Patent attributes
Embodiments include apparatuses, methods, and systems for managing security of a communication network. A message, formatted based on a stateless communication protocol for a communication network, may be received from a first computing device and by a second computing device. The second computing device generates a fingerprint of the message based on at least a portion of a header of the message or a portion of a body of the message. In addition, the second computing device detects whether the generated fingerprint of the message has a duplicated fingerprint already stored in the storage device, where the message is a retried message or replayed message of a message having the duplicated fingerprint. In embodiments, the fingerprint may be generated using a hash function based on the message.