OF THE NETWORK LOGON PROTOCOL USED IN PASS-THROUGH AUTHENTICATION

The network logon protocol used in a pass-through authentication request embedded in an encrypted network packet is identified. A protocol detection engine correlates events and network requests received at a domain controller in order to use the data contained in a correlated pair to determine a si...

Full description

Saved in:
Bibliographic Details
Main Authors GRADY ASHKENAZY, Itai, SIMAKOV, Marina, DUBINSKY, Michael, MAOR, Tal Joseph
Format Patent
LanguageEnglish
French
German
Published 08.07.2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The network logon protocol used in a pass-through authentication request embedded in an encrypted network packet is identified. A protocol detection engine correlates events and network requests received at a domain controller in order to use the data contained in a correlated pair to determine a size of a challenge response in the encrypted network packet. The size of the response is used to identify the network logon protocol used in the pass-through authentication request.
Bibliography:Application Number: EP20180743926