Movatterモバイル変換


[0]ホーム

URL:


US20130198805A1 - Methods and apparatus for managing network traffic - Google Patents

Methods and apparatus for managing network traffic
Download PDF

Info

Publication number
US20130198805A1
US20130198805A1US13/748,329US201313748329AUS2013198805A1US 20130198805 A1US20130198805 A1US 20130198805A1US 201313748329 AUS201313748329 AUS 201313748329AUS 2013198805 A1US2013198805 A1US 2013198805A1
Authority
US
United States
Prior art keywords
network
notx
assertion
source
entity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/748,329
Inventor
Matthew Strebe
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
L3 Technologies Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to PCT/US2013/022773priorityCriticalpatent/WO2013112606A1/en
Priority to US13/748,329prioritypatent/US20130198805A1/en
Priority to IN6766DEN2014prioritypatent/IN2014DN06766A/en
Publication of US20130198805A1publicationCriticalpatent/US20130198805A1/en
Assigned to L3 COMMUNICATIONS CORPORATIONreassignmentL3 COMMUNICATIONS CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: STREBE, Matthew
Priority to US14/309,822prioritypatent/US9088581B2/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Methods, apparatus, and computer readable storage medium for authenticating assertions of a source are disclosed. In one aspect, a method for authenticating an assertion of a source in an environment of distributed control include receiving a notification of the assertion; determining an entity responsible for maintaining an authenticated list of assertions by the source based on a first trusted public record, determining an assertion authenticator for the entity based on a second trusted public record, determining one or more assertions of the source from the assertion authenticator, and authenticating the assertion based on the determined one or more assertions.

Description

Claims (19)

We claim:
1. A method of authenticating an assertion by a source in an environment of distributed control, comprising:
receiving a notification of the assertion;
determining an entity responsible for maintaining an authenticated list of assertions by the source based on a first trusted public record;
determining an assertion authenticator for the entity based on a second trusted public record;
determining one or more assertions of the source from the assertion authenticator; and
authenticating the assertion based on the determined one or more assertions.
2. The method ofclaim 1, wherein determining an entity responsible for maintaining an authenticated list of assertions by the source is further based on a network address associated with the source.
3. The method ofclaim 1, wherein the first public record is a public reverse DNS entry.
4. The method ofclaim 1, wherein the second public record is a public DNS entry.
5. The method ofclaim 3, wherein determining via a public record an entity responsible for maintaining an authenticated list of assertions by the source comprises:
determining a source network address indicated by the notification; and
determining a hostname based on the source network address.
6. The method ofclaim 5, wherein determining a hostname comprises performing a reverse DNS lookup based on the source network address,
7. The method ofclaim 6, wherein determining an assertion authenticator for the entity comprises performing a DNS lookup based on the hostname.
8. An apparatus for authenticating an assertion by a source, comprising:
one or more processors;
one or more memories, operably connected to the processors, wherein the one or more processors are configured to fetch instructions from the one or more memories, and the one or more memories are configured to store:
a notification module configured to receive a notification of the assertion;
an entity determining module, configured to determine an entity responsible for maintaining an authenticated list of assertions by the source based on a first trusted public record;
an assertion authenticator determination module, configured to determine an assertion authenticator for the entity based on a second trusted public record;
an assertion determining module, configured to determine zero or more assertions of the source from the assertion authenticator; and
an assertion authentication module, configured to authenticate the assertion based on the assertions of the source from the assertion authenticator.
9. The apparatus ofclaim 8, wherein the first public record is a public reverse DNS entry.
10. The apparatus ofclaim 8, wherein the second public record is a public DNS entry.
11. An apparatus for authenticating an assertion by a source, comprising:
means for receiving a notification of the assertion;
means for determining an entity responsible for maintaining an authenticated list of assertions by the source based on a first trusted public record;
means for determining an assertion authenticator for the entity based on a second trusted public record;
means for determining one or more assertions of the source from the assertion authenticator; and
means for authenticating the assertion based on the assertions of the source from the assertion authenticator.
12. The apparatus ofclaim 11, wherein the first public record is a public reverse DNS entry.
13. The apparatus ofclaim 11, wherein the second public record is a public DNS entry.
14. The apparatus ofclaim 11, wherein the means for determining via a public record an entity responsible for maintaining an authenticated list of assertions by the source is configured to determine a source network address indicated by the notification, and determine a hostname based on the source network address.
15. The apparatus ofclaim 14, wherein the means for determining via a public record an entity responsible for maintaining an authenticated list of assertions by the source is configured to determine a hostname by performing a reverse DNS lookup based on the source network address.
16. The apparatus ofclaim 15, wherein the means for determining an assertion authenticator for the entity is configured to perform a DNS lookup based on the hostname to obtain a network address of an assertion authenticator.
17. A non-transitory computer readable medium comprising instructions that when executed by a processor cause it to perform a method for authenticating an assertion by a source, the method comprising:
receiving a notification of the assertion;
determining an entity responsible for maintaining an authenticated list of assertions by the source based on a first trusted public record;
determining an assertion authenticator for the entity based on a second trusted public record;
determining one or more assertions of the source from the assertion authenticator; and
authenticating the assertion based on the determined one or more assertions.
18. The non-transitory computer readable medium ofclaim 17, wherein the first public record is a public reverse DNS entry.
19. The non-transitory computer readable medium ofclaim 17, wherein the second public record is a public DNS entry.
US13/748,3292012-01-242013-01-23Methods and apparatus for managing network trafficAbandonedUS20130198805A1 (en)

Priority Applications (4)

Application NumberPriority DateFiling DateTitle
PCT/US2013/022773WO2013112606A1 (en)2012-01-242013-01-23Methods and apparatus for managing network traffic
US13/748,329US20130198805A1 (en)2012-01-242013-01-23Methods and apparatus for managing network traffic
IN6766DEN2014IN2014DN06766A (en)2012-01-242013-01-23
US14/309,822US9088581B2 (en)2012-01-242014-06-19Methods and apparatus for authenticating an assertion of a source

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US201261590279P2012-01-242012-01-24
US13/748,329US20130198805A1 (en)2012-01-242013-01-23Methods and apparatus for managing network traffic

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US14/309,822ContinuationUS9088581B2 (en)2012-01-242014-06-19Methods and apparatus for authenticating an assertion of a source

Publications (1)

Publication NumberPublication Date
US20130198805A1true US20130198805A1 (en)2013-08-01

Family

ID=48573334

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US13/748,297Expired - Fee RelatedUS8677489B2 (en)2012-01-242013-01-23Methods and apparatus for managing network traffic
US13/748,329AbandonedUS20130198805A1 (en)2012-01-242013-01-23Methods and apparatus for managing network traffic
US14/309,822Expired - Fee RelatedUS9088581B2 (en)2012-01-242014-06-19Methods and apparatus for authenticating an assertion of a source

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US13/748,297Expired - Fee RelatedUS8677489B2 (en)2012-01-242013-01-23Methods and apparatus for managing network traffic

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US14/309,822Expired - Fee RelatedUS9088581B2 (en)2012-01-242014-06-19Methods and apparatus for authenticating an assertion of a source

Country Status (4)

CountryLink
US (3)US8677489B2 (en)
EP (1)EP2807574A4 (en)
IN (1)IN2014DN06766A (en)
WO (1)WO2013112606A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20110282981A1 (en)*2010-05-112011-11-17Alcatel-Lucent Canada Inc.Behavioral rule results
CN103428224A (en)*2013-08-292013-12-04中国科学院计算技术研究所Method and device for intelligently defending DDoS attacks
US8856330B2 (en)*2013-03-042014-10-07Fmr LlcSystem for determining whether to block internet access of a portable system based on its current network configuration
US20150052247A1 (en)*2013-08-142015-02-19Verizon Patent And Licensing Inc.Private cloud topology management system
US10432650B2 (en)2016-03-312019-10-01Stuart StanifordSystem and method to protect a webserver against application exploits and attacks
CN110572451A (en)*2019-09-042019-12-13腾讯科技(深圳)有限公司Data processing method, device and storage medium

Families Citing this family (55)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11095687B2 (en)*2011-11-182021-08-17Blue Armor Technologies, LLCNetwork security system using statistical object identification
CN104011701B (en)2011-12-142017-08-01第三雷沃通讯有限责任公司 Content delivery network system and method operable in a content delivery network
US8972509B2 (en)*2012-07-272015-03-03Adobe Systems IncorporatedAutomated rich-content messaging
US9344320B1 (en)*2012-10-182016-05-17Amazon Technologies, Inc.Return path trace
US9565213B2 (en)*2012-10-222017-02-07Centripetal Networks, Inc.Methods and systems for protecting a secured network
US9661046B2 (en)2012-12-132017-05-23Level 3 Communications, LlcDevices and methods supporting content delivery with adaptation services
US10791050B2 (en)2012-12-132020-09-29Level 3 Communications, LlcGeographic location determination in a content delivery framework
US20140337472A1 (en)2012-12-132014-11-13Level 3 Communications, LlcBeacon Services in a Content Delivery Framework
US10652087B2 (en)2012-12-132020-05-12Level 3 Communications, LlcContent delivery framework having fill services
US10701148B2 (en)2012-12-132020-06-30Level 3 Communications, LlcContent delivery framework having storage services
US9634918B2 (en)2012-12-132017-04-25Level 3 Communications, LlcInvalidation sequencing in a content delivery framework
US10701149B2 (en)2012-12-132020-06-30Level 3 Communications, LlcContent delivery framework having origin services
US9027140B1 (en)*2013-08-222015-05-05Appthority, Inc.Application malware filtering for advertising networks
US9060021B2 (en)*2013-08-302015-06-16Bank Of America CorporationDDoS detection using sensor grid
US9929939B2 (en)2013-12-262018-03-27Coriant Operations, Inc.Systems, apparatuses, and methods for rerouting network traffic
US9973472B2 (en)2015-04-022018-05-15Varmour Networks, Inc.Methods and systems for orchestrating physical and virtual switches to enforce security boundaries
US9774611B1 (en)*2014-03-112017-09-26Amazon Technologies, Inc.Dynamically deploying a network traffic filter
WO2015156788A1 (en)*2014-04-092015-10-15Hewlett-Packard Development Company, L.P.Identifying suspicious activity in a load test
US9686278B1 (en)*2014-05-072017-06-20Skyport Systems, Inc.Method and system for configuring computing devices
SG11201703820WA (en)*2014-12-112017-06-29Bitdefender Ipr Man LtdSystems and methods for automatic device detection, device management, and remote assistance
US9591022B2 (en)2014-12-172017-03-07The Boeing CompanyComputer defenses and counterattacks
US10193922B2 (en)2015-01-132019-01-29Level 3 Communications, LlcISP blacklist feed
US10178070B2 (en)2015-03-132019-01-08Varmour Networks, Inc.Methods and systems for providing security to distributed microservices
US9294442B1 (en)2015-03-302016-03-22Varmour Networks, Inc.System and method for threat-driven security policy controls
US10193929B2 (en)2015-03-132019-01-29Varmour Networks, Inc.Methods and systems for improving analytics in distributed networks
US9438634B1 (en)2015-03-132016-09-06Varmour Networks, Inc.Microsegmented networks that implement vulnerability scanning
US9467476B1 (en)2015-03-132016-10-11Varmour Networks, Inc.Context aware microsegmentation
US9380027B1 (en)2015-03-302016-06-28Varmour Networks, Inc.Conditional declarative policies
US9525697B2 (en)*2015-04-022016-12-20Varmour Networks, Inc.Delivering security functions to distributed networks
US9483317B1 (en)2015-08-172016-11-01Varmour Networks, Inc.Using multiple central processing unit cores for packet forwarding in virtualized networks
US9824170B1 (en)*2016-01-062017-11-21Xilinx, Inc.Message filtering for electronic design automation systems
US10484423B2 (en)*2016-02-192019-11-19Secureworks Corp.System and method for detecting and monitoring thread creation
EP3424196A1 (en)*2016-02-292019-01-09Level 3 Communications, LLCSystems and methods for dynamic firewall policy configuration
US10148618B2 (en)*2016-06-072018-12-04Abb Schweiz AgNetwork isolation
US10505971B1 (en)*2016-11-072019-12-10Xilinx, Inc.Protecting local network devices against attacks from remote network devices
WO2018111161A1 (en)*2016-12-152018-06-21Telefonaktiebolaget Lm Ericsson (Publ)Method for secure communication on ethernet
US10038671B2 (en)*2016-12-312018-07-31Fortinet, Inc.Facilitating enforcement of security policies by and on behalf of a perimeter network security device by providing enhanced visibility into interior traffic flows
US10958623B2 (en)*2017-05-262021-03-23Futurewei Technologies, Inc.Identity and metadata based firewalls in identity enabled networks
WO2018224720A1 (en)*2017-06-072018-12-13Airo Finland OyDefend against denial of service attack
US10757105B2 (en)*2017-06-122020-08-25At&T Intellectual Property I, L.P.On-demand network security system
US11063910B2 (en)*2017-07-312021-07-13Fastly, Inc.Web application firewall for an online service
CN110505176B9 (en)*2018-05-162023-04-11中兴通讯股份有限公司Method and device for determining and sending message priority, and routing system
US11483287B2 (en)*2018-06-132022-10-25Nokia Solutions And Networks OyReliable firewall
US10862750B2 (en)*2019-03-312020-12-08Td Ameritrade Ip Company, Inc.Network configuration apparatus
US10979228B1 (en)*2019-10-102021-04-13Oasis Medical, Inc.Secure digital information infrastructure
US10652022B1 (en)2019-10-102020-05-12Oasis Medical, Inc.Secure digital information infrastructure
FR3103920A1 (en)*2019-11-292021-06-04Orange Assistance method for the management of a computer attack, associated device and system.
US11494487B2 (en)2020-04-272022-11-08The Boeing CompanyMethods and systems for secure message transmissions between trust domains
US11838267B2 (en)2020-07-162023-12-05Twistlock, Ltd.Distributed identity-based firewall policy evaluation
US11973805B2 (en)*2021-01-202024-04-30Servicenow, Inc.Customizable certificate validation policy
US11909763B2 (en)*2021-04-072024-02-20Cisco Technology, Inc.BGP blackhole and hijack mitigation
US12034768B2 (en)2021-04-142024-07-09Bank Of America CorporationInformation security system and method for phishing domain detection
US12088498B2 (en)2022-02-032024-09-10Karunesh Rama KAIMALMethods and systems for determining preferred linked network path between two network devices
US12143364B2 (en)*2022-10-142024-11-12Motorola Solutions, Inc.Device, system, and method for provisioning firewall engines
CN116248386A (en)*2023-02-202023-06-09中国联合网络通信集团有限公司DDOS attack protection method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030005334A1 (en)*1996-10-172003-01-02Wesinger Ralph E.Firewall providing enhanced network security and user transparency
US20040151323A1 (en)*2000-04-252004-08-05Secure Data In Motion, Inc.Implementing nonrepudiation and audit using authentication assertions and key servers
US20080028228A1 (en)*2006-07-312008-01-31Ebay Inc.Method and system for access authentication

Family Cites Families (64)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7917647B2 (en)*2000-06-162011-03-29Mcafee, Inc.Method and apparatus for rate limiting
US6789203B1 (en)*2000-06-262004-09-07Sun Microsystems, Inc.Method and apparatus for preventing a denial of service (DOS) attack by selectively throttling TCP/IP requests
US20020120853A1 (en)*2001-02-272002-08-29Networks Associates Technology, Inc.Scripted distributed denial-of-service (DDoS) attack discrimination using turing tests
US20040015579A1 (en)*2001-06-142004-01-22Geoffrey CooperMethod and apparatus for enterprise management
US7028179B2 (en)*2001-07-032006-04-11Intel CorporationApparatus and method for secure, automated response to distributed denial of service attacks
WO2004006115A1 (en)*2002-07-022004-01-15Netscaler, IncSystem, method and computer program product to avoid server overload by controlling http denial of service (dos) attacks
KR100481614B1 (en)*2002-11-192005-04-08한국전자통신연구원METHOD AND APPARATUS FOR PROTECTING LEGITIMATE TRAFFIC FROM DoS AND DDoS ATTACKS
US20040128542A1 (en)*2002-12-312004-07-01International Business Machines CorporationMethod and system for native authentication protocols in a heterogeneous federated environment
JP2004229125A (en)*2003-01-242004-08-12Sony CorpTransmitter and receiver
US7254713B2 (en)*2003-09-112007-08-07AlcatelDOS attack mitigation using upstream router suggested remedies
US7788711B1 (en)*2003-10-092010-08-31Oracle America, Inc.Method and system for transferring identity assertion information between trusted partner sites in a network using artifacts
US20050144441A1 (en)*2003-12-312005-06-30Priya GovindarajanPresence validation to assist in protecting against Denial of Service (DOS) attacks
CN100370757C (en)*2004-07-092008-02-20国际商业机器公司Method and system for dentifying a distributed denial of service (DDOS) attack within a network and defending against such an attack
US7634813B2 (en)2004-07-212009-12-15Microsoft CorporationSelf-certifying alert
US7984149B1 (en)*2004-08-042011-07-19Cisco Technology, Inc.Method and apparatus for identifying a policy server
US8423645B2 (en)*2004-09-142013-04-16International Business Machines CorporationDetection of grid participation in a DDoS attack
US7669241B2 (en)*2004-09-302010-02-23Alcatel-Lucent Usa Inc.Streaming algorithms for robust, real-time detection of DDoS attacks
US20060095459A1 (en)*2004-10-292006-05-04Warren AdelmanPublishing domain name related reputation in whois records
US20060200487A1 (en)2004-10-292006-09-07The Go Daddy Group, Inc.Domain name related reputation and secure certificates
US9160755B2 (en)2004-12-212015-10-13Mcafee, Inc.Trusted communication network
US7779471B2 (en)*2005-04-052010-08-17Cisco Technology, Inc.Method and system for preventing DOS attacks
US7694338B1 (en)*2005-06-032010-04-06Sprint Communications Company L.P.Shared tap DOS-attack protection
JP4557815B2 (en)*2005-06-132010-10-06富士通株式会社 Relay device and relay system
US8181240B2 (en)*2005-06-142012-05-15Cisco Technology, Inc.Method and apparatus for preventing DOS attacks on trunk interfaces
US7584507B1 (en)*2005-07-292009-09-01Narus, Inc.Architecture, systems and methods to detect efficiently DoS and DDoS attacks for large scale internet
US20070083927A1 (en)*2005-10-112007-04-12Intel CorporationMethod and system for managing denial of services (DoS) attacks
US20070130619A1 (en)*2005-12-062007-06-07Sprint Communications Company L.P.Distributed denial of service (DDoS) network-based detection
US7797738B1 (en)*2005-12-142010-09-14At&T Corp.System and method for avoiding and mitigating a DDoS attack
US8225399B1 (en)*2005-12-142012-07-17At&T Intellectual Property Ii, LpSystem and method for avoiding and mitigating a DDoS attack
US20070147376A1 (en)*2005-12-222007-06-28Sun Microsystems, Inc.Router-assisted DDoS protection by tunneling replicas
KR100828372B1 (en)*2005-12-292008-05-08삼성전자주식회사Method and apparatus for protecting servers from DOS attack
JP4764930B2 (en)*2006-03-032011-09-07ニュー ジャージー インスティチュート オブ テクノロジー Behavior-based traffic identification (BTD) for distributed denial of service (DDoS) attack protection
US8248946B2 (en)*2006-06-062012-08-21Polytechnic Institute of New York UnversityProviding a high-speed defense against distributed denial of service (DDoS) attacks
US8966619B2 (en)*2006-11-082015-02-24Verizon Patent And Licensing Inc.Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using return routability check filtering
US9473529B2 (en)*2006-11-082016-10-18Verizon Patent And Licensing Inc.Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using method vulnerability filtering
US20080127324A1 (en)*2006-11-242008-05-29Electronics And Telecommunications Research InstituteDDoS FLOODING ATTACK RESPONSE APPROACH USING DETERMINISTIC PUSH BACK METHOD
US7853998B2 (en)2007-03-222010-12-14Mocana CorporationFirewall propagation
US8180032B2 (en)*2007-05-112012-05-15At&T Intellectual Property I, L.P.Methods and systems for protecting a telecommunication service from Denial of Service (DoS) attack
WO2008148106A1 (en)*2007-05-252008-12-04New Jersey Institute Of TechnologyProactive test-based differentiation method and system to mitigate low rate dos attacks
US8302186B2 (en)*2007-06-292012-10-30Verizon Patent And Licensing Inc.System and method for testing network firewall for denial-of-service (DOS) detection and prevention in signaling channel
US20090013404A1 (en)*2007-07-052009-01-08Alcatel LucentDistributed defence against DDoS attacks
US8370937B2 (en)*2007-12-032013-02-05Cisco Technology, Inc.Handling of DDoS attacks from NAT or proxy devices
CN101505263B (en)2008-02-052011-10-26华为技术有限公司 A method and device for selecting a super maintenance node
US8045486B2 (en)2008-05-152011-10-25Solarwinds Worldwide, LlcDiscovery and visualization of active directory domain controllers in topological network maps
KR100908404B1 (en)*2008-09-042009-07-20(주)이스트소프트 Defending Method and Defense System for Distributed Denial of Service Attacks
US8769682B2 (en)*2008-09-182014-07-01Alcatel LucentMechanism for identifying malicious content, DoS attacks, and illegal IPTV services
KR100900491B1 (en)*2008-12-022009-06-03(주)씨디네트웍스 Methods and Devices for Blocking Distributed Denial of Service Attacks
EP2249540B1 (en)2009-05-042020-03-18Alcatel LucentMethod for verifying a user association, intercepting module and network node element
KR100942456B1 (en)*2009-07-232010-02-12주식회사 안철수연구소Method for detecting and protecting ddos attack by using cloud computing and server thereof
KR101077135B1 (en)*2009-10-222011-10-26한국인터넷진흥원Apparatus for detecting and filtering application layer DDoS Attack of web service
US8874929B2 (en)*2009-10-272014-10-28Lockheed Martin CorporationCross domain discovery
KR101061375B1 (en)*2009-11-022011-09-02한국인터넷진흥원 JR type based DDoS attack detection and response device
US20110138463A1 (en)*2009-12-072011-06-09Electronics And Telecommunications Research InstituteMethod and system for ddos traffic detection and traffic mitigation using flow statistics
US8904183B2 (en)*2010-03-252014-12-02GM Global Technology Operations LLCEfficient technique to achieve non-repudiation and resilience to DoS attacks in wireless networks
US8819282B2 (en)*2010-08-062014-08-26International Business Machines CorporationUsing unique local unicast addresses in a global domain name server
KR101377462B1 (en)*2010-08-242014-03-25한국전자통신연구원Automated Control Method And Apparatus of DDos Attack Prevention Policy Using the status of CPU and Memory
EP2619958B1 (en)*2010-09-242018-02-21Verisign, Inc.Ip prioritization and scoring method and system for ddos detection and mitigation
US8872835B2 (en)*2010-09-292014-10-28Microsoft CorporationPrevention of DoS attack by a rogue graphics application
US8566449B2 (en)2010-12-032013-10-22Salesforce.Com, Inc.Method and system for validating configuration data in a multi-tenant environment
KR101574193B1 (en)*2010-12-132015-12-11한국전자통신연구원Apparatus and method for defending DDoS attack
US8711791B2 (en)*2010-12-202014-04-29Telefonaktiebolaget L M Ericsson (Publ)Denial of service (DoS) attack prevention through random access channel resource reallocation
US20120174196A1 (en)*2010-12-302012-07-05Suresh BhogavilliActive validation for ddos and ssl ddos attacks
US8689328B2 (en)*2011-02-112014-04-01Verizon Patent And Licensing Inc.Maliciouis user agent detection and denial of service (DOS) detection and prevention using fingerprinting
US9019815B2 (en)2011-08-012015-04-28Cisco Technology, Inc.Source alive route injection

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030005334A1 (en)*1996-10-172003-01-02Wesinger Ralph E.Firewall providing enhanced network security and user transparency
US20040151323A1 (en)*2000-04-252004-08-05Secure Data In Motion, Inc.Implementing nonrepudiation and audit using authentication assertions and key servers
US20080028228A1 (en)*2006-07-312008-01-31Ebay Inc.Method and system for access authentication

Cited By (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20110282981A1 (en)*2010-05-112011-11-17Alcatel-Lucent Canada Inc.Behavioral rule results
US8856330B2 (en)*2013-03-042014-10-07Fmr LlcSystem for determining whether to block internet access of a portable system based on its current network configuration
US20150052247A1 (en)*2013-08-142015-02-19Verizon Patent And Licensing Inc.Private cloud topology management system
US9338223B2 (en)*2013-08-142016-05-10Verizon Patent And Licensing Inc.Private cloud topology management system
CN103428224A (en)*2013-08-292013-12-04中国科学院计算技术研究所Method and device for intelligently defending DDoS attacks
US10432650B2 (en)2016-03-312019-10-01Stuart StanifordSystem and method to protect a webserver against application exploits and attacks
CN110572451A (en)*2019-09-042019-12-13腾讯科技(深圳)有限公司Data processing method, device and storage medium

Also Published As

Publication numberPublication date
WO2013112606A1 (en)2013-08-01
IN2014DN06766A (en)2015-05-22
EP2807574A1 (en)2014-12-03
US20130152187A1 (en)2013-06-13
EP2807574A4 (en)2015-11-18
US9088581B2 (en)2015-07-21
US8677489B2 (en)2014-03-18
US20140304776A1 (en)2014-10-09

Similar Documents

PublicationPublication DateTitle
US9088581B2 (en)Methods and apparatus for authenticating an assertion of a source
US20250158962A1 (en)Cloud-based Intrusion Prevention System, Multi-Tenant Firewall, and Stream Scanner
Dayal et al.Research trends in security and DDoS in SDN
AblizInternet denial of service attacks and defense mechanisms
Handley et al.Internet denial-of-service considerations
Geva et al.Bandwidth distributed denial of service: Attacks and defenses
JP2024178324A (en) ENCRYPTED SNI FILTERING METHOD AND SYSTEM FOR CYBER SECURITY APPLICATIONS - Patent application
US9060019B2 (en)Out-of band IP traceback using IP packets
Sriram et al.Resilient interdomain traffic exchange
RajkumarA survey on latest DoS attacks: classification and defense mechanisms
Haddadi et al.DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment
Jafarian et al.Detecting network scanning through monitoring and manipulation of dns traffic
JeyanthiInternet of things (IoT) as interconnection of threats (IoT)
Meena et al.Distributed denial of service attacks and their suggested defense remedial approaches
Wong et al.Network infrastructure security
Ghorbani et al.Network attacks
Fowler et al.Impact of denial of service solutions on network quality of service
AT&T0.8-21shots.eps
Freet et al.An overview of architectural and security considerations for named data networking (ndn)
KaeoOperational Security Current Practices in Internet Service Provider Environments
Beak et al.A novel packet marketing method in DDoS attack detection
PahlevanSignaling and Policy Enforcement for Cooperative Firewalls
Ageel et al.SURVEY: SECURING IPV6 NEIGHBOR DISCOVERY PROTOCOL
Al-Qudah et al.Internet with transient destination-controlled addressing
Zhang et al.Revealing the Architectural Design Patterns in the Volumetric DDoS Defense Design Space

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:L3 COMMUNICATIONS CORPORATION, NEW YORK

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:STREBE, MATTHEW;REEL/FRAME:031272/0319

Effective date:20130906

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp