DETECTION OF THE NETWORK LOGON PROTOCOL USED IN PASS-THROUGH AUTHENTICATION
The network logon protocol used in a pass-through authentication request embedded in an encrypted network packet is identified. A protocol detection engine correlates events and network requests received at a domain controller in order to use the data contained in a correlated pair to determine a si...
Saved in:
Main Authors | , , , |
---|---|
Format | Patent |
Language | English French German |
Published |
08.07.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The network logon protocol used in a pass-through authentication request embedded in an encrypted network packet is identified. A protocol detection engine correlates events and network requests received at a domain controller in order to use the data contained in a correlated pair to determine a size of a challenge response in the encrypted network packet. The size of the response is used to identify the network logon protocol used in the pass-through authentication request. |
---|---|
Bibliography: | Application Number: EP20180743926 |