Movatterモバイル変換


[0]ホーム

URL:


US20130269023A1 - Cloud Based Firewall System And Service - Google Patents

Cloud Based Firewall System And Service
Download PDF

Info

Publication number
US20130269023A1
US20130269023A1US13/896,995US201313896995AUS2013269023A1US 20130269023 A1US20130269023 A1US 20130269023A1US 201313896995 AUS201313896995 AUS 201313896995AUS 2013269023 A1US2013269023 A1US 2013269023A1
Authority
US
United States
Prior art keywords
application layer
layer request
content
application
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US13/896,995
Inventor
John A. Dilley
Prasanna Laghate
John Summers
Thomas Devanneaux
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Akamai Technologies Inc
Original Assignee
Akamai Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filedlitigationCriticalhttps://patents.darts-ip.com/?family=44146221&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20130269023(A1)"Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Akamai Technologies IncfiledCriticalAkamai Technologies Inc
Priority to US13/896,995priorityCriticalpatent/US20130269023A1/en
Publication of US20130269023A1publicationCriticalpatent/US20130269023A1/en
Assigned to AKAMAI TECHNOLOGIES, INC.reassignmentAKAMAI TECHNOLOGIES, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SUMMERS, JOHN, DEVANNEAUX, THOMAS, DILLEY, JOHN, LAGHATE, PRASANNA
Priority to US14/555,428prioritypatent/US20150089582A1/en
Priority to US14/998,187prioritypatent/US10243925B2/en
Priority to US16/266,335prioritypatent/US11082401B2/en
Grantedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A cloud-based firewall system and service is provided to protect customer sites from attacks, leakage of confidential information, and other security threats. In various embodiments, such a firewall system and service can be implemented in conjunction with a content delivery network (CDN) having a plurality of distributed content servers. The CDN servers receive requests for content identified by the customer for delivery via the CDN. The CDN servers include firewalls that examine those requests and take action against security threats, so as to prevent them from reaching the customer site. The CDN provider implements the firewall system as a managed firewall service, with the operation of the firewalls for given customer content being defined by that customer, independently of other customers. In some embodiments, a customer may define different firewall configurations for different categories of that customer's content identified for delivery via the CDN.

Description

Claims (21)

What is claimed is:
1.-51. (canceled)
52. A system, comprising:
a plurality of machines operated by a service provider on behalf of content providers, each of the plurality of machines comprising circuitry forming one or more processors coupled to non-transitory computer-readable media storing program code executable by the one or more processors, the program code including code executable to run a server application on the respective machine;
the program code further including code executable to cause the respective machine to receive an application layer request from a client via a network interface on the respective machine, and to handle the application layer request with the server application;
wherein the application layer request includes a domain name associated with a particular content provider;
the program code further including code executable to cause the respective machine to, based on the domain name, identify one or more rules from a security ruleset to apply to the application layer request, wherein rules in the security ruleset function to find security threats in application layer requests;
the program code further including code executable to cause the respective machine to apply the one or more rules to the application layer request to determine whether one or more security threats are found in the application layer request, and if any of the one or more security threats are found, take an action against the application layer request.
53. The system ofclaim 52, wherein the server application is a proxy server application.
54. The system ofclaim 52, wherein the server application is an HTTP server application.
55. The system ofclaim 52, wherein the application layer request comprises an HTTP request.
56. The system ofclaim 52, wherein the plurality of machines are distributed across a plurality of end-user access networks.
57. The system ofclaim 52, wherein the plurality of machines are distributed around the Internet.
58. The system ofclaim 52, wherein the system further comprises:
separate from the plurality of machines running the server applications, one or more machines operated by the service provider that comprise circuitry forming one or more processors coupled to non-transitory computer-readable media storing program code executable by the one or more processors, the program code including code executable to cause the one or more machines to provide a user interface, and to receive, via the user interface, rule configurations for content providers that include selections of one or more rules from the security ruleset;
the program code further including code executable to cause the one or more machines to deploy the rule configurations for content providers to the plurality of machines running the server applications.
59. The system ofclaim 58, wherein the rule configurations are received from content providers via the user interface.
60. The system ofclaim 52, the program code including code executable to cause the respective machine to process an application layer request with the server application where application of the one or more rules do not find a security threat in the application layer request,
wherein said processing of the application layer request comprises at least one of:
(i) applying content handling information to determine how to handle the application layer request with the server application;
(ii) retrieving content from a cache, and serving the retrieved content to the client, in response to the application layer request, and
(iii) retrieving content from an origin server associated with the particular content provider and serving the retrieved content to the client, in response to the application layer request.
61. The system ofclaim 52, the program code further including code executable to cause the respective machine to receive a second application layer request from a second client via the network interface on the respective machine, and executable to cause the respective machine to handle the application layer request with the server application;
wherein the second application layer request includes a second domain name associated with a second content provider;
the program code further including code executable to cause the respective machine to identify a second set of one or more rules from the security ruleset to apply to the application layer request;
the program code further including code executable to cause the respective machine to apply the second set of one or more rules to the application layer request to determine whether a second set of one or more security threats are found in the application layer request, and if any of the second set of one or more security threats are found, take an action against the application layer request.
62. The system ofclaim 52, wherein the one or more security threats comprise at least one of: a protocol violation, an HTTP policy violation, a robot, a Trojan, a cross-site scripting attack, an injection attack, a content leakage.
63. The system ofclaim 52, wherein the action is any of the following actions: deny the application layer request, generate an alert about the application layer request, block the application layer request, modify the application layer request, stop processing the application layer request. Para16, original claim8
64. A method, comprising:
with a machine operated by a service provider on behalf of content providers that comprises circuitry forming one or more processors coupled to non-transitory computer-readable media storing program code executable by the one or more processors:
running a server application on the machine;
receiving an application layer request from a client via a network interface on the machine, and handling the application layer request with the server application;
wherein the application layer request includes a domain name associated with a particular content provider;
based on the domain name, identifying one or more rules from a security ruleset to apply to the application layer request, wherein rules in the security ruleset function to find security threats in application layer requests;
applying the one or more rules to the application layer request to determine whether one or more security threats are found in the application layer request, and if any of the one or more security threats are found, taking an action against the application layer request.
65. The method ofclaim 64, wherein the server application is a proxy server application.
66. The method ofclaim 64, wherein the server application is an HTTP server application.
67. The method ofclaim 64, wherein the application layer request comprises an HTTP request.
68. The method ofclaim 64, further comprising processing an application layer request with the server application where application of the one or more rules do not find a security threat in the application layer request,
wherein said processing of the application layer request comprises at least one of:
(i) applying content handling information to determine how to handle the application layer request with the server application;
(ii) retrieving content from a cache, and serving the retrieved content to the client, in response to the application layer request, and
(iii) retrieving content from an origin server associated with the particular content provider and serving the retrieved content to the client, in response to the application layer request.
69. The method ofclaim 64, further comprising receiving a second application layer request from a second client via the network interface on the machine, and handling the application layer request with the server application;
wherein the second application layer request includes a second domain name associated with a second content provider;
identifying, based on the second domain name, a second set of one or more rules from the security ruleset to apply to the second application layer request;
applying the second set of one or more rules to the application layer request to determine whether a second set of one or more security threats are found in the second application layer request, and if any of the second set of one or more security threats are found, take an action against the second application layer request.
70. The method ofclaim 64, wherein the one or more security threats comprise at least one of: a protocol violation, an HTTP policy violation, a robot, a Trojan, a cross-site scripting attack, an injection attack, a content leakage.
71. The method ofclaim 64, wherein the action is any of the following actions: deny the application layer request, generate an alert about the application layer request, block the application layer request, modify the application layer request, stop processing the application layer request.
US13/896,9952009-12-122013-05-17Cloud Based Firewall System And ServiceGrantedUS20130269023A1 (en)

Priority Applications (4)

Application NumberPriority DateFiling DateTitle
US13/896,995US20130269023A1 (en)2009-12-122013-05-17Cloud Based Firewall System And Service
US14/555,428US20150089582A1 (en)2009-12-122014-11-26Cloud Based Firewall System And Service
US14/998,187US10243925B2 (en)2009-12-122015-12-24Cloud based firewell system and service
US16/266,335US11082401B2 (en)2009-12-122019-02-04Cloud based firewall system and service

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US28595809P2009-12-122009-12-12
US12/965,188US8458769B2 (en)2009-12-122010-12-10Cloud based firewall system and service
US13/896,995US20130269023A1 (en)2009-12-122013-05-17Cloud Based Firewall System And Service

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US12/965,188ContinuationUS8458769B2 (en)2009-12-122010-12-10Cloud based firewall system and service

Related Child Applications (2)

Application NumberTitlePriority DateFiling Date
US14/555,428ContinuationUS20150089582A1 (en)2009-12-122014-11-26Cloud Based Firewall System And Service
US14/998,187ContinuationUS10243925B2 (en)2009-12-122015-12-24Cloud based firewell system and service

Publications (1)

Publication NumberPublication Date
US20130269023A1true US20130269023A1 (en)2013-10-10

Family

ID=44146221

Family Applications (5)

Application NumberTitlePriority DateFiling Date
US12/965,188Active2031-04-14US8458769B2 (en)2009-12-122010-12-10Cloud based firewall system and service
US13/896,995GrantedUS20130269023A1 (en)2009-12-122013-05-17Cloud Based Firewall System And Service
US14/555,428AbandonedUS20150089582A1 (en)2009-12-122014-11-26Cloud Based Firewall System And Service
US14/998,187ActiveUS10243925B2 (en)2009-12-122015-12-24Cloud based firewell system and service
US16/266,335ActiveUS11082401B2 (en)2009-12-122019-02-04Cloud based firewall system and service

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US12/965,188Active2031-04-14US8458769B2 (en)2009-12-122010-12-10Cloud based firewall system and service

Family Applications After (3)

Application NumberTitlePriority DateFiling Date
US14/555,428AbandonedUS20150089582A1 (en)2009-12-122014-11-26Cloud Based Firewall System And Service
US14/998,187ActiveUS10243925B2 (en)2009-12-122015-12-24Cloud based firewell system and service
US16/266,335ActiveUS11082401B2 (en)2009-12-122019-02-04Cloud based firewall system and service

Country Status (5)

CountryLink
US (5)US8458769B2 (en)
EP (1)EP2510648B1 (en)
CN (1)CN102687480B (en)
ES (1)ES2702097T3 (en)
WO (1)WO2011072289A2 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103561076A (en)*2013-10-282014-02-05中国科学院信息工程研究所Webpage trojan-linking real-time protection method and system based on cloud
US20140108319A1 (en)*2012-10-122014-04-17Bruno KLAUSERAutonomic network sentinels
US20140250352A1 (en)*2013-03-042014-09-04Lsi CorporationSystems and Methods for Signal Reduction Based Data Processor Marginalization
US20140283139A1 (en)*2013-03-152014-09-18Kunal AnandSystems and methods for parsing user-generated content to prevent attacks
WO2016039643A1 (en)*2014-09-122016-03-17Pickles Samuel GeoffreyA telecommunications defence system
US10462188B2 (en)2015-04-302019-10-29Opaq Networks, Inc.Computer network security system
WO2019217709A1 (en)*2018-05-102019-11-14Opaq Networks, Inc.Systems and methods for centrally managed host and network firewall services
US10498757B2 (en)2014-09-112019-12-03Samuel Geoffrey PicklesTelecommunications defence system
WO2020205719A1 (en)*2019-03-292020-10-08Jpmorgan Chase Bank, N.A.Dynamic application firewalling in cloud systems
WO2022182384A1 (en)*2021-02-242022-09-01Level 3 Communications, LlcUniformity of instructions for content requests and responses in a content delivery network

Families Citing this family (88)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8533821B2 (en)*2007-05-252013-09-10International Business Machines CorporationDetecting and defending against man-in-the-middle attacks
US9071650B1 (en)*2008-09-172015-06-30Socialware, Inc.Method, system and computer program product for enforcing access controls to features and subfeatures on uncontrolled web application
US20100269162A1 (en)2009-04-152010-10-21Jose BravoWebsite authentication
US8683609B2 (en)2009-12-042014-03-25International Business Machines CorporationMobile phone and IP address correlation service
US8458769B2 (en)*2009-12-122013-06-04Akamai Technologies, Inc.Cloud based firewall system and service
US9531758B2 (en)2011-03-182016-12-27Zscaler, Inc.Dynamic user identification and policy enforcement in cloud-based secure web gateways
US9065800B2 (en)2011-03-182015-06-23Zscaler, Inc.Dynamic user identification and policy enforcement in cloud-based secure web gateways
US8838988B2 (en)2011-04-122014-09-16International Business Machines CorporationVerification of transactional integrity
US9274812B2 (en)2011-10-062016-03-01Hand Held Products, Inc.Method of configuring mobile computing device
EP2592806A1 (en)*2011-11-102013-05-15Alcatel-Lucent Deutschland AGMethod of identifying a distributed infrastructure attack in a highly distributed cloud
US9350644B2 (en)2012-04-132016-05-24Zscaler. Inc.Secure and lightweight traffic forwarding systems and methods to cloud based network security systems
US9118689B1 (en)2012-04-132015-08-25Zscaler, Inc.Archiving systems and methods for cloud based systems
US9912638B2 (en)2012-04-302018-03-06Zscaler, Inc.Systems and methods for integrating cloud services with information management systems
US8955091B2 (en)2012-04-302015-02-10Zscaler, Inc.Systems and methods for integrating cloud services with information management systems
US9450967B1 (en)2012-05-012016-09-20Amazon Technologies, Inc.Intelligent network service provisioning and maintenance
US9294437B1 (en)*2012-05-012016-03-22Amazon Technologies, Inc.Remotely configured network appliances and services
US9288182B1 (en)*2012-05-012016-03-15Amazon Technologies, Inc.Network gateway services and extensions
US9438556B1 (en)2012-05-012016-09-06Amazon Technologies, IncFlexibly configurable remote network identities
US9747581B2 (en)2012-07-022017-08-29International Business Machines CorporationContext-dependent transactional management for separation of duties
US8917826B2 (en)2012-07-312014-12-23International Business Machines CorporationDetecting man-in-the-middle attacks in electronic transactions using prompts
US9246779B2 (en)*2012-08-232016-01-26Endgame Systems, Inc.Method and apparatus for enhanced network data processing and customizable user interface
US8875287B2 (en)2012-10-042014-10-28Akamai Technologies, Inc.Server with mechanism for reducing internal resources associated with a selected client connection
CN102932380B (en)*2012-11-302016-06-29网宿科技股份有限公司The distributed preventing malicious attack method and system of content-based distribution network
US9736271B2 (en)*2012-12-212017-08-15Akamai Technologies, Inc.Scalable content delivery network request handling mechanism with usage-based billing
US9654579B2 (en)2012-12-212017-05-16Akamai Technologies, Inc.Scalable content delivery network request handling mechanism
US20140280480A1 (en)*2013-03-152014-09-18Edgecast Networks, Inc.Dynamic Tag Management for Optimizing Content Delivery
US9037643B2 (en)2013-03-152015-05-19Edgecast Networks, Inc.Dynamic tag management for optimizing content delivery
US10728287B2 (en)2013-07-232020-07-28Zscaler, Inc.Cloud based security using DNS
US20150067762A1 (en)*2013-09-032015-03-05Samsung Electronics Co., Ltd.Method and system for configuring smart home gateway firewall
US11100218B2 (en)*2014-01-202021-08-24Prevoty, Inc.Systems and methods for improving accuracy in recognizing and neutralizing injection attacks in computer services
US9825913B2 (en)*2014-06-042017-11-21Nicira, Inc.Use of stateless marking to speed up stateful firewall rule processing
US9531720B2 (en)2014-09-022016-12-27Akamai Technologies, Inc.System and methods for leveraging an object cache to monitor network traffic
US9875344B1 (en)2014-09-052018-01-23Silver Peak Systems, Inc.Dynamic monitoring and authorization of an optimization device
GB2532475B (en)*2014-11-202017-03-08F Secure CorpIntegrity check of DNS server setting
US10333899B2 (en)*2014-11-262019-06-25Lexisnexis, A Division Of Reed Elsevier Inc.Systems and methods for implementing a privacy firewall
EP4407999A3 (en)2014-12-082024-09-04Umbra Technologies Ltd.System and method for content retrieval from remote network regions
US9426125B2 (en)*2014-12-222016-08-23Verizon Digital Media Services Inc.Real-time reconfigurable web application firewall for a distributed platform
JP2018508067A (en)2015-01-062018-03-22アンブラ テクノロジーズ リミテッドUmbra Technologies Ltd. System and method for neutral application programming interface
US10630505B2 (en)2015-01-282020-04-21Umbra Technologies Ltd.System and method for a global virtual network
CN104618392B (en)*2015-02-252018-09-21浪潮电子信息产业股份有限公司Intelligent matching method for NGINX-MODSECURITY security rules
US9667656B2 (en)*2015-03-302017-05-30Amazon Technologies, Inc.Networking flow logs for multi-tenant environments
CN107637037B (en)2015-04-072021-09-28安博科技有限公司System and method for virtual interfaces and advanced intelligent routing in a global virtual network
US20160344751A1 (en)*2015-05-192016-11-24Fastly, Inc.Customized record handling in a content delivery network
US11558347B2 (en)2015-06-112023-01-17Umbra Technologies Ltd.System and method for network tapestry multiprotocol integration
CN105071989A (en)*2015-07-302015-11-18世纪龙信息网络有限责任公司Video content distribution quality monitoring system and monitoring method therefor
US9667657B2 (en)*2015-08-042017-05-30AO Kaspersky LabSystem and method of utilizing a dedicated computer security service
CN112839111B (en)*2015-09-112024-02-02亚马逊科技公司System, method, and medium for customizable event-triggered computation at edge locations
US10181038B2 (en)*2015-11-172019-01-15Honeywell International Inc.Deployment assurance checks for monitoring industrial control systems
EP4236264A3 (en)2015-12-112023-11-08Umbra Technologies Ltd.System and method for information slingshot over a network tapestry and granularity of a tick
US10417414B2 (en)*2015-12-312019-09-17Cybereason, Inc.Baseline calculation for firewalling
US10237286B2 (en)*2016-01-292019-03-19Zscaler, Inc.Content delivery network protection from malware and data leakage
US11038845B2 (en)2016-02-232021-06-15Nicira, Inc.Firewall in a virtualized computing environment using physical network interface controller (PNIC) level firewall rules
US11962589B2 (en)*2016-03-282024-04-16Zscaler, Inc.Disaster recovery for a cloud-based security service
US11533307B2 (en)*2016-03-282022-12-20Zscaler, Inc.Enforcing security policies on mobile devices in a hybrid architecture
CN109479068B (en)2016-04-262021-09-28安博科技有限公司Network ejection via tapestry slingshot
CN106210057A (en)*2016-07-132016-12-07成都知道创宇信息技术有限公司A kind of cloud security means of defence based on CDN
US10237240B2 (en)2016-07-212019-03-19AT&T Global Network Services (U.K.) B.V.Assessing risk associated with firewall rules
JP2018019207A (en)*2016-07-272018-02-01富士ゼロックス株式会社Cooperation management device and communication system
US10778722B2 (en)*2016-11-082020-09-15Massachusetts Institute Of TechnologyDynamic flow system
US10171425B2 (en)2016-12-152019-01-01Keysight Technologies Singapore (Holdings) Pte LtdActive firewall control for network traffic sessions within virtual processing platforms
US11075886B2 (en)2016-12-152021-07-27Keysight Technologies Singapore (Sales) Pte. Ltd.In-session splitting of network traffic sessions for server traffic monitoring
CN106936819B (en)*2017-03-012019-11-01无锡紫光存储系统有限公司Cloud storage subsystem and safe storage system
CA2998049A1 (en)*2017-03-132018-09-13Comcast Cable Communications, LlcMonitoring device data and gateway data
US10659432B2 (en)*2017-07-062020-05-19Crowdstrike, Inc.Network containment of compromised machines
US11012416B2 (en)2018-01-152021-05-18Akamai Technologies, Inc.Symbolic execution for web application firewall performance
US11044271B1 (en)*2018-03-152021-06-22NortonLifeLock Inc.Automatic adaptive policy based security
KR101959544B1 (en)*2018-06-012019-03-18주식회사 에프원시큐리티Web attack detection and prevention system and method
US10931695B2 (en)2018-08-222021-02-23Akamai Technologies, Inc.Nonce injection and observation system for detecting eavesdroppers
US10798006B2 (en)2018-10-122020-10-06Akamai Technologies, Inc.Overload protection for data sinks in a distributed computing system
US10331462B1 (en)*2018-11-062019-06-25Cloudflare, Inc.Cloud computing platform that executes third-party code in a distributed cloud computing network
US11019034B2 (en)2018-11-162021-05-25Akamai Technologies, Inc.Systems and methods for proxying encrypted traffic to protect origin servers from internet threats
US12063245B2 (en)2019-05-102024-08-13Akamai Technologies, Inc.Using the state of a request routing mechanism to inform attack detection and mitigation
US11652848B1 (en)*2019-09-262023-05-16Amazon Technologies, Inc.Distributed evaluation of networking security rules
CN111158776B (en)*2019-12-122023-12-26杭州安恒信息技术股份有限公司Smooth restarting method of Web application protection system
US11875172B2 (en)2020-09-282024-01-16VMware LLCBare metal computer for booting copies of VM images on multiple computing devices using a smart NIC
US11606310B2 (en)2020-09-282023-03-14Vmware, Inc.Flow processing offload using virtual port identifiers
CN112532638A (en)*2020-12-032021-03-19四川师范大学Distributed content filtering firewall
US12032968B2 (en)*2021-09-282024-07-09Rakuten Mobile, Inc.Method and system for creating server cluster on edge location
US12218839B1 (en)2021-11-012025-02-04Juniper Networks, Inc.Service function chaining with session-based routing
US11995024B2 (en)2021-12-222024-05-28VMware LLCState sharing between smart NICs
US12229578B2 (en)2021-12-222025-02-18VMware LLCTeaming of smart NICs
US12373237B2 (en)2022-05-272025-07-29VMware LLCLogical memory addressing by smart NIC across multiple devices
US11899594B2 (en)2022-06-212024-02-13VMware LLCMaintenance of data message classification cache on smart NIC
US11928062B2 (en)2022-06-212024-03-12VMware LLCAccelerating data message classification with smart NICs
US12425371B2 (en)*2022-09-162025-09-23Cisco Technology, Inc.System and method for providing SCHC-based edge firewalling
US20250039219A1 (en)2023-01-182025-01-30Akamai Technologies, Inc.Api security based on inspection of obfuscated request and response bodies
US12368695B2 (en)*2023-01-302025-07-22Hewlett Packard Enterprise Development LpCompacting traffic separation policies in campus networks
CN116566682B (en)*2023-05-162023-12-08赛姆科技(广东)有限公司Distributed information network security protection method, system and readable storage medium thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7296292B2 (en)*2000-12-152007-11-13International Business Machines CorporationMethod and apparatus in an application framework system for providing a port and network hardware resource firewall for distributed applications
US7353533B2 (en)*2002-12-182008-04-01Novell, Inc.Administration of protection of data accessible by a mobile device
US7430664B2 (en)*2005-02-022008-09-30Innomedia Pte, LtdSystem and method for securely providing a configuration file over and open network
US8458769B2 (en)*2009-12-122013-06-04Akamai Technologies, Inc.Cloud based firewall system and service

Family Cites Families (62)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6167438A (en)1997-05-222000-12-26Trustees Of Boston UniversityMethod and system for distributed caching, prefetching and replication
US6170012B1 (en)1997-09-122001-01-02Lucent Technologies Inc.Methods and apparatus for a computer network firewall with cache query processing
US7055173B1 (en)*1997-12-192006-05-30Avaya Technology Corp.Firewall pooling in a network flowswitch
US6108703A (en)*1998-07-142000-08-22Massachusetts Institute Of TechnologyGlobal hosting system
CA2287813C (en)1998-10-222005-03-29At&T Corp.System and method for network load balancing
US6721890B1 (en)*1999-05-042004-04-13Microsoft CorporationApplication specific distributed firewall
US7051365B1 (en)*1999-06-302006-05-23At&T Corp.Method and apparatus for a distributed firewall
US6832321B1 (en)1999-11-022004-12-14America Online, Inc.Public network access server having a user-configurable firewall
US7363361B2 (en)*2000-08-182008-04-22Akamai Technologies, Inc.Secure content delivery system
US6665726B1 (en)*2000-01-062003-12-16Akamai Technologies, Inc.Method and system for fault tolerant media streaming over the internet
US7240100B1 (en)*2000-04-142007-07-03Akamai Technologies, Inc.Content delivery network (CDN) content server request handling mechanism with metadata framework support
US6996616B1 (en)*2000-04-172006-02-07Akamai Technologies, Inc.HTML delivery from edge-of-network servers in a content delivery network (CDN)
US7725602B2 (en)*2000-07-192010-05-25Akamai Technologies, Inc.Domain name resolution using a distributed DNS network
US7707305B2 (en)2000-10-172010-04-27Cisco Technology, Inc.Methods and apparatus for protecting against overload conditions on nodes of a distributed network
US7155487B2 (en)*2000-11-302006-12-26Intel CorporationMethod, system and article of manufacture for data distribution over a network
US20020138437A1 (en)*2001-01-082002-09-26Lewin Daniel M.Extending an internet content delivery network into an enterprise environment by locating ICDN content servers topologically near an enterprise firewall
US7159031B1 (en)2001-01-262007-01-02Fortinet, Inc.Remote customer management of virtual routers allocated to the customer
US7149807B1 (en)*2001-02-022006-12-12Akamai Technologies, Inc.Control and communication infrastructure (CCI) for selecting a transport mechanism to transport data to one or more servers in a content delivery network based on the size of the data, together with frequency and loss tolerance with respect to transport of the data
US8046672B2 (en)*2001-02-232011-10-25Dandia Audio Kg Limited Liability CompanyMethod and system for delivering technology agnostic rich media content within an email, banner ad, and web page
US7472178B2 (en)*2001-04-022008-12-30Akamai Technologies, Inc.Scalable, high performance and highly available distributed storage system for Internet content
US7133905B2 (en)*2002-04-092006-11-07Akamai Technologies, Inc.Method and system for tiered distribution in a content delivery network
FR2838843B1 (en)*2002-04-232004-12-17Cit Alcatel DEVICE FOR DYNAMICALLY ADAPTING DATA FILTERS
US7284268B2 (en)*2002-05-162007-10-16Meshnetworks, Inc.System and method for a routing device to securely share network data with a host utilizing a hardware firewall
US7260639B2 (en)*2002-07-092007-08-21Akamai Technologies, Inc.Method and system for protecting web sites from public internet threats
US20040093419A1 (en)*2002-10-232004-05-13Weihl William E.Method and system for secure content delivery
JP4305004B2 (en)*2003-02-282009-07-29ソニー株式会社 Information processing apparatus, content information processing method, and computer program
US7373416B2 (en)2003-04-242008-05-13Akamai Technologies, Inc.Method and system for constraining server usage in a distributed network
KR100559026B1 (en)2003-05-302006-03-10엘지전자 주식회사Home network system
US7380010B1 (en)2003-08-122008-05-27Cisco Technology, Inc.Method and apparatus for performing denial of service for call requests
US7254713B2 (en)2003-09-112007-08-07AlcatelDOS attack mitigation using upstream router suggested remedies
US7774456B1 (en)2004-02-272010-08-10Packeteer, Inc.Methods, apparatuses and systems facilitating classification of web services network traffic
US7761923B2 (en)*2004-03-012010-07-20Invensys Systems, Inc.Process control methods and apparatus for intrusion detection, protection and network hardening
WO2005101782A1 (en)2004-04-142005-10-27Telecom Italia S.P.A.Method and system for handling content delivery in communication networks
US7478429B2 (en)2004-10-012009-01-13Prolexic Technologies, Inc.Network overload detection and mitigation system and method
US7509493B2 (en)*2004-11-192009-03-24Microsoft CorporationMethod and system for distributing security policies
US8346960B2 (en)2005-02-152013-01-01At&T Intellectual Property Ii, L.P.Systems, methods, and devices for defending a network
US8839427B2 (en)2005-04-132014-09-16Verizon Patent And Licensing Inc.WAN defense mitigation service
US7730536B2 (en)2005-06-082010-06-01Verizon Business Global LlcSecurity perimeters
US8510826B1 (en)2005-12-062013-08-13Sprint Communications Company L.P.Carrier-independent on-demand distributed denial of service (DDoS) mitigation
US8230516B2 (en)*2006-01-192012-07-24International Business Machines CorporationApparatus, system, and method for network authentication and content distribution
WO2007098960A1 (en)*2006-03-032007-09-07Art Of Defence GmbhDistributed web application firewall
JP4126707B2 (en)2006-07-282008-07-30インターナショナル・ビジネス・マシーンズ・コーポレーション Technology for analyzing the state of information systems
US8122493B2 (en)*2007-01-252012-02-21Drako Dean MFirewall based on domain names
US7853678B2 (en)2007-03-122010-12-14Citrix Systems, Inc.Systems and methods for configuring flow control of policy expressions
EP2132628A1 (en)*2007-04-052009-12-16International Business Machines CorporationMethod, system and computer program for configuring firewalls
US8032939B2 (en)2007-11-062011-10-04Airtight Networks, Inc.Method and system for providing wireless vulnerability management for local area computer networks
US20090178131A1 (en)2008-01-082009-07-09Microsoft CorporationGlobally distributed infrastructure for secure content management
US8225400B2 (en)2008-05-132012-07-17Verizon Patent And Licensing Inc.Security overlay network
US9456054B2 (en)*2008-05-162016-09-27Palo Alto Research Center IncorporatedControlling the spread of interests and content in a content centric network
US8365259B2 (en)*2008-05-282013-01-29Zscaler, Inc.Security message processing
US8661056B1 (en)2008-11-032014-02-25Salesforce.Com, Inc.System, method and computer program product for publicly providing web content of a tenant using a multi-tenant on-demand database service
US20100192201A1 (en)2009-01-292010-07-29Breach Security, Inc.Method and Apparatus for Excessive Access Rate Detection
KR101077135B1 (en)2009-10-222011-10-26한국인터넷진흥원Apparatus for detecting and filtering application layer DDoS Attack of web service
EP2333686B1 (en)2009-11-202018-01-10Samsung SDS Co. Ltd.Anti-virus protection system and method thereof
KR101272878B1 (en)*2009-11-302013-06-11한국전자통신연구원Apparatus and method for dynamic update of software-based IPTV conditional access system
US8751633B2 (en)2010-04-012014-06-10Cloudflare, Inc.Recording internet visitor threat information through an internet-based proxy service
KR100994076B1 (en)2010-04-122010-11-12주식회사 나우콤Nat-enabled system to prevent the blocking of a normal client's web service using nat and control method thereof
US9432385B2 (en)2011-08-292016-08-30Arbor Networks, Inc.System and method for denial of service attack mitigation using cloud services
US8949459B1 (en)2011-10-062015-02-03Amazon Technologies, Inc.Methods and apparatus for distributed backbone internet DDOS mitigation via transit providers
US9661046B2 (en)*2012-12-132017-05-23Level 3 Communications, LlcDevices and methods supporting content delivery with adaptation services
US9350706B1 (en)2013-03-152016-05-24Centurylink Intellectual Property LlcNetwork traffic data scrubbing with services offered via anycasted addresses
US9282113B2 (en)2013-06-272016-03-08Cellco PartnershipDenial of service (DoS) attack detection systems and methods

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7296292B2 (en)*2000-12-152007-11-13International Business Machines CorporationMethod and apparatus in an application framework system for providing a port and network hardware resource firewall for distributed applications
US7353533B2 (en)*2002-12-182008-04-01Novell, Inc.Administration of protection of data accessible by a mobile device
US7430664B2 (en)*2005-02-022008-09-30Innomedia Pte, LtdSystem and method for securely providing a configuration file over and open network
US8458769B2 (en)*2009-12-122013-06-04Akamai Technologies, Inc.Cloud based firewall system and service

Cited By (20)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20140108319A1 (en)*2012-10-122014-04-17Bruno KLAUSERAutonomic network sentinels
US9450819B2 (en)*2012-10-122016-09-20Cisco Technology, Inc.Autonomic network sentinels
US20140250352A1 (en)*2013-03-042014-09-04Lsi CorporationSystems and Methods for Signal Reduction Based Data Processor Marginalization
US20140283139A1 (en)*2013-03-152014-09-18Kunal AnandSystems and methods for parsing user-generated content to prevent attacks
US9098722B2 (en)*2013-03-152015-08-04Prevoty, Inc.Systems and methods for parsing user-generated content to prevent attacks
CN103561076A (en)*2013-10-282014-02-05中国科学院信息工程研究所Webpage trojan-linking real-time protection method and system based on cloud
US10498757B2 (en)2014-09-112019-12-03Samuel Geoffrey PicklesTelecommunications defence system
WO2016039643A1 (en)*2014-09-122016-03-17Pickles Samuel GeoffreyA telecommunications defence system
US20170250999A1 (en)*2014-09-122017-08-31Samuel Geoffrey PicklesA telecommunications defence system
US10462188B2 (en)2015-04-302019-10-29Opaq Networks, Inc.Computer network security system
WO2019217709A1 (en)*2018-05-102019-11-14Opaq Networks, Inc.Systems and methods for centrally managed host and network firewall services
US10826941B2 (en)2018-05-102020-11-03Fortinet, Inc.Systems and methods for centrally managed host and network firewall services
US11327898B2 (en)2018-05-102022-05-10Fortinet, Inc.Systems and methods for centrally managed host and network firewall services
US11870814B2 (en)2018-05-102024-01-09Fortinet, Inc.Systems and methods for centrally managed host and network firewall services
WO2020205719A1 (en)*2019-03-292020-10-08Jpmorgan Chase Bank, N.A.Dynamic application firewalling in cloud systems
US11159488B2 (en)2019-03-292021-10-26Jpmorgan Chase Bank, N.A.Dynamic application firewalling in cloud systems
WO2022182384A1 (en)*2021-02-242022-09-01Level 3 Communications, LlcUniformity of instructions for content requests and responses in a content delivery network
US11457091B2 (en)2021-02-242022-09-27Level 3 Communications, LlcUniformity of instructions for content requests and responses in a content delivery network
US11700319B2 (en)2021-02-242023-07-11Level 3 Communications, LlcUniformity of instructions for content requests and responses in a content delivery network
US11991259B2 (en)2021-02-242024-05-21Level 3 Communications, LlcUniformity of instructions for content requests and responses in a content delivery network

Also Published As

Publication numberPublication date
EP2510648A4 (en)2016-10-26
WO2011072289A4 (en)2011-11-17
ES2702097T3 (en)2019-02-27
US10243925B2 (en)2019-03-26
US20200007506A1 (en)2020-01-02
CN102687480A (en)2012-09-19
US20160373411A1 (en)2016-12-22
US11082401B2 (en)2021-08-03
EP2510648A2 (en)2012-10-17
CN102687480B (en)2015-11-25
EP2510648B1 (en)2018-09-19
WO2011072289A2 (en)2011-06-16
US8458769B2 (en)2013-06-04
US20110225647A1 (en)2011-09-15
US20150089582A1 (en)2015-03-26
WO2011072289A3 (en)2011-10-13

Similar Documents

PublicationPublication DateTitle
US11082401B2 (en)Cloud based firewall system and service
US10972487B2 (en)Content delivery network protection from malware and data leakage
US10728252B2 (en)Client application based access control in cloud security systems for mobile devices
US11831609B2 (en)Network security system with enhanced traffic analysis based on feedback loop
US11516257B2 (en)Device discovery for cloud-based network security gateways
US20160359809A1 (en)Real-Time Reconfigurable Web Application Firewall For a Distributed Platform
JP6785225B2 (en) Distributed traffic management system and technology
US9838413B2 (en)Zero day threat detection based on fast flux detection and aggregation
US9503424B2 (en)Dynamic resolution of fully qualified domain name (FQDN) address objects in policy definitions
CN103229185B (en) Systems and methods for local protection against malware
US8146137B2 (en)Dynamic internet address assignment based on user identity and policy compliance
CN118590276A (en) Method and system for effective network protection of mobile devices
US12015594B2 (en)Policy integration for cloud-based explicit proxy
US11671433B2 (en)Data loss prevention incident forwarding
US12432177B2 (en)Data plane framework for redirecting data packets
US20250168199A1 (en)Domain name service protection for secure web gateway
US12388788B2 (en)Data plane framework for redirecting data packets

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:AKAMAI TECHNOLOGIES, INC., MASSACHUSETTS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DILLEY, JOHN;SUMMERS, JOHN;LAGHATE, PRASANNA;AND OTHERS;SIGNING DATES FROM 20110427 TO 20110527;REEL/FRAME:033163/0496

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO PAY ISSUE FEE


[8]ページ先頭

©2009-2025 Movatter.jp