Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

NSA patents a way to spot network snoops
IT World ^ | 21 December 2008 | Robert McMillan

Posted on 12/23/2008 6:22:56 AM PST by COBOL2Java

The U.S. National Security Agency has patented a technique for figuring out whether someone is tampering with network communication.

The NSA's software does this by measuring the amount of time the network takes to send different types of data from one computer to another and raising a red flag if something takes too long, according to the patent filing.

Other researchers have looked into this problem in the past and proposed a technique called distance bounding, but the NSA patent takes a different tack, comparing different types of data travelling across the network. "The neat thing about this particular patent is that they look at the differences between the network layers," said Tadayoshi Kohno, an assistant professor of computer science at the University of Washington.

The technique could be used for purposes such as detecting a fake phishing Web site that was intercepting data between users and their legitimate banking sites, he said. "This whole problem space has a lot of potential, [although] I don't know if this is going to be the final solution that people end up using."

IOActive security researcher Dan Kaminsky was less impressed. "Think of it as -- 'if your network gets a little slower, maybe a bad guy has physically inserted a device that is intercepting and retransmitting packets,' " he said via e-mail. "Sure, that's possible. Or perhaps you're routing through a slower path for one of a billion reasons."

Some might think of the secretive NSA, which collects and analyzes foreign communications, as an unlikely source for such research, but the agency also helps the federal government protect its own communications.

The NSA did not answer questions concerning the patent, except to say, via e-mail, that it does make some of its technology available through its Domestic Technology Transfer Program.

The patent, granted Tuesday, was filed with the U.S. Patent and Trademark Office in 2005. It was first reported Thursday on the Cryptome Web site.


TOPICS:
KEYWORDS: nsa

1 posted on 12/23/2008 6:22:56 AM PST by COBOL2Java
[ Post Reply | Private Reply | View Replies]

To: COBOL2Java
Patent# 7,466,654: USPTO.

Google doesn't have it up, yet.

Based on nothing but the abstract, it sounds interesting. Don't have the time to analyze it in any great depth right now.

2 posted on 12/23/2008 6:31:23 AM PST by CE2949BB (Fight.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Looks like a possible remedy for detecting ARP poisoning and other ‘man in the middle’ type attacks.


3 posted on 12/23/2008 7:04:35 AM PST by KoRn
[ Post Reply | Private Reply | To 1 | View Replies]

To: COBOL2Java
This process is not much different than how illegal taps on phone lines are detected.
4 posted on 12/23/2008 7:33:47 AM PST by ex 98C MI Dude (All of my hate cannot be found, I will not be drowned by your constant scheming)
[ Post Reply | Private Reply | To 1 | View Replies]

To: COBOL2Java

HUN? Help me out here; I had no idea a government agency could claim private intellectual property rights.


5 posted on 12/23/2008 8:22:27 AM PST by Carry_Okie (If Barack Obama is Vladamir Lenin, Bill Ayers is Leon Trotsky.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

6 posted on 12/23/2008 8:29:56 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Carry_Okie
Inventors: Reifer; Michael H. (Columbia, MD)
Assignee: The United States of America as represented by the Director, National Security Agency (Washington, DC)
N/A (
Appl. No.: 11/145,237
Filed: May 24, 2005
7 posted on 12/23/2008 8:51:35 AM PST by BullDog108 (A Smith & Wesson beats four aces)
[ Post Reply | Private Reply | To 5 | View Replies]

To: COBOL2Java

Sounds like this method discussed will generate lots of false positives.


8 posted on 12/23/2008 8:53:20 AM PST by zeugma (Will it be nukes or aliens? Time will tell.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BullDog108
I really don't care about what they are claiming or how they filed; I am wondering about the Constitutionality of the claim.
9 posted on 12/23/2008 2:17:57 PM PST by Carry_Okie (If Barack Obama is Vladamir Lenin, Bill Ayers is Leon Trotsky.)
[ Post Reply | Private Reply | To 7 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson