Movatterモバイル変換


[0]ホーム

URL:


US20150312273A1 - METHODS AND SYSTEMS FOR DETECTING AND MITIGATING A HIGH-RATE DISTRIBUTED DENIAL OF SERVICE (DDoS) ATTACK - Google Patents

METHODS AND SYSTEMS FOR DETECTING AND MITIGATING A HIGH-RATE DISTRIBUTED DENIAL OF SERVICE (DDoS) ATTACK
Download PDF

Info

Publication number
US20150312273A1
US20150312273A1US14/792,134US201514792134AUS2015312273A1US 20150312273 A1US20150312273 A1US 20150312273A1US 201514792134 AUS201514792134 AUS 201514792134AUS 2015312273 A1US2015312273 A1US 2015312273A1
Authority
US
United States
Prior art keywords
attack
flow
traffic
records
flows
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/792,134
Inventor
Surya Pappu
Sanjay Oza
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sable Networks Inc
Original Assignee
Sable Networks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sable Networks IncfiledCriticalSable Networks Inc
Priority to US14/792,134priorityCriticalpatent/US20150312273A1/en
Publication of US20150312273A1publicationCriticalpatent/US20150312273A1/en
Assigned to SABLE NETWORKS, INC.reassignmentSABLE NETWORKS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: OZA, SANJAY, PAPPU, SURYA
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Methods and systems for detecting and mitigating high-rate Distributed Denial of Service (DDoS) attacks are herein described. The present invention contemplates a variety of improved techniques for using a flow-based statistical collection mechanism to monitor and detect deviations in server usage data. The method further includes combining multiple anomaly algorithms in a unique way to improve the accuracy of identifying a high-rate DDoS attack. The DDoS solution includes a two-phase approach of detection and mitigation, both of which operate on a local- and a global-basis. Moreover, the anomaly algorithms can be modified or extrapolated to obtain the traffic deviation parameters and therefore, the attack probabilities.

Description

Claims (21)

21. A method performed by a flow-based system for detecting traffic anomaly at various nodes within a network, comprising:
based on a monitoring of a plurality of flows traversing through the flow-based system, generating a plurality of flow state records corresponding to the plurality of flows, wherein an individual flow of the plurality of flows is a stream of packets having a same protocol, wherein an individual flow state record of the plurality of flow state records includes flow state information associated with the individual flow;
generate a plurality of aggregate records based on cumulative statistics associated with the plurality of flow state records;
computing a net probability of attack based on an analysis of the plurality of aggregate records to detect the traffic anomaly; and
in an event the net probability of attack is greater than a net probability threshold, initiating a mitigation action for mitigating the traffic anomaly.
30. A system, comprising:
a processor;
a memory operatively coupled to the processor;
a packet processing module operatively coupled to the processor and the memory, and configured to:
based on a monitoring of a plurality of flows traveling through a network, generate a plurality of flow state records corresponding to the plurality of flows, wherein an individual flow of the plurality of flows is a stream of packets having a same protocol, wherein an individual flow state record of the plurality of flow state records includes flow state information associated with the individual flow; and
generate a plurality of aggregate records based on cumulative statistics associated with the plurality of flow state records;
a bulk statistics record (BSR) module operatively coupled to the processor and the memory, and configured to:
compute a net probability of attack based on an analysis of the plurality of aggregate records to detect traffic anomaly associated with the network; and
in an event the net probability of attack is greater than a net probability threshold, initiating a mitigation action for mitigating the traffic anomaly.
39. A non-transitory computer readable medium including instructions for executing a process, the instructions comprising:
instructions for, based on a monitoring of a plurality of flows traversing through a network, generating a plurality of flow state records corresponding to the plurality of flows, wherein an individual flow of the plurality of flows is a stream of packets having a same protocol, wherein an individual flow state record of the plurality of flow state records includes flow state information associated with the individual flow;
instructions for generating a plurality of aggregate records based on cumulative statistics associated with the plurality of flow state records;
instructions for analyzing the plurality of aggregate records to detect a traffic anomaly associated with the network; and
instructions for, in an event the traffic anomaly is detected,
identifying, within the network, a candidate node having the traffic anomaly based on a particular aggregate record associated with the candidate node, the particular aggregate record exhibiting the net probability of attack being greater than the net probability threshold;
identifying a list of source addresses (SAs) sending traffic to the candidate node; and
applying the mitigation action to a subset of flows, of the plurality of flows, that are associated with the list of SAs, wherein the mitigation action is applied to all packets of each individual flow of the subset of flows.
US14/792,1342011-02-172015-07-06METHODS AND SYSTEMS FOR DETECTING AND MITIGATING A HIGH-RATE DISTRIBUTED DENIAL OF SERVICE (DDoS) ATTACKAbandonedUS20150312273A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US14/792,134US20150312273A1 (en)2011-02-172015-07-06METHODS AND SYSTEMS FOR DETECTING AND MITIGATING A HIGH-RATE DISTRIBUTED DENIAL OF SERVICE (DDoS) ATTACK

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US201161444083P2011-02-172011-02-17
US13/398,597US9167004B2 (en)2011-02-172012-02-16Methods and systems for detecting and mitigating a high-rate distributed denial of service (DDoS) attack
US14/792,134US20150312273A1 (en)2011-02-172015-07-06METHODS AND SYSTEMS FOR DETECTING AND MITIGATING A HIGH-RATE DISTRIBUTED DENIAL OF SERVICE (DDoS) ATTACK

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US13/398,597ContinuationUS9167004B2 (en)2011-02-172012-02-16Methods and systems for detecting and mitigating a high-rate distributed denial of service (DDoS) attack

Publications (1)

Publication NumberPublication Date
US20150312273A1true US20150312273A1 (en)2015-10-29

Family

ID=46653852

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US13/398,597Expired - Fee RelatedUS9167004B2 (en)2011-02-172012-02-16Methods and systems for detecting and mitigating a high-rate distributed denial of service (DDoS) attack
US14/792,134AbandonedUS20150312273A1 (en)2011-02-172015-07-06METHODS AND SYSTEMS FOR DETECTING AND MITIGATING A HIGH-RATE DISTRIBUTED DENIAL OF SERVICE (DDoS) ATTACK

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US13/398,597Expired - Fee RelatedUS9167004B2 (en)2011-02-172012-02-16Methods and systems for detecting and mitigating a high-rate distributed denial of service (DDoS) attack

Country Status (4)

CountryLink
US (2)US9167004B2 (en)
EP (1)EP2676402A4 (en)
KR (1)KR101747079B1 (en)
WO (1)WO2013105991A2 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP3206367A1 (en)*2016-02-102017-08-16Verisign, Inc.Techniques for detecting attacks in a publish-subscribe network
WO2017154012A1 (en)*2016-03-102017-09-14Telefonaktibolaget Lm Ericsson (Publ)Ddos defence in a packet-switched network
US9774501B2 (en)2012-05-142017-09-26Sable Networks, Inc.System and method for ensuring subscriber fairness using outlier detection
CN107465693A (en)*2017-09-182017-12-12北京小度信息科技有限公司Request message treating method and apparatus
US20190068624A1 (en)*2017-08-312019-02-28Charter Communications Operating, LlcDistributed denial-of-service attack detection and mitigation based on autonomous system number
US20190068626A1 (en)*2017-08-312019-02-28Charter Communications Operating, LlcDistributed denial-of-service attack detection and mitigation based on autonomous system number
US20190230116A1 (en)*2018-01-252019-07-25Charter Communications Operating, LlcDistributed denial-of-service attack mitigation with reduced latency
US10382340B1 (en)*2018-02-092019-08-13Juniper Networks, Inc.Dynamic filtering of network traffic
US11522874B2 (en)2019-05-312022-12-06Charter Communications Operating, LlcNetwork traffic detection with mitigation of anomalous traffic and/or classification of traffic
US11601457B2 (en)*2020-08-262023-03-07Bank Of America CorporationNetwork traffic correlation engine
US11606387B2 (en)*2017-12-212023-03-14Radware Ltd.Techniques for reducing the time to mitigate of DDoS attacks
US11962615B2 (en)2021-07-232024-04-16Bank Of America CorporationInformation security system and method for denial-of-service detection

Families Citing this family (114)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9412123B2 (en)2003-07-012016-08-09The 41St Parameter, Inc.Keystroke analysis
US10999298B2 (en)2004-03-022021-05-04The 41St Parameter, Inc.Method and system for identifying users and detecting fraud by use of the internet
US8938671B2 (en)2005-12-162015-01-20The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US11301585B2 (en)2005-12-162022-04-12The 41St Parameter, Inc.Methods and apparatus for securely displaying digital images
US8151327B2 (en)2006-03-312012-04-03The 41St Parameter, Inc.Systems and methods for detection of session tampering and fraud prevention
US9112850B1 (en)2009-03-252015-08-18The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US10754913B2 (en)2011-11-152020-08-25Tapad, Inc.System and method for analyzing user device information
CN104246743B (en)*2012-02-202017-03-29维图斯瑞姆Ip控股公司 Systems and methods involving isolation of virtual machine hosts on a network
US9633201B1 (en)*2012-03-012017-04-25The 41St Parameter, Inc.Methods and systems for fraud containment
US9521551B2 (en)2012-03-222016-12-13The 41St Parameter, Inc.Methods and systems for persistent cross-application mobile device identification
EP2880619A1 (en)2012-08-022015-06-10The 41st Parameter, Inc.Systems and methods for accessing records via derivative locators
CN102868685B (en)*2012-08-292015-04-15北京神州绿盟信息安全科技股份有限公司Method and device for judging automatic scanning behavior
US11095665B2 (en)*2012-08-312021-08-17Fastly, Inc.User access rate limiting among content delivery nodes
US8943587B2 (en)*2012-09-132015-01-27Symantec CorporationSystems and methods for performing selective deep packet inspection
CN102833268B (en)*2012-09-172015-03-11福建星网锐捷网络有限公司Method, equipment and system for resisting wireless network flooding attack
WO2014078569A1 (en)2012-11-142014-05-22The 41St Parameter, Inc.Systems and methods of global identification
US9456001B2 (en)*2013-01-312016-09-27Hewlett Packard Enterprise Development LpAttack notification
US9692775B2 (en)*2013-04-292017-06-27Telefonaktiebolaget Lm Ericsson (Publ)Method and system to dynamically detect traffic anomalies in a network
US9344440B2 (en)*2013-06-202016-05-17Arbor Networks, Inc.Forced alert thresholds for profiled detection
US9282113B2 (en)*2013-06-272016-03-08Cellco PartnershipDenial of service (DoS) attack detection systems and methods
US9172721B2 (en)*2013-07-162015-10-27Fortinet, Inc.Scalable inline behavioral DDOS attack mitigation
CN104348811B (en)*2013-08-052018-01-26深圳市腾讯计算机系统有限公司Detecting method of distributed denial of service attacking and device
US10902327B1 (en)2013-08-302021-01-26The 41St Parameter, Inc.System and method for device identification and uniqueness
CN103442076B (en)*2013-09-042016-09-07上海海事大学A kind of usability guarantee method of cloud storage system
CN103581172A (en)*2013-09-102014-02-12昆山奥德鲁自动化技术有限公司Method for achieving long-distance Ethernet TCP
US9503465B2 (en)2013-11-142016-11-22At&T Intellectual Property I, L.P.Methods and apparatus to identify malicious activity in a network
CN104753863B (en)*2013-12-262018-10-26中国移动通信集团公司A kind of defence method of distributed denial of service attack, equipment and system
CN103916387B (en)*2014-03-182017-06-06汉柏科技有限公司A kind of method and system of protection DDOS attack
US9686312B2 (en)2014-07-232017-06-20Cisco Technology, Inc.Verifying network attack detector effectiveness
US9800592B2 (en)*2014-08-042017-10-24Microsoft Technology Licensing, LlcData center architecture that supports attack detection and mitigation
US10951637B2 (en)*2014-08-282021-03-16Suse LlcDistributed detection of malicious cloud actors
WO2016035083A2 (en)*2014-09-062016-03-10Andriani MatthewNon-disruptive ddos testing
US10091312B1 (en)2014-10-142018-10-02The 41St Parameter, Inc.Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US11533255B2 (en)2014-11-142022-12-20Nicira, Inc.Stateful services on stateless clustered edge
CN104378288B (en)*2014-11-192017-11-21清华大学Component assembly method and system based on route switching normal form
US9769186B2 (en)*2014-12-232017-09-19Mcafee, Inc.Determining a reputation through network characteristics
US10484406B2 (en)*2015-01-222019-11-19Cisco Technology, Inc.Data visualization in self-learning networks
US10484405B2 (en)*2015-01-232019-11-19Cisco Technology, Inc.Packet capture for anomalous traffic flows
US20160219066A1 (en)*2015-01-262016-07-28Cisco Technology, Inc.Event correlation in a network merging local graph models from distributed nodes
EP3338405B1 (en)*2015-03-182020-03-11HRL Laboratories LLCSystem and method for detecting attacks on mobile ad hoc networks based on network flux
CN112615818B (en)*2015-03-242021-12-03华为技术有限公司SDN-based DDOS attack protection method, device and system
US9866576B2 (en)*2015-04-172018-01-09Centripetal Networks, Inc.Rule-based network-threat detection
US10536357B2 (en)2015-06-052020-01-14Cisco Technology, Inc.Late data detection in data center
US10033766B2 (en)*2015-06-052018-07-24Cisco Technology, Inc.Policy-driven compliance
US10142353B2 (en)2015-06-052018-11-27Cisco Technology, Inc.System for monitoring and managing datacenters
CN106487742B (en)*2015-08-242020-01-03阿里巴巴集团控股有限公司Method and device for verifying source address validity
WO2017035717A1 (en)*2015-08-292017-03-09华为技术有限公司Distributed denial of service attack detection method and associated device
US10063575B2 (en)*2015-10-082018-08-28Cisco Technology, Inc.Anomaly detection in a network coupling state information with machine learning outputs
US9838409B2 (en)*2015-10-082017-12-05Cisco Technology, Inc.Cold start mechanism to prevent compromise of automatic anomaly detection systems
GB2547202B (en)*2016-02-092022-04-20Darktrace LtdAn anomaly alert system for cyber threat detection
US10659333B2 (en)*2016-03-242020-05-19Cisco Technology, Inc.Detection and analysis of seasonal network patterns for anomaly detection
US10432650B2 (en)2016-03-312019-10-01Stuart StanifordSystem and method to protect a webserver against application exploits and attacks
US10681059B2 (en)*2016-05-252020-06-09CyberOwl LimitedRelating to the monitoring of network security
JP6599819B2 (en)*2016-06-022019-10-30アラクサラネットワークス株式会社 Packet relay device
US9584381B1 (en)2016-10-102017-02-28Extrahop Networks, Inc.Dynamic snapshot value by turn for continuous packet capture
US10715548B2 (en)2016-10-172020-07-14Akamai Technologies, Inc.Detecting device masquerading in application programming interface (API) transactions
US10305931B2 (en)*2016-10-192019-05-28Cisco Technology, Inc.Inter-domain distributed denial of service threat signaling
CN106790035A (en)*2016-12-152017-05-31郑州云海信息技术有限公司A kind of protocol analysis device, method and system
US10397270B2 (en)*2017-01-042019-08-27A10 Networks, Inc.Dynamic session rate limiter
CA3049996A1 (en)*2017-01-142018-07-19Curtin University Of TechnologyMethod and system for detecting and mitigating a denial of service attack
US10951648B2 (en)2017-03-062021-03-16Radware, Ltd.Techniques for protecting against excessive utilization of cloud services
US10887341B2 (en)*2017-03-062021-01-05Radware, Ltd.Detection and mitigation of slow application layer DDoS attacks
US11381509B2 (en)2017-03-172022-07-05Citrix Systems, Inc.Increased packet scheduling throughput and efficiency using úber batching
US10567285B2 (en)*2017-03-172020-02-18Citrix Systems, Inc.Increasing QoS throughput and efficiency through lazy byte batching
US10476673B2 (en)2017-03-222019-11-12Extrahop Networks, Inc.Managing session secrets for continuous packet capture systems
CN107040554B (en)*2017-06-222020-07-17四川长虹电器股份有限公司Method for defending CC attack
EP3422659A1 (en)*2017-06-302019-01-02Thomson LicensingMethod of blocking distributed denial of service attacks and corresponding apparatus
US11570092B2 (en)*2017-07-312023-01-31Nicira, Inc.Methods for active-active stateful network service cluster
US10951584B2 (en)2017-07-312021-03-16Nicira, Inc.Methods for active-active stateful network service cluster
US11296984B2 (en)2017-07-312022-04-05Nicira, Inc.Use of hypervisor for active-active stateful network service cluster
US10116671B1 (en)2017-09-282018-10-30International Business Machines CorporationDistributed denial-of-service attack detection based on shared network flow information
US9967292B1 (en)2017-10-252018-05-08Extrahop Networks, Inc.Inline secret sharing
JP6943196B2 (en)*2018-02-052021-09-29日本電信電話株式会社 Control system and control method
US10389574B1 (en)2018-02-072019-08-20Extrahop Networks, Inc.Ranking alerts based on network monitoring
US10038611B1 (en)2018-02-082018-07-31Extrahop Networks, Inc.Personalization of alerts based on network monitoring
US10270794B1 (en)2018-02-092019-04-23Extrahop Networks, Inc.Detection of denial of service attacks
US11153122B2 (en)2018-02-192021-10-19Nicira, Inc.Providing stateful services deployed in redundant gateways connected to asymmetric network
US11347867B2 (en)2018-05-182022-05-31Ns Holdings LlcMethods and apparatuses to evaluate cyber security risk by establishing a probability of a cyber-attack being successful
US10411978B1 (en)2018-08-092019-09-10Extrahop Networks, Inc.Correlating causes and effects associated with network activity
US10594718B1 (en)2018-08-212020-03-17Extrahop Networks, Inc.Managing incident response operations based on monitored network activity
CN109067787B (en)*2018-09-212019-11-26腾讯科技(深圳)有限公司Distributed Denial of Service (DDOS) attack detection method and device
US10768990B2 (en)2018-11-012020-09-08International Business Machines CorporationProtecting an application by autonomously limiting processing to a determined hardware capacity
RU2703329C1 (en)*2018-11-302019-10-16Открытое Акционерное Общество "Информационные Технологии И Коммуникационные Системы"Method of detecting unauthorized use of network devices of limited functionality from a local network and preventing distributed network attacks from them
US10965702B2 (en)2019-05-282021-03-30Extrahop Networks, Inc.Detecting injection attacks using passive network monitoring
US11165814B2 (en)2019-07-292021-11-02Extrahop Networks, Inc.Modifying triage information based on network monitoring
US11388072B2 (en)2019-08-052022-07-12Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US10742530B1 (en)2019-08-052020-08-11Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US10742677B1 (en)2019-09-042020-08-11Extrahop Networks, Inc.Automatic determination of user roles and asset types based on network monitoring
US20210105300A1 (en)*2019-10-082021-04-08Secure64 Software CorporationMethods and systems that detect and deflect denial-of-service attacks
CN110855657B (en)*2019-11-072021-05-18深圳市高德信通信股份有限公司 A network security control system for computer network
US11165823B2 (en)2019-12-172021-11-02Extrahop Networks, Inc.Automated preemptive polymorphic deception
WO2021137182A1 (en)*2019-12-312021-07-08Edgehawk Security Ltd.Techniques for disaggregated detection and mitigation of distributed denial-of-service attacks
US11405418B2 (en)2020-06-162022-08-02Bank Of America CorporationAutomated distributed denial of service attack detection and prevention
US11652833B2 (en)*2020-07-242023-05-16Microsoft Technology Licensing, LlcDetection of anomalous count of new entities
CN112165464B (en)*2020-09-152021-11-02江南大学 A hybrid intrusion detection method for industrial control based on deep learning
US11463466B2 (en)2020-09-232022-10-04Extrahop Networks, Inc.Monitoring encrypted network traffic
WO2022066910A1 (en)2020-09-232022-03-31Extrahop Networks, Inc.Monitoring encrypted network traffic
US11765195B2 (en)2021-02-162023-09-19Icf InternationalDistributed network-level probabilistic attack graph generation
US12034755B2 (en)*2021-03-182024-07-09International Business Machines CorporationComputationally assessing and remediating security threats
CN113179256B (en)*2021-04-122022-02-08中国电子科技集团公司第三十研究所Time information safety fusion method and system for time synchronization system
CN113365249B (en)*2021-05-062023-01-03西安交通大学Terminal hijacking DDoS attack detection method facing 5G large-scale machine communication
US11349861B1 (en)2021-06-182022-05-31Extrahop Networks, Inc.Identifying network entities based on beaconing activity
CN113536508B (en)*2021-07-302023-11-21齐鲁工业大学 A manufacturing network node classification method and system
US11296967B1 (en)2021-09-232022-04-05Extrahop Networks, Inc.Combining passive network analysis and active probing
WO2023057950A1 (en)2021-10-072023-04-13Mazebolt Technologies Ltd.Non-disruptive diagnostic and attack testing methods and systems
US11799761B2 (en)2022-01-072023-10-24Vmware, Inc.Scaling edge services with minimal disruption
US12170690B2 (en)2022-01-192024-12-17Arbor Networks, Inc.Formulating responses for slowing requests from malicious domain name system (DNS) clients
US11962564B2 (en)2022-02-152024-04-16VMware LLCAnycast address for network address translation at edge
US11843606B2 (en)2022-03-302023-12-12Extrahop Networks, Inc.Detecting abnormal data access based on data similarity
CN115190107B (en)*2022-07-072023-04-18四川川大智胜系统集成有限公司Multi-subsystem management method based on extensive domain name, management terminal and readable storage medium
US12052131B2 (en)2022-11-082024-07-30T-Mobile Usa, Inc.Multi-dimensional correlation for network incident management
EP4254876A1 (en)*2023-03-212023-10-04OvhMethods and systems for detecting denial of service attacks on a network
EP4436108A1 (en)*2023-03-222024-09-25OvhSystems and methods for configuring networking devices
CN117395070B (en)*2023-11-162024-05-03国家计算机网络与信息安全管理中心Abnormal flow detection method based on flow characteristics

Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050039104A1 (en)*2003-08-142005-02-17Pritam ShahDetecting network denial of service attacks
US20050125195A1 (en)*2001-12-212005-06-09Juergen BrendelMethod, apparatus and sofware for network traffic management
US20060133280A1 (en)*2004-12-222006-06-22Vishnu NatchuMechanism for identifying and penalizing misbehaving flows in a network
US20070280114A1 (en)*2006-06-062007-12-06Hung-Hsiang Jonathan ChaoProviding a high-speed defense against distributed denial of service (DDoS) attacks
US20070283436A1 (en)*2006-06-022007-12-06Nicholas DuffieldMethod and apparatus for large-scale automated distributed denial of service attack detection
US20100100962A1 (en)*2008-10-212010-04-22Lockheed Martin CorporationInternet security dynamics assessment system, program product, and related methods
US8280968B1 (en)*2009-04-202012-10-02The Florida State University Research Foundation, Inc.Method of detecting compromised computers in a network

Family Cites Families (36)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JPH03108845A (en)1989-09-211991-05-09Toshiba CorpTraffic congestion avoidance control system
US5014265A (en)1989-11-301991-05-07At&T Bell LaboratoriesMethod and apparatus for congestion control in a data network
JP3241716B2 (en)1990-08-312001-12-25株式会社東芝 ATM exchange method
US5555100A (en)1993-10-071996-09-10Audiofax, Inc.Facsimile store and forward system with local interface translating DTMF signals into store and forward system commands
GB9326476D0 (en)1993-12-241994-02-23Newbridge Networks CorpNetwork
US5436886A (en)1994-07-141995-07-25Northern Telecom LimitedATM switch in dual switch plane operation
US5467343A (en)1994-07-271995-11-14Motorola, Inc.Method and device for consolidation of preferential resource constraints
JP2723097B2 (en)1995-12-041998-03-09日本電気株式会社 QOS routing device
US5995503A (en)1996-06-121999-11-30Bay Networks, Inc.Method and apparatus for providing quality of service routing in a network
US5701291A (en)1996-08-221997-12-23The Whitaker CorporationATM systems
US5909440A (en)1996-12-161999-06-01Juniper NetworksHigh speed variable length best match look-up in a switching device
US6081522A (en)1997-06-302000-06-27Sun Microsystems, Inc.System and method for a multi-layer network element
US6081524A (en)1997-07-032000-06-27At&T Corp.Frame relay switched data service
US6072797A (en)1997-07-312000-06-06International Business Machines CorporationMethods, apparatus and computer program products for aggregated transmission groups in high speed networks
US6006264A (en)1997-08-011999-12-21Arrowpoint Communications, Inc.Method and system for directing a flow between a client and a server
US6249519B1 (en)1998-04-162001-06-19Mantra CommunicationsFlow based circuit steering in ATM networks
GB9810376D0 (en)1998-05-151998-07-153Com Technologies LtdComputation of traffic flow by scaling sample packet data
US6487170B1 (en)1998-11-182002-11-26Nortel Networks LimitedProviding admission control and network quality of service with a distributed bandwidth broker
US6760775B1 (en)1999-03-052004-07-06At&T Corp.System, method and apparatus for network service load and reliability management
US6801502B1 (en)1999-05-072004-10-05At&T Corp.Method and apparatus for load-sensitive routing of long-lived packet flows
US6195697B1 (en)1999-06-022001-02-27Ac Properties B.V.System, method and article of manufacture for providing a customer interface in a hybrid network
US6574195B2 (en)2000-04-192003-06-03Caspian Networks, Inc.Micro-flow management
JP4471554B2 (en)2000-05-052010-06-02ノマディックス インコーポレイテッド Network usage monitoring apparatus and related method
US20020032793A1 (en)*2000-09-082002-03-14The Regents Of The University Of MichiganMethod and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic
US7681235B2 (en)*2003-05-192010-03-16Radware Ltd.Dynamic network protection
US7854003B1 (en)2004-03-192010-12-14Verizon Corporate Services Group Inc. & Raytheon BBN Technologies Corp.Method and system for aggregating algorithms for detecting linked interactive network connections
KR100628328B1 (en)2005-03-102006-09-27한국전자통신연구원 Adaptive Infringement Prevention Device and Method
US8015249B2 (en)2006-10-102011-09-06Microsoft CorporationMitigating data usage in messaging applications
JP4905086B2 (en)2006-11-292012-03-28富士通株式会社 Event type estimation system, event type estimation method, and event type estimation program
US8176167B2 (en)2006-12-052012-05-08Qualcomm IncorporatedMethods and apparaus for requesting wireless communication device performance data and providing the data in optimal file size
US8601575B2 (en)*2007-03-302013-12-03Ca, Inc.Statistical method and system for network anomaly detection
EP2112800B1 (en)*2008-04-252017-12-27Deutsche Telekom AGMethod and system for enhanced recognition of attacks to computer systems
US9015532B2 (en)2008-10-312015-04-21Ebay Inc.System and method to test executable instructions
GB2470071B (en)2009-05-082013-06-05Vodafone PlcTelcommunications networks
US9195713B2 (en)2009-11-082015-11-24Hewlett-Packard Development Company, L.P.Outlier data point detection
US8495196B2 (en)2010-03-222013-07-23Opanga Networks, Inc.Systems and methods for aligning media content delivery sessions with historical network usage

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050125195A1 (en)*2001-12-212005-06-09Juergen BrendelMethod, apparatus and sofware for network traffic management
US20050039104A1 (en)*2003-08-142005-02-17Pritam ShahDetecting network denial of service attacks
US20060133280A1 (en)*2004-12-222006-06-22Vishnu NatchuMechanism for identifying and penalizing misbehaving flows in a network
US20070283436A1 (en)*2006-06-022007-12-06Nicholas DuffieldMethod and apparatus for large-scale automated distributed denial of service attack detection
US20070280114A1 (en)*2006-06-062007-12-06Hung-Hsiang Jonathan ChaoProviding a high-speed defense against distributed denial of service (DDoS) attacks
US20100100962A1 (en)*2008-10-212010-04-22Lockheed Martin CorporationInternet security dynamics assessment system, program product, and related methods
US8280968B1 (en)*2009-04-202012-10-02The Florida State University Research Foundation, Inc.Method of detecting compromised computers in a network

Cited By (23)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9774501B2 (en)2012-05-142017-09-26Sable Networks, Inc.System and method for ensuring subscriber fairness using outlier detection
US10333968B2 (en)2016-02-102019-06-25Verisign, Inc.Techniques for detecting attacks in a publish-subscribe network
EP3206367A1 (en)*2016-02-102017-08-16Verisign, Inc.Techniques for detecting attacks in a publish-subscribe network
WO2017154012A1 (en)*2016-03-102017-09-14Telefonaktibolaget Lm Ericsson (Publ)Ddos defence in a packet-switched network
US11297098B2 (en)2016-03-102022-04-05Telefonaktiebolaget Lm Ericsson (Publ)DDoS defence in a packet-switched network
EP3427437A4 (en)*2016-03-102019-10-23Telefonaktiebolaget LM Ericsson (PUBL) DDOS DEFENSE IN A PACKET SWITCHING NETWORK
US10911473B2 (en)*2017-08-312021-02-02Charter Communications Operating, LlcDistributed denial-of-service attack detection and mitigation based on autonomous system number
US20190068626A1 (en)*2017-08-312019-02-28Charter Communications Operating, LlcDistributed denial-of-service attack detection and mitigation based on autonomous system number
US20190068624A1 (en)*2017-08-312019-02-28Charter Communications Operating, LlcDistributed denial-of-service attack detection and mitigation based on autonomous system number
US11005865B2 (en)*2017-08-312021-05-11Charter Communications Operating, LlcDistributed denial-of-service attack detection and mitigation based on autonomous system number
CN107465693A (en)*2017-09-182017-12-12北京小度信息科技有限公司Request message treating method and apparatus
US11606387B2 (en)*2017-12-212023-03-14Radware Ltd.Techniques for reducing the time to mitigate of DDoS attacks
US11032315B2 (en)*2018-01-252021-06-08Charter Communications Operating, LlcDistributed denial-of-service attack mitigation with reduced latency
US20190230116A1 (en)*2018-01-252019-07-25Charter Communications Operating, LlcDistributed denial-of-service attack mitigation with reduced latency
US11729209B2 (en)2018-01-252023-08-15Charter Communications Operating, LlcDistributed denial-of-service attack mitigation with reduced latency
US10382340B1 (en)*2018-02-092019-08-13Juniper Networks, Inc.Dynamic filtering of network traffic
US11870790B2 (en)2019-05-312024-01-09Charter Communications Operating, LlcNetwork traffic detection with mitigation of anomalous traffic and/or classification of traffic
US11522874B2 (en)2019-05-312022-12-06Charter Communications Operating, LlcNetwork traffic detection with mitigation of anomalous traffic and/or classification of traffic
US11601457B2 (en)*2020-08-262023-03-07Bank Of America CorporationNetwork traffic correlation engine
US11888882B2 (en)2020-08-262024-01-30Bank Of America CorporationNetwork traffic correlation engine
US12267348B2 (en)*2020-08-262025-04-01Bank Of America CorporationNetwork traffic correlation engine
US11962615B2 (en)2021-07-232024-04-16Bank Of America CorporationInformation security system and method for denial-of-service detection
US12261879B2 (en)2021-07-232025-03-25Bank Of America CorporationInformation security system and method for denial-of-service detection

Also Published As

Publication numberPublication date
WO2013105991A2 (en)2013-07-18
WO2013105991A3 (en)2013-10-17
KR101747079B1 (en)2017-06-14
US20120216282A1 (en)2012-08-23
EP2676402A2 (en)2013-12-25
KR20140037052A (en)2014-03-26
US9167004B2 (en)2015-10-20
EP2676402A4 (en)2015-06-03

Similar Documents

PublicationPublication DateTitle
US9167004B2 (en)Methods and systems for detecting and mitigating a high-rate distributed denial of service (DDoS) attack
Xue et al.Linkscope: Toward detecting target link flooding attacks
Hofstede et al.Towards real-time intrusion detection for NetFlow and IPFIX
US7607170B2 (en)Stateful attack protection
US9935974B2 (en)Hardware-logic based flow collector for distributed denial of service (DDoS) attack mitigation
US7526807B2 (en)Distributed architecture for statistical overload control against distributed denial of service attacks
US9485164B2 (en)System and method for ensuring subscriber fairness using outlier detection
Abdelsayed et al.An efficient filter for denial-of-service bandwidth attacks
US20170279831A1 (en)Use of url reputation scores in distributed behavioral analytics systems
US20060075093A1 (en)Using flow metric events to control network operation
US11546266B2 (en)Correlating discarded network traffic with network policy events through augmented flow
Chen et al.Collaborative change detection of DDoS attacks on community and ISP networks
KR101352553B1 (en)Method and System for DDoS Traffic Detection and Traffic Mitigation using Flow Statistic
Chou et al.Proactive surge protection: a defense mechanism for bandwidth-based attacks
González et al.Bungee: An adaptive pushback mechanism for ddos detection and mitigation in p4 data planes
Noh et al.Protection against flow table overflow attack in software defined networks
ŞimşekA new metric for flow‐level filtering of low‐rate DDoS attacks
Habib et al.DDoS mitigation in eucalyptus cloud platform using snort and packet filtering—IP-tables
Mohammadi et al.Practical extensions to countermeasure dos attacks in software defined networking
AhmedInvestigation model for DDoS attack detection in real-time
Subramani et al.IXmon: detecting and analyzing DRDoS attacks at internet exchange points
Xia et al.CIDS: Adapting legacy intrusion detection systems to the cloud with hybrid sampling
Muraleedharan et al.ADRISYA: a flow based anomaly detection system for slow and fast scan
AhmedDetection and Avoidance Technique of Anomalous Congestion at the Network Gateways
CN116112192A (en) A message processing method and device, storage medium, and security device

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:SABLE NETWORKS, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PAPPU, SURYA;OZA, SANJAY;REEL/FRAME:041660/0994

Effective date:20120215

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp