Movatterモバイル変換


[0]ホーム

URL:


USRE47296E1 - System and method for an adaptive TCP SYN cookie with time validation - Google Patents

System and method for an adaptive TCP SYN cookie with time validation
Download PDF

Info

Publication number
USRE47296E1
USRE47296E1US14/151,803US201414151803AUSRE47296EUS RE47296 E1USRE47296 E1US RE47296E1US 201414151803 AUS201414151803 AUS 201414151803AUS RE47296 EUSRE47296 EUS RE47296E
Authority
US
United States
Prior art keywords
cookie
transition
session
candidate
ack packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US14/151,803
Inventor
Lee Chen
Ronald Wai Lun Szeto
Shih-Tsung Hwang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
A10 Networks Inc
Original Assignee
A10 Networks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by A10 Networks IncfiledCriticalA10 Networks Inc
Priority to US14/151,803priorityCriticalpatent/USRE47296E1/en
Assigned to A10 NETWORKS, INC.reassignmentA10 NETWORKS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: CHEN, LEE, HWANG, SHIH-TSUNG, SZETO, RONALD WAI LUN
Priority to US16/235,249prioritypatent/USRE49053E1/en
Application grantedgrantedCritical
Publication of USRE47296E1publicationCriticalpatent/USRE47296E1/en
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

Provided is a method and system for TCP SYN cookie validation. The method includes receiving a session SYN packet by a TCP session setup module of a host server, generating a transition cookie including a time value representing the actual time, sending a session SYN/ACK packet, including the transition cookie, in response to the received session SYN packet, receiving a session ACK packet, and determining whether a candidate transition cookie in the received session ACK packet comprises a time value representing a time within a predetermined time interval from the time the session ACK packet is received.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS
This application is a continuation reissue application of U.S. Pat. No. 7,675,854 and claims benefit under 35 U.S.C. 120 as a continuation of application Ser. No. 13/413,191 filed on Mar. 6, 2012, which is an application for reissue of U.S. Pat. No. 7,675,854, originally issued on Mar. 9, 2010.
BACKGROUND OF THE INVENTION
When a TCP (Transmission Control Protocol) connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN ACK (synchronize acknowledge). The destination host normally then waits to receiver an ACK (acknowledge) of the SYN ACK before the connection is established. This is referred to as the TCP “three-way handshake.”
While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK is sent.
A TCP SYN flood attack is a well known denial of service attack that exploits the TCP three-way handshake design by having an attacking source host generate TCP SYN packets with random source addresses toward a victim host. The victim destination host sends a SYN ACK back to the random source address and adds an entry to the connection queue, or otherwise allocates server resources. Since the SYN ACK is destined for an incorrect or non-existent host, the last part of the “three-way handshake” is never completed and the entry remains in the connection queue until a timer expires, typically, for example, for about one minute. By generating phony TCP SYN packets from random IP addresses at a rapid rate, it is possible to fill up the connection queue and deny TCP services (such as e-mail, file transfer, or WWW) to legitimate users. In most instances, there is no easy way to trace the originator of the attack because the IP address of the source is forged. The external manifestations of the problem may include inability to get e-mail, inability to accept connections to WWW or FTP services, or a large number of TCP connections on your host in the state SYN_RCVD.
A malicious client sending high volume of TCP SYN packets without sending the subsequent ACK packets can deplete server resources and severely impact the server's ability to serve its legitimate clients.
Newer operating systems or platforms implement various solutions to minimize the impact of TCP SYN flood attacks. The solutions include better resource management, and the use of a “SYN cookie”.
In an exemplary solution, instead of allocating server resource at the time of receiving a TCP SYN packet, the server sends back a SYN/ACK packet with a specially constructed sequence number known as a SYN cookie. When the server then receives an ACK packet in response to the SYN/ACK packet, the server recovers a SYN cookie from the ACK packet, and validates the recovered SYN cookie before further allocating server resources.
The effectiveness of a solution using a SYN cookie depends on the method with which the SYN cookie is constructed. However, existing solutions using a SYN cookie typically employ a hash function to construct the SYN cookie, which can lead to a high percentage of false validations of the SYN cookie, resulting in less than satisfactory protection again TCP SYN flood attack.
Therefore, there is a need for a better system and method for constructing and validating SYN cookies.
SUMMARY OF THE INVENTION
An aspect of the present invention provides a system for TCP SYN cookie validation. The system includes a host server including a processor and memory. The processor is configured for receiving a session SYN packet, generating a transition cookie, the transition cookie comprising a time value representing the actual time, sending a session SYN/ACK packet, including the transition cookie, in response to the received session SYN packet, receiving a session ACK packet, and determining whether a candidate transition cookie in the received session ACK packet comprises a time value representing a time within a predetermined time interval from the time the session ACK packet is received.
One aspect of the invention includes the system above in which the processor is further configured for regarding the received session ACK packet as valid if the candidate transition cookie in the received session ACK packet comprises a time value representing a time within a predetermined time interval from the time the session ACK packet is received.
In another aspect of the invention, the predetermined time interval is in the range of one to six seconds.
In one aspect of the invention, the predetermined time interval is three seconds.
In another aspect of the invention, the step of generating the transition cookie includes the use of data obtained from the session SYN packet.
In one aspect of the invention, the data obtained from the session SYN packet comprises the source IP address of an IP header associated with the session SYN packet.
In another aspect of the invention, the data obtained from the session SYN packet comprises the sequence number of a TCP header associated with the session SYN packet.
In another aspect of the invention, the data obtained from the session SYN packet comprises a source port associated with the session SYN packet.
In another aspect of the invention, the data obtained from the session SYN packet comprises a destination port associated with the session SYN packet.
Another aspect of the present invention provides a method for TCP SYN cookie validation. The method includes receiving a session SYN packet by a TCP session setup module, generating a transition cookie by the TCP session setup module, the transition cookie comprising a time value representing the actual time, sending a session SYN/ACK packet, including the transition cookie, in response to the received session SYN packet, receiving a session ACK packet, and determining whether a candidate transition cookie in the received session ACK packet comprises a time value representing a time within a predetermined time interval from the time the session ACK packet is received.
In an aspect of the invention, the method further includes indicating the received session ACK packet comprises a valid candidate transition cookie if the time value of the candidate transition cookie is within a predetermined time interval of the time the session ACK packet is received.
In another aspect of the invention, the step of generating the transition cookie includes the use of data obtained from the session SYN packet.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a schematic diagram illustrating a host server including a TCP session setup module and a client server, in accordance with an embodiment of the present invention;
FIG. 2 is a schematic diagram of a TCP/IP handshake in accordance with an embodiment of the present invention;
FIG. 3a illustrates a method including steps for generating a transition cookie data element by atransition cookie generator245, in accordance with an embodiment of the present invention;
FIG. 3b illustrates a method including steps for generating a transition cookie secret key by atransition cookie generator245 based on data obtained from the received session SYN packet, in accordance with an embodiment of the present invention;
FIG. 3c illustrates a method including steps for generating a transition cookie based on a transition cookie data element, a transition cookie secret key, and data obtained from a received session SYN packet in accordance with an embodiment of the present invention;
FIG. 4a illustrates steps for generating a candidate encrypted data element by atransition cookie validator275 based on data obtained from a received session ACK packet, in accordance with an embodiment of the present invention;
FIG. 4b illustrates a method including steps for generating a candidate transition cookie secret key by atransition cookie validator275 based on data obtained from a received session ACK packet and a candidate sequence number, in accordance with an embodiment of the present invention;
FIG. 4c illustrates a method including steps for generating a candidate transition cookie data element by atransition cookie validator275 based on a candidate encrypted data element and a candidate transition cookie secret key, in accordance with an embodiment of the present invention;
FIG. 4d illustrates a method including the steps for validating a candidate transition cookie data element, in accordance with an embodiment of the present invention; and
FIG. 5 illustrates a method including steps for generating information based on a validated candidate transition cookie data element, in accordance with an embodiment of the present invention.
DETAILED DESCRIPTION
In the following description, for purposes of explanation, specific numbers, materials and configurations are set forth in order to provide a thorough understanding of the invention. It will be apparent, however, to one having ordinary skill in the art, that the invention may be practiced without these specific details. In some instances, well-known features may be omitted or simplified so as not to obscure the present invention. Furthermore, reference in the specification to “one embodiment” or “an embodiment” means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the invention. The appearances of the phrase “in an embodiment” in various places in the specification are not necessarily all referring to the same embodiment.
Transmission Control Protocol (“TCP”) is one of the main protocols in TCP/IP networks. Whereas the Internet Protocol (“IP”) deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent.
The terms “host server” and “client server” referred to in the descriptions of various embodiments of the invention herein described are intended to generally describe a typical system arrangement in which the embodiments operate. The “host server” generally refers to any computer system interconnected to a TCP/IP network, including but not limited to the Internet, the computer system comprising at a minimum a processor, computer memory, and computer software. The computer system is configured to allow the host server to participate in TCP protocol communications over its connected TCP/IP network. Although the “host server” may be a single personal computer having its own IP address and in communication with the TCP/IP network, it may also be a multi-processor server or server bank. The “client server” is similar to the “host server”, although it is understood that the “client server” may, in fact, be a single personal computer attached to the TCP/IP network. The only difference between the client and the host server for the purposes of the present invention is that the host server receives the SYN from the client server, sends a SYN ACK to the client server, and waits for the ACK from the client server.
FIG. 1 is a schematic diagram illustrating an embodiment of the present invention. Ahost server102 may include aTCP session module104. The TCPsession setup module104 can engage in aTCP handshake108, such as described above, with aclient server106. In an embodiment, the TCPsession setup module104 is a software component of thehost server102. In one embodiment, the TCPsession setup module104 is implemented in an Application Specific Integrated Circuit (“ASIC”) or a Field Programmable Gate Array (“FPGA”). It is the TCP session setup module that handles the “3-way handshake”108 between thehost server102 and theclient server106. The TCP session setup module may itself also incorporate modules for sending and receiving TCP session packets. These modules may include but are not limited to a session SYN packet receiver, a session SYN/ACK packet sender, and a session ACK packet receiver, which are all known to those of ordinary skill in the computer arts.
The TCPsessions setup module104 may itself be embedded in one or more other host server modules (not shown). The TCP session setup module may alternatively comprise a hardware or firmware component. For example, the software which handles theTCP handshake108 on behalf of thehost server102 may be programmed onto a externally programmable read-only memory (“EPROM”) (not shown), and the EPROM may then be integrated into the host server. In another example, the ASIC or FPGA is integrated into the host server.
FIG. 2 illustrates a TCPsession setup module104 processing TCP/IP segments (not shown), such assession SYN packet210, session SYN/ACK packet220, andsession ACK packet230.
A TCP/IP segment includes a TCP header and an IP header as described in IETF RFC 793 “Transmission Control Protocol” section 3.1 “Header Format”, incorporated herein by reference. A TCP header optionally includes a sack-permitted option as described in IETF RFC 2018 “TCP Selective Acknowledgement Options” section 2 “Sack-Permitted Option”, incorporated herein by reference. Asession SYN packet210 is a TCP/IP segment with the SYN control bit in the TCP Header set to “1”. A session SYN/ACK packet220 is a TCP/IP segment with the SYN control bit and the ACK control bit in the TCP header set to “1”. ASession ACK Packet230 is a TCP/IP segment with the ACK control bit in the TCP header set to “1”.
Referring toFIG. 2, in an embodiment, the TCPsession setup module104 receives asession SYN packet210, obtains data from asession SYN packet210, such as but not limited to the source IP address of the IP header, or the sequence number of the TCP header, and uses the data to generate atransition cookie250. Thetransition cookie250 is preferably a 32-bit data element. In response to thesession SYN packet210, the TCPsession setup module104 creates and sends out a session SYN/ACK packet220 in accordance with IETF RFC 793 “Transmission Control Protocol” section 3.4 “Establishing a connection”, incorporated herein by reference. The TCPsession setup module104 preferably includes thetransition cookie250 as the sequence number of the TCP header in the session SYN/ACK packet220.
After the TCPsession setup module104 has sent out the session SYN/ACK packet220, it waits for receipt of a respondingsession ACK packet230. In an embodiment, when a session SYN/ACK packet230 is received, the TCPsession setup module104 generates a 32-bitcandidate transition cookie270 such that the sum ofcandidate transition cookie270 and a value of “1” equal the acknowledgement number of the TCP header in thesession ACK packet230. For example, if the acknowledgement number is “41B4362A” in hexadecimal format thecandidate transition cookie270 is “41B43629” in hexadecimal format; the sum of “41B43629” and a value of “1” equals “41B4362A”. In another example, if the acknowledgement number is “00A30000” in hexadecimal format thecandidate transition cookie270 is “00A2FFFF” in hexadecimal format; the sum of “00A2FFFF” and a value of “1” equals “00A30000”. In another example, if the acknowledgement number is “00000000” in hexadecimal format theCandidate Transition Cookie270 is “FFFFFFFF” in hexadecimal format; the sum of “FFFFFFFF” and a value of “1” equals “00000000”, with the most significant bit carried beyond the 32-bit boundary. The TCPsession setup module104 may thus validate thecandidate transition cookie270 in this manner. If the TCPsession setup module104 determines that thecandidate transition cookie270 is thus valid, thesession ACK packet230 is also valid. In this case, the TCPsession setup module104 obtains data from the validatedsession ACK packet230 and sends the data and information generated during the validation ofcandidate transition cookie270 to a computing module (not shown) for further processing.
In order to generate and validatetransition cookies250,270, the TCPsession setup module104 may include atransition cookie generator245 and atransition cookie validator275, respectively. Alternatively, the generation and validation may be performed directly by the TCPsession setup module104. In the descriptions herein, references to the TCP andtransition cookie validator275 are understood to include any of the alternative embodiments of these components.
Atransition cookie generator245 includes the functionality of generating a transition cookie based on the data obtained from asession SYN210 packet received by the TCPsession setup module104.
Atransition cookie validator275 includes the functionality of validating acandidate transition cookie270 generated based on data obtained from asession ACK packet230 received by the TCPsession setup module104.
In exemplary operation, atransition cookie generator245 is software or firmware that generates atransition cookie250 based on data obtained from asession SYN packet210 received by the TCPsession setup module104. An exemplary method for generating atransition cookie250 by atransition cookie generator245 includes multiple steps as illustrated inFIGS. 3a-3c.
FIG. 3a illustrates exemplary steps for generating a transitioncookie data element330 by atransition cookie generator245. Atransition cookie generator245 includes aclock305 indicating the current time of day in microseconds in a 32-bit format.
The transitioncookie data element330 is preferably a 32-bit data element, generated by thetransition cookie generator245 based on theselective ACK321, theMSS index324 and the 32-bit current time of day indicated byclock305.Selective ACK321 is a 1-bit data element which is set to a value of “1” bytransition cookie generator245 if a TCP header in a receivedsession SYN packet210 includes an optional sack-permitted option, or to “0” if a TCP header in a receivedsession SYN packet210 does not include an optional sack-permitted option.
Maximum Segment Size (“MSS”)322 is the maximum number of bytes that TCP will allow in an TCP/IP packet, such assession SYN packet210, session SYN/ACK packet220, andsession ACK packet230, and is normally represented by an integer value in a TCP packet header. If a TCP header in a receivedsession SYN packet210 includes a maximum segment size option, thetransition cookie generator245 sets theMSS322 to equal the maximum segment size option data of the maximum segment size option. Otherwise, if the TCP header in a receivedsession SYN packet210 does not include a maximum segment size option, thetransition cookie generator245 sets theMSS322 to a default value, for example, such as integer “536”. TheMSS index324 is a 4-bit data element set by thetransition cookie generator245 based on theMSS322. Thetransition cookie generator245 preferably includes an MSS table307, which maps anMSS322 to anMSS index324. Thetransition cookie generator245 maps aMSS322 with the MSS table307 to set the value ofMSS index324. For example,MSS322 has an integer value of “1460”. After the mapping,MSS index324 has a value of “4” as represented in hexadecimal format. In an alternative embodiment, means other than an MSS table307 may be employed to determine theMSS index324 value, such as the use of a mapping algorithm.
In generating a transitioncookie data element330, thetransition cookie generator245 sets a transitioncookie data element330 to equal the 32-bit current time of day indicated byclock305. For example, the 32-bit current time of day may be “A68079E8” as represented in hexadecimal format, so the transitioncookie data element330 has a value of “A68079E8”.
Next, thetransition cookie generator245 replaces the least significant 4 bits (bit0-3) of transitioncookie data element330 with theMSS index324, and replaces bit4 of a transitioncookie data element330 withselective ACK321. For example, if a transitioncookie data element330 has been set to a value of “A68079E8”,selective ACK321 has a value of “1”, andMSS index324 has a value of “4” as represented in hexadecimal format, after the replacements, transitioncookie data element330 has a value of “A68079F4” in hexadecimal format.
FIG. 3b illustrates exemplary steps for generating a transition cookiesecret key360, such as by atransition cookie generator245 based on data obtained from a receivedsession SYN packet210. The data used in generating the transition cookiesecret key360 may include at least thesource IP address312 of an IP header, adestination port314, asource port316 and asequence number318 of a TCP header in a receivedsession SYN packet210. In generating a transition cookiesecret key360, atransition cookie generator245 forms a 96-bit data element, afirst data item340, by concatenating asource IP address312, asequence number318, asource port316, and adestination port314. For example, if thesource IP address312 is 192.168.1.134, the hexadecimal representation being “C0A80186”, thesequence number318 is “9A275B84”, thesource port316 is 4761, the hexadecimal representation being “1299”, and thedestination port314 is 240, the hexadecimal representation being “00F0”, then, after the concatenation, thefirst data item340 has a hexadecimal value of “C0A801869A275B84129900F0”.
Next, since the transition cookiesecret key360 is a 128-bit data element, thetransition cookie generator245 may use a hash function to generate the transition cookie secret key360 from thefirst data item340. Further, thetransition cookie generator245 may use a secret key offset301, which may be a 6-bit integer value, to select a 6-bit non-negative integer fromfirst data item340 starting at the bit indicated by secret key offset301. For example, if the secret key offset301 has a value of “12” and thefirst data item340 has a hexadecimal value of “C0A801869A275B84129900F0”, thetransition cookie generator245 selects a 6-bit non-negative integer from thefirst data item340 starting at bit12 (bit12-17). The selected non-negative integer is of this example is thus “16”. Thetransition cookie generator245 then uses the selected non-negative integer to select 64 bits of data from thefirst data item340, starting at the bit indicated by the selected non-negative integer, to generate thesecond data item350, which has 64 bits.
For example, if the selected non-negative integer is “8” and thefirst data item340 has a hexadecimal value of “C0A801869A275B84129900F0”, thetransition cookie generator245 selects 64 bits (bit8-71) of thefirst data item340 to generate asecond data item350, having a hexadecimal value of “869A275B84129900”. In another example, if the selected non-negative integer is “52”, and thetransition cookie generator245 selects 64 bits (bit52-95 and bit0-19) of thefirst data item340 in a wrap-around fashion, bits52-95 have a hexadecimal value of “C0A801869A2”, and bit0-19 have a hexadecimal value of “900F0”, so the generatedsecond data item350 has a hexadecimal value of “900F0C0A801869A2”. Thetransition cookie generator245 then generates a transition cookiesecret key360 by storing thesecond data item350 in the least significant 64 bits (bit0-63) of the transition cookiesecret key360 and setting the most significant 64 bits (bit64-127) to “0”. For example, if thesecond data item350 has a hexadecimal value of “869A275B84129900”, the transition cookiesecret key360 has a hexadecimal value of “0000000000000000869A275B84129900”.
FIG. 3c illustrates exemplary steps for generating atransition cookie250 based on a transitioncookie data element330, a transition cookiesecret key360, and data obtained from a receivedsession SYN packet210, including asequence number318 of a TCP header in a receivedsession SYN packet210. To generate atransition cookie250, atransition cookie generator245 applies acryptographic method308 on the transition cookiesecret key360 and the transitioncookie data element330, such as an RC5 algorithm described in IETF RFC 2040 “The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms” section 1 “Overview”, and sections 2-8 with detailed explanations, incorporated herein by reference. The RC5 algorithm takes a 32-bit plaintext input and a 128-bit encryption key to generate a 32-bit ciphertext output. Thetransition cookie generator245 uses the transitioncookie data element330 as the plaintext input to the RC5 algorithm, and the transition cookiesecret key360 as the encryption key input to the RC5 algorithm. Thetransition cookie generator245 stores the resulting 32-bit ciphertext output of the RC5 algorithm in theencrypted data element370.
Next, thetransition cookie generator245 performs an unsigned binary addition on anencrypted data element370 and thesequence number318, and stores the result in thetransition cookie250. For example, if theencrypted data element370 has a value of “0025BC83” in hexadecimal format, and thesequence number318 has a value of “0743BD55” in hexadecimal format, the result of the addition is hexadecimal “076979D8”. After the addition, thetransition cookie250 has a value of “076979D8” in hexadecimal. In another example, if theencrypted data element370 has a value of “BE43D096” in hexadecimal format, and thesequence number318 has a value of “9A275B84” in hexadecimal format, the result of the addition, and the value oftransition cookie250 is hexadecimal “1586B2C1A”, with the most significant bit carried beyond the 32-bit boundary.
In another embodiment, atransition cookie generator245 may use different steps to generate a transition cookiesecret key360. For example, a secret key offset301 may be an integer of a different bit length, such as a 4-bit integer value, a 3-bit integer value, or a 5-bit integer value. Also, atransition cookie generator245 may use a secret key offset301 to select a non-negative integer value of a different bit length from afirst data item340. For example, atransition cookie generator245 may select a 4-bit non-negative integer value, a 7-bit non-negative integer value, or a 5-bit non-negative value from afirst data item340.
In other embodiments, atransition cookie generator245 may store asecond data item350 in the least significant 64 bits (bit0-63) of a transition cookiesecret key360 or storesecond data item350 in the most significant 64 bits (bit64-127) of a transition cookiesecret key360.
Atransition cookie generator245 may also perform an exclusive-or operation on the most significant 48 bits (bit0-47) of afirst data item340 and the least significant 48 bits (bit48-95) of afirst data element340 to form a 48-bit temporary data element (not shown). Similarly, in another embodiment, atransition cookie generator245 may perform an exclusive-or operation on the 48 even bits (bit0,2,4, . . .90,92,94) and the 48 odd bits (bit1,3,5, . . .93,95,97) to form a 48 bit temporary data element. In yet another embodiment, atransition cookie generator245 may store a 48-bit temporary data element in the least significant 48 bits (bit0-47) and the most significant 48 bits (bit80-127) of a transition cookiesecret key360, and set bit48-79 to “0”, or store a 48-bit temporary data element in the least significant 48 bits (bit0-47) of a transition cookiesecret key360, and set the most significant 80 bits (bit48-127) of a transition cookiesecret key360 to “0”.
In other embodiments of the invention, atransition cookie generator245 may use an encryption algorithm to generate a transition cookie secret key360 from thefirst data item340.
In another embodiment, atransition cookie generator245 includes a secret key and an encryption algorithm, and uses afirst data element340 as a plaintext input, and a secret key as an encryption key input to the encryption algorithm to generate a 128-bit ciphertext output. Next, atransition cookie generator245 generates a transition cookiesecret key360 as a 128-bit ciphertext output. Alternatively, the ciphertext output may be a 96-bit data element, and atransition cookie generator245 stores a 96-bit ciphertext output in the least significant 96 bits (bit0-95) of a transition cookiesecret key360, and sets the most significant 32 bits (bit96-127) to “0”. In another alternative, atransition cookie generator245 stores the least significant 32 bits (bit0-31) of a 96-bit ciphertext output in the most significant 32 bits (bit96-127) of a transition cookiesecret key360.
As seen inFIG. 2, atransition cookie validator275 validates acandidate transition cookie270 generated from asession ACK packet230 received by the TCPsession setup module104. An exemplary method for validating acandidate transition cookie270 by atransition cookie validator275 may include multiple steps as illustrated inFIGS. 4a-4d.
FIG. 4a illustrates exemplary steps for generating a candidateencrypted data element470 by atransition cookie validator275 based on data obtained from a receivedsession ACK packet230. The candidateencrypted data element470 may be a 32-bit data element generated based on thesequence number418 of the TCP header in the receivedsession ACK packet230, and thecandidate transition cookie270 generated from the receivedsession ACK packet230 as illustrated inFIG. 2.
Thecandidate sequence number428 may be a 32-bit data element generated by atransition cookie validator275 such that the sum ofcandidate sequence number428 and a value of “1” equals thesequence number418.
The candidateencrypted data element470 is generated by thetransition cookie validator275 such that the result of performing an unsigned binary addition of the candidateencrypted data element470 and thecandidate sequence number428 equals thecandidate transition cookie270.
FIG. 4b illustrates exemplary steps for generating a candidate transition cookiesecret key460 by thetransition cookie validator275 based on data obtained from the receivedsession ACK packet230 and acandidate sequence number428. The data used for generating the candidate transition cookiesecret key460 may include at least asource IP address412 of the IP header in a receivedsession ACK packet230, adestination port414 and asource port416 of the TCP header in a receivedsession ACK packet230. In the process, a 96-bitfirst data item440 is formed by atransition cookie validator275 by concatenating asource IP address412, acandidate sequence number428, asource port416, and adestination port414. For example, if thesource IP address412 is 192.168.1.134, having a hexadecimal representation of “C0A80186”, thecandidate sequence number428 is hexadecimal “9A275B84”, thesource port416 is 4761, having a hexadecimal representation of “1299”, and thedestination port414 is 240, having a hexadecimal representation of “00F0”, after the concatenation, thefirst data item440 has a hexadecimal value of “C0A801869A275B84129900F0”.
Next, the 128-bit candidate transition cookiesecret key460 is generated from afirst data item440 by atransition cookie validator275 using a hash function. In an embodiment, atransition cookie validator275 uses a 6-bit secret key offset401 to select a 6-bit non-negative integer from afirst data item440 starting at a bit indicated by secret key offset401. For example, if the secret key offset401 has a value of “12” and thefirst data item440 is “C0A801869A275B84129900F0”, thetransition cookie validator275 selects a 6-bit non-negative integer from thefirst data item440 starting at bit12 (bits12-17), selecting the non-negative integer “16”. Thetransition cookie validator275 then generates a 64-bitsecond data item350 by using the selected non-negative integer to select 64 bits of data from thefirst data item440, starting at the bit indicated by the selected non-negative integer.
For example, if the selected non-negative integer is “8” and thefirst data item440 has a hexadecimal value of “C0A801869A275B84129900F0”, thetransition cookie validator275 selects 64 bits (bit8-71) of thefirst data item440 to generate asecond data item450 having a hexadecimal value of “869A275B84129900”. In another example, if thefirst data item440 has a hexadecimal value of “C0A801869A275B84129900F0”, and the selected non-negative integer is “52”, thetransition cookie validator275 selects 64 bits (bit52-95 and bit0-19) in a wrap-around fashion. Bits52-95 have a hexadecimal value of “C0A801869A2”, and bits0-19 have a hexadecimal value of “900F0”, so the generatedsecond data item450 has a hexadecimal value of “900F0C0A801869A2”.
Next, thetransition cookie validator275 generates a candidate transition cookiesecret key460 by storing thesecond data item450 in the least significant 64 bits (bit0-63) of the candidate transition cookiesecret key460 and setting the most significant 64 bits (bit64-127) to “0”. For example, if thesecond data item450 has a hexadecinmal value of “869A275B84129900”, the candidate transition cookiesecret key460 has a hexadecimal value of “0000000000000000869A275B84129900”.
FIG. 4C illustrates exemplary steps for generating a candidate transitioncookie data element430 by atransition cookie validator275 based on a candidateencrypted data element470 and a candidate transition cookiesecret key460.
In an embodiment, atransition cookie validator275 applies acryptographic method408 on a candidate transition cookiesecret key460 and a candidateencrypted data element470. Anexemplary cryptographic method408 is an RC5 algorithm described in IETF RFC 2040 “The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms” section 1 “Overview”, and sections 2-8 with detailed explanations, incorporated herein by reference. The RC5 algorithm takes a 32-bit ciphertext input and a 128-bit decryption key to generate a 32-bit plaintext output. Atransition cookie validator275 uses a candidateencrypted data element470 as a ciphertext input to the RC5 algorithm, and a candidate transition cookiesecret key460 as a decryption key input to the RC5 algorithm, to generate a 32-bit candidate transitioncookie data element430 as the plaintext output of the RC5 decryption algorithm.
FIG. 4d illustrates exemplary steps by atransition cookie validator275 of validating a candidate transitioncookie data element430. In an embodiment, atransition cookie validator275 includes aclock305. Theclock305 indicates the current time of day, preferably in microseconds in a 32-bit format. The modifiedcurrent time409 is a 32-bit data element set by atransition cookie validator275 sets to the current time indicated byclock305. Atransition cookie validator275 then sets the least significant 5 bits (bit0-4) of the modifiedcurrent time409 to “0”. For example, if the modifiedcurrent time409 has a value of “89AE03F6” in hexadecimal format, after setting the least significant 5 bits to “0”, the modifiedcurrent time409 has a hexadecimal value of “89AE03E0”.
Next, atransition cookie validator275 sets a 32-bit adjusted candidate transitioncookie data element431 to equal the candidate transitioncookie data element430, and then sets the least significant 5 bits (bit0-4) of the adjusted candidate transitioncookie data element431 to “0”. For example, if the adjusted candidate transitioncookie data element431 has a hexadecimal value of “89DB468F”, after setting the least significant 5 bits to “0”, the adjusted candidate transitioncookie data element431 has a hexadecimal value of “89DB4680”.
Thetransition cookie validator275 may then determine if the candidate transitioncookie data element430 is valid by determining if the adjusted candidate transitioncookie data element431 is within a time margin of 3 seconds of the modifiedcurrent time409. In an embodiment, in order to determine if the adjusted candidate transitioncookie data element431 is within a time margin of 3 seconds of the modifiedcurrent time409, the transition cookie stores the modifiedcurrent time409 in the least significant 32 bits (bit0-31) of a first 33-bit time data element, sets the most significant bit (bit32) to “0”, and adds 6 seconds to the first 33-bit time data element. Adding 6 seconds is to add 6,000,000 micro seconds as represented by “5B8D80” in hexadecimal format. For example, if before the addition, the first 33-bit time data element has a hexadecimal value of “0FFFFFAE2”, After the addition of “5B8D80”, the first 33-bit time data element has a hexadecimal value of “1005B8862”. Thetransition cookie validator275 stores the adjusted candidate transitioncookie data element431 in the least significant 32 bits (bit0-31) of a second 33-bit time data element, sets the most significant bit (bit32) to “0”, and adds 3 seconds to the second 33-bit time data element. Adding 3 seconds is to add 3,000,000 micro seconds as represented by hexadecimal “2DC6C0”. Thetransition cookie validator275 stores the modifiedcurrent time409 in the least significant 32 bits (bit0-31) of a third 33-bit time data element, and sets the most significant bit (bit32) to “0”. If the second 33-bit time data element is smaller than the first 33-bit time data element and the second 33-bit time data element is larger than the third 33-bit time data element, thetransition cookie validator275 determines that the adjusted candidate transitioncookie data element431 is within 3 seconds of the modifiedcurrent time409, and thus that the candidate transitioncookie data element430 is valid.
FIG. 5 illustrates exemplary steps of generating information based on a validated candidate transitioncookie data element430. In an embodiment,candidate MSS522 is an integer. Atransition cookie validator275 includes a reversed MSS table507, which includes information that maps a 4-bit data element to acandidate MSS522. Atransition cookie validator275 extracts the least significant 4-bit (bit0-3) data from candidate transitioncookie data element430, maps the extracted 4-bit data to a reversed MSS table507, and stores the result in acandidate MSS522. Atransition cookie validator275 may then generate a maximum segment size option as described in IETF RFC 793 “Transmission Control Protocol” section 3.1 “Header Format”, incorporated herein by reference, and sets a maximum segment size option data of the maximum segment size option to equal acandidate MSS522. Atransition cookie validator275 may further examine bit4 of a candidate transitioncookie data element430. If bit4 of candidate transitioncookie data element430 has a value of “1”, atransition cookie validator275 may generate a sack-permitted option as described in IETF RFC 2018 “TCP Selective Acknowledgement Options” section 2, incorporated herein by reference. A TCPsession setup module104 may then send a sack-permitted option, a maximum segment size option, and data obtained from a receivedsession ACK packet230 to a computing module (not shown) for further processing.
There are many different encryption algorithms that use encryption keys of different bit lengths, such as, for example, 56-bit, 64-bit, 96-bit, 128-bit. These may generate ciphertext outputs of different bit lengths, for example, 96-bit, 64-bit, 128-bit, or 32-bit. Persons of ordinary skill in the cipher arts will be able to apply different methods, for example a hash function, to generate the transition cookie secret key360 from the ciphertext output.
Atransition cookie validator275 may also use different steps to generate a candidate transition cookiesecret key460. The steps used by atransition cookie validator275 to generate a candidate transition cookiesecret key460 are similar to the steps used by atransition cookie generator245 to generate a transition cookiesecret key360.
Alternative embodiments of the invention may employ a different algorithm for thecryptographic methods308,408. In one example, the different algorithm is an RC2 algorithm described in IETF RFC 2268 “A Description of the RC2(r) Encryption Algorithm” section 1 “Introduction” and section 2-4 with detailed explanation, incorporated herein by reference. In another example, the different algorithm is a Blowfish algorithm. In one other example, the different algorithm is a Data Encryption Standards (“DES”) algorithm based on Federal Information Processing Standards Publication “Data Encryption Standard (DES) FIPS PUB 46-3”, which is incorporated herein by reference in its entirety. Other algorithms are also usable.
Also, atransition cookie validator275 may use different time margins of modifiedcurrent time409 to determine if the candidate transition cookie data element is valid. Different time margins include but are not limited to 1 second, 4 seconds, 6 seconds, 2 seconds, or 11 seconds.
In an embodiment, the method of generating a transition cookie includes MD5 signature option information in the TCP options field. When this method is used, the method of validating acandidate transition cookie270 correspondingly includes the MD5 signature option information in the TCP options field.
In another embodiment,transition cookie generator245 may include a plurality of transition cookie generation methods forgenerating transition cookie250. For example, the secret key offset301 may have a different value, such as an integer value of different bit length, such as 4-bit, or 8-bit. In other examples, the selected non-negative integer fromfirst data item340 may be of different bit length, such as 8-bit, or 10-bit, thecryptographic method308 may be a different algorithm than RC5, or the generating of transitioncookie data element330 may include MD5 signature option information in the TCP options field ofsession SYN packet210. A transition cookie generation method may include steps different from the steps in the exemplary method illustrated inFIGS. 3a-3c.
In an embodiment, thetransition cookie generator245 may selects method to generatetransition cookie250 based on random data.
The random data may include time. In one embodiment,transition cookie generator245 selects a method based on the time of day. Alternatively, thetransition cookie generator245 may select a method after a time period, such as 10 seconds, 30 seconds, 2 minutes or 3 hours.
In another embodiment, the random data may include a source IP address insession SYN packet210, or a destination IP address insession SYN packet210.
The random data may include the network interface at which a TCPsession setup module104 receives asession SYN packet210, or a Virtual Local Area Network (VLAN) information associated with asession SYN packet210.
In one embodiment,transition cookie validator275 includes a plurality of transition cookie validation methods for validatingcandidate transition cookie270. A transition cookie validation method may include steps different from the steps in the exemplary method illustrated inFIGS. 4a-4d. Atransition cookie validator275 may select a method to validatecandidate transition cookie270 based on random data.
In these embodiments it is understood to be preferred that thetransition cookie validator275 selects a complementary method to the method selected bytransition cookie generator245.
Although the invention herein has been described with reference to particular embodiments, it is to be understood that these embodiments are merely illustrative of the principles and applications of the present invention. It is therefore to be understood that numerous modifications may be made to the illustrative embodiments and that other arrangements may be devised without departing from the spirit and scope of the present invention as defined by the appended claims.

Claims (28)

The invention claimed is:
1. A system for TCP SYN cookie validation at a host server comprising:
a session SYN packet receiver for receiving a session SYN packet;
a transition cookie generator operating to generate a transition cookie with the use of a transition cookie secret key, the transition cookie comprising a time value representing the actual time, wherein the transition cookie generator generates the transition cookie secret key based on data obtained from the received session SYN packet, the data obtained from the SYN packet including at least one of a source IP address of an IP header, a destination port, a source port, and a sequence number of a TCP header in the received session SYN packet, wherein the transition cookie generator concatenates the obtained data from the session SYN packet to generate a first data item of the generator and the transition cookie generator uses a first hash function to generate the transition cookie secret key from the first data item of the generator;
a session SYN/ACK packet sender for sending the transition cookie in response to the received session SYN packet;
a session ACK packet receiver for receiving a session ACK packet, the session ACK packet including a candidate transition cookie; and
a transition cookie validator, for determining whether the candidate transition cookie in the received session ACK packet comprises a time value representing a time within a predetermined time interval from the time the session ACK packet is received, wherein the transition cookie validator generates a candidate transition cookie secret key based on data obtained from the received session ACK packet, the data obtained from the ACK packet including at least one of a source IP address of the IP header, a destination port, and a source port, wherein the transition cookie validator concatenates the obtained data from the session ACK packet to generate a first data item of the validator and the transition cookie validator uses the first or another hash function to generate the candidate transition cookie secret key from the first data item of the validator,
wherein at least one of:
the transition cookie generator uses a secret key offset to select one or more bits of data from the first data item of the generator in order to generate a second data item of the generator, and
the transition cookie validator uses a candidate secret key offset to select one or more bits of data from the first data item of the validator in order to generate a second data item of the validator.
2. The system according toclaim 1, in which the transition cookie validator determines that the received session ACK packet is valid if the candidate transition cookie in the received session ACK packet comprises a time value representing a time within a predetermined time interval from the time the session ACK packet is received.
3. The system according toclaim 1, in which the predetermined time interval is in the range of one to six seconds.
4. The system according toclaim 1, in which the predetermined time interval is three seconds.
5. The system according toclaim 1, in which the generating of the transition cookie includes the use of random data.
6. The system according toclaim 1, in which the generating of the transition cookie includes the use of data obtained from the session SYN packet.
7. A system for TCP SYN cookie validation at a host server comprising:
a session SYN packet receiver for receiving a session SYN packet;
a transition cookie generator operating to generate a transition cookie with the use of a transition cookie secret key, the transition cookie comprising a time value representing the actual time, wherein the transition cookie generator generates the transition cookie by (i) generating an encrypted data element of the generator by applying a cryptographic method on the transition cookie secret key and a transition cookie data element, (ii) performing an unsigned binary addition on the encrypted data element of the generator and a sequence number of a TCP header in the received session SYN packet, and (iii) storing the result in the transition cookie;
a session SYN/ACK packet sender for sending the transition cookie in response to the received session SYN packet;
a session ACK packet receiver for receiving a session ACK packet, the session ACK packet including a candidate transition cookie; and
a transition cookie validator, for determining whether the candidate transition cookie in the received session ACK packet comprises a time value representing a time within a predetermined time interval from the time the session ACK packet is received.
8. The system according toclaim 7, wherein the transition cookie data element comprises data based on at least one of: a selective ACK, an MSS index, and a 32-bit current time of day indicated by a clock.
9. A system for TCP SYN cookie validation at a host server comprising:
a session SYN packet receiver for receiving a session SYN packet;
a transition cookie generator operating to generate a transition cookie with the use of a transition cookie secret key, the transition cookie comprising a time value representing the actual time;
a session SYN/ACK packet sender for sending the transition cookie in response to the received session SYN packet;
a session ACK packet receiver for receiving a session ACK packet, the session ACK packet including a candidate transition cookie; and
a transition cookie validator, for determining whether the candidate transition cookie in the received session ACK packet comprises a time value representing a time within a predetermined time interval from the time the session ACK packet is received, wherein the transition cookie validator generates:
a candidate sequence number such that a sequence number of a TCP header in the received session ACK packet equals the sum of the candidate sequence number and a value of 1,
a candidate encrypted data element such that the result of performing an unsigned binary addition of the candidate encrypted data element and a candidate sequence number equals the candidate transition cookie, and
a candidate transition cookie data element by applying a cryptographic method on a candidate transition cookie secret key and the candidate encrypted data element.
10. The system according toclaim 9, wherein the transition cookie validator validates the candidate transition cookie data element by adjusting the candidate transition cookie data element to generate, and determining if the adjusted candidate transition cookie data element is within a predetermined time margin of a modified current time.
11. A system for TCP SYN cookie validation at a host server, the system comprising:
at least one processor and a memory storing:
a session SYN packet receiver, wherein when the session SYN packet receiver is executed by the at least one processor, the session SYN packet receiver causing the at least one processor to receive a session SYN packet;
a transition cookie generator, the transition cookie generator being executed by the at least one processor to generate a transition cookie with the use of a transition cookie secret key, the transition cookie comprising a time value representing the actual time;
a session SYN/ACK packet sender, the session SYN/ACK packet sender being executed by the at least one processor to send the transition cookie in response to the received session SYN packet;
a session ACK packet receiver, the session ACK packet receiver being executed by the at least one processor to receive a session ACK packet, the session ACK packet including a candidate transition cookie; and
a transition cookie validator, the transition cookie validator being executed by the at least one processor to determine whether the candidate transition cookie in the received session ACK packet comprises a time value representing a time within a predetermined time interval from the time the session ACK packet is received; and
wherein:
the transition cookie generator is executed by the at least one processor to generate the transition cookie secret key based on data obtained from the received session SYN packet;
the transition cookie validator is executed by the at least one processor to generate a candidate transition cookie secret key based on data obtained from the received session ACK packet;
the transition cookie generator is executed by the at least one processor to concatenate the obtained data from the session SYN packet to generate a first data item of the generator;
the transition cookie validator is executed by the at least one processor to concatenate the obtained data from the session ACK packet to generate a first data item of the validator;
the transition cookie generator is executed by the at least one processor to use a secret key offset to select one or more bits of data from the first data item of the generator in order to generate a second data item of the generator, and
the transition cookie validator is executed by the at least one processor to use a candidate secret key offset to select one or more bits of data from the first data item of the validator in order to generate a second data item of the validator.
12. The system according to claim 11, wherein:
when the transition cookie secret key is generated based on data obtained from the received session SYN packet, the obtained data includes at least one of: a source IP address of an IP header, a destination port, a source port, and a sequence number of a TCP header in the received session SYN packet, and
when the candidate transition cookie secret key is generated based on data obtained from the received session ACK packet, the obtained data includes at least one of:
a source IP address of the IP header, a destination port, and a source port.
13. The system according to claim 11, wherein at least one of:
the transition cookie generator is executed by the at least one processor to use a first hash function to generate the transition cookie secret key from the first data item of the generator, and
when the transition cookie validator is executed by the at least one processor to use the first or another hash function to generate the candidate transition cookie secret key from the first data item of the validator.
14. The system according to claim 11, in which the transition cookie validator is executed by the at least one processor to determine that the received session ACK packet is valid if the candidate transition cookie in the received session ACK packet comprises a time value representing a time within a predetermined time interval from the time the session ACK packet is received.
15. The system according to claim 11, in which the predetermined time interval is in the range of one to six seconds.
16. The system according to claim 11, in which the predetermined time interval is three seconds.
17. The system according to claim 11, in which the generating of the transition cookie includes the use of random data.
18. The system according to claim 11, in which the generating of the transition cookie includes the use of data obtained from the session SYN packet.
19. A system for TCP SYN cookie validation at a host server, the system comprising:
at least one processor and a memory storing:
a session SYN packet receiver, wherein the session SYN packet receiver is executed by the at least one processor to receive a session SYN packet;
a transition cookie generator, wherein the transition cookie generator is executed by the at least one processor to generate a transition cookie with the use of a transition cookie secret key, the transition cookie comprising a time value representing the actual time;
a session SYN/ACK packet sender, wherein the session SYN/ACK packet sender is executed by the at least one processor to send the transition cookie in response to the received session SYN packet;
a session ACK packet receiver, wherein when the session ACK packet receiver is executed by the at least one processor to receive a session ACK packet, the session ACK packet including a candidate transition cookie; and
a transition cookie validator, wherein the transition cookie validator is executed by the at least one processor to determine whether the candidate transition cookie in the received session ACK packet comprises a time value representing a time within a predetermined time interval from the time the session ACK packet is received; and wherein:
the transition cookie generator is executed by the at least one processor to generate the transition cookie by (i) generating an encrypted data element of the generator by applying a cryptographic method on the transition cookie secret key and a transition cookie data element, (ii) performing an unsigned binary addition on the encrypted data element of the generator and a sequence number of a TCP header in the received session SYN packet, and (iii) storing the result in the transition cookie.
20. The system according to claim 19, wherein the transition cookie data element comprises data based on at least one of: a selective ACK, an MSS index, and a 32-bit current time of day indicated by a clock.
21. The system according to claim 19, in which the transition cookie validator is executed by the at least one processor to determine that the received session ACK packet is valid if the candidate transition cookie in the received session ACK packet comprises a time value representing a time within a predetermined time interval from the time the session ACK packet is received.
22. The system according to claim 19, in which the predetermined time interval is in the range of one to six seconds.
23. The system according to claim 19, in which the predetermined time interval is three seconds.
24. The system according to claim 19, in which the generating of the transition cookie includes the use of random data.
25. The system according to claim 19, in which the generating of the transition cookie includes the use of data obtained from the session SYN packet.
26. A system for TCP SYN cookie validation at a host server, the system comprising:
at least one processor and a memory storing:
a session SYN packet receiver, wherein the session SYN packet receiver is executed by the at least one processor to receive a session SYN packet;
a transition cookie generator, wherein the transition cookie generator is executed by the at least one processor to generate a transition cookie with the use of a transition cookie secret key, the transition cookie comprising a time value representing the actual time;
a session SYN/ACK packet sender, wherein the session SYN/ACK packet sender is executed by the at least one processor to send the transition cookie in response to the received session SYN packet;
a session ACK packet receiver, wherein the session ACK packet receiver is executed by the at least one processor to receive a session ACK packet, the session ACK packet including a candidate transition cookie; and
a transition cookie validator, wherein the transition cookie validator is executed by the at least one processor to determine whether the candidate transition cookie in the received session ACK packet comprises a time value representing a time within a predetermined time interval from the time the session ACK packet is received; and to generate:
a candidate sequence number such that a sequence number of a TCP header in the received session ACK packet equals the sum of the candidate sequence number and a value of 1,
a candidate encrypted data element such that the result of performing an unsigned binary addition of the candidate encrypted data element and a candidate sequence number equals the candidate transition cookie, and
a candidate transition cookie data element by (i) applying a cryptographic method on a candidate transition cookie secret key and the candidate encrypted data element.
27. The system according to claim 26, wherein the transition cookie validator is executed by the at least one processor to validate the candidate transition cookie data element by adjusting the candidate transition cookie data element to generate, and determining if the adjusted candidate transition cookie data element is within a predetermined time margin of a modified current time.
28. The system according to claim 26, in which when the transition cookie validator is executed by the at least one processor to determine that the received session ACK packet is valid if the candidate transition cookie in the received session ACK packet comprises a time value representing a time within a predetermined time interval from the time the session ACK packet is received.
US14/151,8032006-02-212014-01-09System and method for an adaptive TCP SYN cookie with time validationActive2029-01-09USRE47296E1 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US14/151,803USRE47296E1 (en)2006-02-212014-01-09System and method for an adaptive TCP SYN cookie with time validation
US16/235,249USRE49053E1 (en)2006-02-212018-12-28System and method for an adaptive TCP SYN cookie with time validation

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US11/358,245US7675854B2 (en)2006-02-212006-02-21System and method for an adaptive TCP SYN cookie with time validation
US13/413,191USRE44701E1 (en)2006-02-212012-03-06System and method for an adaptive TCP SYN cookie with time validation
US14/151,803USRE47296E1 (en)2006-02-212014-01-09System and method for an adaptive TCP SYN cookie with time validation

Related Parent Applications (2)

Application NumberTitlePriority DateFiling Date
US11/358,245ReissueUS7675854B2 (en)2006-02-212006-02-21System and method for an adaptive TCP SYN cookie with time validation
US13/413,191ContinuationUSRE44701E1 (en)2006-02-212012-03-06System and method for an adaptive TCP SYN cookie with time validation

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US11/358,245ContinuationUS7675854B2 (en)2006-02-212006-02-21System and method for an adaptive TCP SYN cookie with time validation

Publications (1)

Publication NumberPublication Date
USRE47296E1true USRE47296E1 (en)2019-03-12

Family

ID=38428122

Family Applications (4)

Application NumberTitlePriority DateFiling Date
US11/358,245CeasedUS7675854B2 (en)2006-02-212006-02-21System and method for an adaptive TCP SYN cookie with time validation
US13/413,191Active2029-01-09USRE44701E1 (en)2006-02-212012-03-06System and method for an adaptive TCP SYN cookie with time validation
US14/151,803Active2029-01-09USRE47296E1 (en)2006-02-212014-01-09System and method for an adaptive TCP SYN cookie with time validation
US16/235,249Active2029-01-09USRE49053E1 (en)2006-02-212018-12-28System and method for an adaptive TCP SYN cookie with time validation

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US11/358,245CeasedUS7675854B2 (en)2006-02-212006-02-21System and method for an adaptive TCP SYN cookie with time validation
US13/413,191Active2029-01-09USRE44701E1 (en)2006-02-212012-03-06System and method for an adaptive TCP SYN cookie with time validation

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US16/235,249Active2029-01-09USRE49053E1 (en)2006-02-212018-12-28System and method for an adaptive TCP SYN cookie with time validation

Country Status (1)

CountryLink
US (4)US7675854B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
USRE49053E1 (en)*2006-02-212022-04-26A10 Networks, Inc.System and method for an adaptive TCP SYN cookie with time validation

Families Citing this family (53)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7720977B1 (en)2003-02-112010-05-18Foundry Networks, Inc.Cookie invalidation or expiration by a switch
US8149708B2 (en)*2006-04-202012-04-03Cisco Technology, Inc.Dynamically switching streams of packets among dedicated and shared queues
US8312507B2 (en)2006-10-172012-11-13A10 Networks, Inc.System and method to apply network traffic policy to an application session
US8584199B1 (en)2006-10-172013-11-12A10 Networks, Inc.System and method to apply a packet routing policy to an application session
US8296835B2 (en)*2007-05-112012-10-23Microsoft CorporationOver the air communication authentication using a service token
US8205080B2 (en)*2007-05-112012-06-19Microsoft CorporationOver the air communication authentication using a device token
US7921282B1 (en)*2007-08-202011-04-05F5 Networks, Inc.Using SYN-ACK cookies within a TCP/IP protocol
CN102014110A (en)*2009-09-082011-04-13华为技术有限公司Method for authenticating communication flows, communication system and protective device
US9960967B2 (en)*2009-10-212018-05-01A10 Networks, Inc.Determining an application delivery server based on geo-location information
KR101263329B1 (en)*2009-12-022013-05-16한국전자통신연구원Method and apparatus for preventing network attacks, method and apparatus for processing transmission and receipt of packet comprising the same
US8380994B2 (en)2009-12-232013-02-19Citrix Systems, Inc.Systems and methods for generating and managing cookie signatures for prevention of HTTP denial of service in multi-core system
US9215275B2 (en)2010-09-302015-12-15A10 Networks, Inc.System and method to balance servers based on server load status
US9609052B2 (en)2010-12-022017-03-28A10 Networks, Inc.Distributing application traffic to servers based on dynamic service response time
KR101510432B1 (en)*2010-12-222015-04-10한국전자통신연구원Apparatus for analizing traffic
US8595477B1 (en)*2011-03-242013-11-26Google Inc.Systems and methods for reducing handshake delay in streaming protocol web requests
US8897154B2 (en)2011-10-242014-11-25A10 Networks, Inc.Combining stateless and stateful server load balancing
US9386088B2 (en)2011-11-292016-07-05A10 Networks, Inc.Accelerating service processing using fast path TCP
US9094364B2 (en)2011-12-232015-07-28A10 Networks, Inc.Methods to manage services over a service gateway
US10044582B2 (en)2012-01-282018-08-07A10 Networks, Inc.Generating secure name records
US9027129B1 (en)2012-04-302015-05-05Brocade Communications Systems, Inc.Techniques for protecting against denial of service attacks
US9596286B2 (en)2012-05-252017-03-14A10 Networks, Inc.Method to process HTTP header with hardware assistance
CN103491061B (en)*2012-06-132017-02-15华为技术有限公司Attack mitigation method, serial number providing method and equipment
US8782221B2 (en)2012-07-052014-07-15A10 Networks, Inc.Method to allocate buffer for TCP proxy session based on dynamic network conditions
US9106561B2 (en)2012-12-062015-08-11A10 Networks, Inc.Configuration of a virtual service network
KR101692751B1 (en)2012-09-252017-01-04에이10 네트워크스, 인코포레이티드Load distribution in data networks
US9843484B2 (en)2012-09-252017-12-12A10 Networks, Inc.Graceful scaling in software driven networks
US10021174B2 (en)2012-09-252018-07-10A10 Networks, Inc.Distributing service sessions
US10002141B2 (en)2012-09-252018-06-19A10 Networks, Inc.Distributed database in software driven networks
US9338225B2 (en)2012-12-062016-05-10A10 Networks, Inc.Forwarding policies on a virtual service network
US8978143B2 (en)*2013-01-022015-03-10Verisign, Inc.Reverse authorized SYN cookie
US9531846B2 (en)2013-01-232016-12-27A10 Networks, Inc.Reducing buffer usage for TCP proxy session based on delayed acknowledgement
US9900252B2 (en)2013-03-082018-02-20A10 Networks, Inc.Application delivery controller and global server load balancer
WO2014144837A1 (en)2013-03-152014-09-18A10 Networks, Inc.Processing data packets using a policy based network path
US10038693B2 (en)2013-05-032018-07-31A10 Networks, Inc.Facilitating secure network traffic by an application delivery controller
US10027761B2 (en)2013-05-032018-07-17A10 Networks, Inc.Facilitating a secure 3 party network session by a network device
US10230770B2 (en)2013-12-022019-03-12A10 Networks, Inc.Network proxy layer for policy-based application proxies
KR20150084307A (en)*2014-01-132015-07-22삼성전자주식회사Apparatus and method for controlling an web loading time in a network
US9942152B2 (en)2014-03-252018-04-10A10 Networks, Inc.Forwarding data packets using a service-based forwarding policy
US10020979B1 (en)2014-03-252018-07-10A10 Networks, Inc.Allocating resources in multi-core computing environments
US9942162B2 (en)2014-03-312018-04-10A10 Networks, Inc.Active application response delay time
US9806943B2 (en)2014-04-242017-10-31A10 Networks, Inc.Enabling planned upgrade/downgrade of network devices without impacting network sessions
US9848067B2 (en)*2014-04-252017-12-19Cisco Technology, Inc.Managing sequence values with added headers in computing devices
US9906422B2 (en)2014-05-162018-02-27A10 Networks, Inc.Distributed system to determine a server's health
US10129122B2 (en)2014-06-032018-11-13A10 Networks, Inc.User defined objects for network devices
US9986061B2 (en)2014-06-032018-05-29A10 Networks, Inc.Programming a data network device using user defined scripts
US9992229B2 (en)2014-06-032018-06-05A10 Networks, Inc.Programming a data network device using user defined scripts with licenses
US10581976B2 (en)2015-08-122020-03-03A10 Networks, Inc.Transmission control of protocol state exchange for dynamic stateful service insertion
US10243791B2 (en)2015-08-132019-03-26A10 Networks, Inc.Automated adjustment of subscriber policies
US10318288B2 (en)2016-01-132019-06-11A10 Networks, Inc.System and method to process a chain of network applications
US10158666B2 (en)*2016-07-262018-12-18A10 Networks, Inc.Mitigating TCP SYN DDoS attacks using TCP reset
US10389835B2 (en)2017-01-102019-08-20A10 Networks, Inc.Application aware systems and methods to process user loadable network applications
US11323529B2 (en)*2017-07-182022-05-03A10 Networks, Inc.TCP fast open hardware support in proxy devices
US11019022B1 (en)2020-01-282021-05-25F5 Networks, Inc.Processing packets with returnable values

Citations (427)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5218602A (en)1991-04-041993-06-08Dsc Communications CorporationInterprocessor switching network
TW269763B (en)1995-09-121996-02-01Ind Tech Res InstSeamless handoff for a wireless/wired LAN internetworking
JPH0997233A (en)1995-09-281997-04-08Nec CorpLoad distributing method for on-line information processing system
US5774660A (en)1996-08-051998-06-30Resonate, Inc.World-wide-web server with delayed resource-binding for resource-based load balancing on a distributed resource multi-node network
US5862339A (en)1996-07-091999-01-19Webtv Networks, Inc.Client connects to an internet access provider using algorithm downloaded from a central server based upon client's desired criteria after disconnected from the server
US5875185A (en)1995-10-101999-02-23Industrial Technology Research Inst.Seamless handoff for a wireless lan/wired lan internetworking
JPH1196128A (en)1997-09-221999-04-09Fujitsu Ltd Network service server load adjusting device, method and recording medium
US5935207A (en)1996-06-031999-08-10Webtv Networks, Inc.Method and apparatus for providing remote site administrators with user hits on mirrored web sites
US5958053A (en)*1997-01-301999-09-28At&T Corp.Communications protocol with improved security
US5995981A (en)1997-06-161999-11-30Telefonaktiebolaget Lm EricssonInitialization of replicated data objects
JPH11338836A (en)1998-05-251999-12-10Nippon Telegr & Teleph Corp <Ntt> Computer Network Load Balancing System
US6003069A (en)1997-12-161999-12-14Lexmark International, Inc.Client/server printer driver system
US6047268A (en)*1997-11-042000-04-04A.T.&T. CorporationMethod and apparatus for billing for transactions conducted over the internet
US6075783A (en)1997-03-062000-06-13Bell Atlantic Network Services, Inc.Internet phone to PSTN cellular/PCS system
JP2000276432A (en)1999-03-242000-10-06Nec CorpDynamic load distribution system for transaction message
US6131163A (en)1998-02-172000-10-10Cisco Technology, Inc.Network gateway mechanism having a protocol stack proxy
JP2000307634A (en)1999-04-152000-11-02Kdd Corp Congestion control method by relay station in packet switching network
WO2001013228A2 (en)1999-08-132001-02-22Sun Microsystems, Inc.Graceful distribution in application server load balancing
JP2001051859A (en)1999-08-112001-02-23Hitachi Ltd Load information communication method
WO2001014990A1 (en)1999-08-212001-03-01Webever, Inc.Method for content delivery over the internet
TW425821B (en)1999-05-312001-03-11Ind Tech Res InstKey management method
US6219706B1 (en)1998-10-162001-04-17Cisco Technology, Inc.Access control for networks
WO2001045349A2 (en)1999-12-162001-06-21Speedera Networks, Inc.Scalable domain name system with persistence and load balancing
TW444478B (en)1998-12-102001-07-01Ind Tech Res InstEthernet switch IC with shared memory structure and its network
JP2001298449A (en)2000-04-122001-10-26Matsushita Electric Ind Co Ltd Security communication method, communication system and its device
US20010042200A1 (en)*2000-05-122001-11-15International Business MachinesMethods and systems for defeating TCP SYN flooding attacks
US6321338B1 (en)*1998-11-092001-11-20Sri InternationalNetwork surveillance
US20010049741A1 (en)1999-06-182001-12-06Bryan D. SkeneMethod and system for balancing load distribution on a wide area network
US20020026515A1 (en)2000-08-292002-02-28AlcatelData network
US20020032799A1 (en)2000-05-022002-03-14Globalstar L.P.Deferring DNS service for a satellite ISP system using non-geosynchronous orbit satellites
US20020032777A1 (en)2000-09-112002-03-14Yoko KawataLoad sharing apparatus and a load estimation method
US6374300B2 (en)1999-07-152002-04-16F5 Networks, Inc.Method and system for storing load balancing information with an HTTP cookie
EP1209876A2 (en)2000-11-212002-05-29Avaya Communication Israel Ltd.Dynamic load balancer
US20020078164A1 (en)2000-12-132002-06-20Marnetics Ltd.System and method for data transfer acceleration in a TCP network environment
US20020091844A1 (en)1997-10-142002-07-11Alacritech, Inc.Network interface device that fast-path processes solicited session layer read commands
US20020103916A1 (en)*2000-09-072002-08-01Benjie ChenThwarting connection-based denial of service attacks
US20020133491A1 (en)2000-10-262002-09-19Prismedia Networks, Inc.Method and system for managing distributed content and related metadata
US6456617B1 (en)1997-08-122002-09-24Kokusai Denshin Denwa Co., Ltd.Routing control communication system between circuit switched network and internet
US20020138618A1 (en)2000-03-212002-09-26F5 Networks, Inc.Simplified method for processing multiple connections from the same client
US6459682B1 (en)1998-04-072002-10-01International Business Machines CorporationArchitecture for supporting service level agreements in an IP network
CN1372662A (en)1999-07-092002-10-02卡纳尔股份有限公司Running and testing applications
US20020141386A1 (en)2001-03-292002-10-03Minert Brian D.System, apparatus and method for voice over internet protocol telephone calling using enhanced signaling packets and localized time slot interchanging
US20020143991A1 (en)2001-03-162002-10-03Kingsum ChowGeographic location determination including inspection of network address
US6483600B1 (en)1999-02-262002-11-193Com CorporationSystem and method for communicating real-time facsimiles over data networks
US20020178259A1 (en)2001-05-232002-11-28International Business Machines CorporationLoad balancing content requests using dynamic document generation cost information
US20020188678A1 (en)2001-06-052002-12-12Edecker Ada MaeNetworked computer system for communicating and operating in a virtual reality environment
US20020194350A1 (en)2001-06-182002-12-19Lu Leonard L.Content-aware web switch without delayed binding and methods thereof
US20020194335A1 (en)2001-06-192002-12-19Maynard William PatMethod and apparatus for load balancing
US20020191575A1 (en)2001-06-182002-12-19Broadwave, Inc.Method and apparatus for converging local area and wide area wireless data networks
US20030009591A1 (en)2001-06-252003-01-09Clive HayballApparatus and method for managing internet resource requests
US20030014544A1 (en)2001-02-152003-01-16BanderacomInfiniband TM work queue to TCP/IP translation
US20030023873A1 (en)2001-03-162003-01-30Yuval Ben-ItzhakApplication-layer security method and system
US20030023711A1 (en)2001-07-302003-01-30Parmar Pankaj N.Identifying network management policies
US20030035409A1 (en)2001-08-202003-02-20Wang Jiwei R.Method and apparatus for providing service selection, redirection and managing of subscriber access to multiple WAP (Wireless Application Protecol) geteways simultaneously
US20030035420A1 (en)2000-08-182003-02-20Zhisheng NiuTCP aware local retransmissioner scheme for unreliable transmission network
US20030061506A1 (en)2001-04-052003-03-27Geoffrey CooperSystem and method for security policy
US20030091028A1 (en)1997-07-252003-05-15Chang Gordon K.Apparatus and method for integrated voice gateway
JP2003141068A (en)2001-11-022003-05-16Canon Software IncSession management device, and session management method, program and storage medium
US6578066B1 (en)1999-09-172003-06-10Alteon WebsystemsDistributed load-balancing internet servers
US6587866B1 (en)2000-01-102003-07-01Sun Microsystems, Inc.Method for distributing packets to server nodes using network client affinity and packet distribution table
JP2003186776A (en)2001-12-132003-07-04Hitachi Ltd Congestion control system
US20030131245A1 (en)2002-01-042003-07-10Michael LindermanCommunication security system
US20030135625A1 (en)*2002-01-152003-07-17International Business Machines CorporationBlended SYN cookies
US6600738B1 (en)1999-10-022003-07-29Ericsson, Inc.Routing in an IP network based on codec availability and subscriber preference
CN1449618A (en)2000-09-042003-10-15国际商业机器公司System communication between computer systems
US20030195962A1 (en)2002-04-102003-10-16Satoshi KikuchiLoad balancing of servers
WO2003103237A1 (en)2002-06-042003-12-11Cosine Communications, Inc.System and method for controlling routing in a virtual router system
US20040010545A1 (en)2002-06-112004-01-15Pandya Ashish A.Data processing system using internet protocols and RDMA
CN1473300A (en)2000-09-292004-02-04Intelligent network storage interface system and device
US20040062246A1 (en)1997-10-142004-04-01Alacritech, Inc.High performance network interface
US20040073703A1 (en)1997-10-142004-04-15Alacritech, Inc.Fast-path apparatus for receiving data corresponding a TCP connection
US20040078419A1 (en)2001-11-022004-04-22Stephen FerrariSwitching system
US20040078480A1 (en)1997-10-142004-04-22Boucher Laurence B.Parsing a packet header
US20040103315A1 (en)2001-06-072004-05-27Geoffrey CooperAssessment tool
US6748414B1 (en)1999-11-152004-06-08International Business Machines CorporationMethod and apparatus for the load balancing of non-identical servers in a network environment
US20040111516A1 (en)2002-12-062004-06-10Stuart CainReduced wireless internet connect time
US20040128312A1 (en)2002-12-312004-07-01International Business Machines CorporationSystem and method for invoking methods on place objects in a distributed environment
US20040139057A1 (en)2002-12-312004-07-15International Business Machines CorporationSystem and method for searching a plurality of databases distributed across a multi server domain
US20040139108A1 (en)2002-12-312004-07-15International Business Machines CorporationSystem and method for aggregating user project information in a multi-server system
US20040141005A1 (en)2003-01-222004-07-22International Business Machines CorporationSystem and method for integrating online meeting materials in a place
US20040143599A1 (en)2003-01-222004-07-22International Business Machines CorporationSystem and method for command line administration of project spaces using XML objects
US6772205B1 (en)1999-03-122004-08-03Nortel Networks LimitedExecuting applications on a target network device using a proxy network device
US6772334B1 (en)*2000-08-312004-08-03Networks Associates, Inc.System and method for preventing a spoofed denial of service attack in a networked computing environment
US6779017B1 (en)1999-04-292004-08-17International Business Machines CorporationMethod and system for dispatching client sessions within a cluster of servers connected to the world wide web
US6779033B1 (en)*2000-12-282004-08-17Networks Associates Technology, Inc.System and method for transacting a validated application session in a networked computing environment
CN1529460A (en)2003-10-142004-09-15北京邮电大学 Global load balancing method based on global network location
US20040187032A1 (en)2001-08-072004-09-23Christoph GelsMethod, data carrier, computer system and computer progamme for the identification and defence of attacks in server of network service providers and operators
WO2004084085A1 (en)2003-03-182004-09-30Fujitsu LimitedLoad distributing system by intersite cooperation
US20040199646A1 (en)2000-02-182004-10-07Netscaler, Inc.Apparatus, method and computer program product for guaranteed content delivery incorporating putting a client on-hold based on response time
US20040199616A1 (en)2002-12-302004-10-07Mika KarhuAutomatic and dynamic service information delivery from service providers to data terminals in an access point network
US6804224B1 (en)2000-02-292004-10-123Com CorporationSystem and method for providing telephone service having private branch exchange features in a voice-over-data network telephony system
US20040202182A1 (en)2003-02-122004-10-14Martin LundMethod and system to provide blade server load balancing using spare link bandwidth
US20040210663A1 (en)2003-04-152004-10-21Paul PhillipsObject-aware transport-layer network processing engine
US20040210623A1 (en)2003-03-062004-10-21Aamer HydrieVirtual network topology generation
US20040213158A1 (en)2001-06-072004-10-28Paul CollettReal time processing
US20040250059A1 (en)2003-04-152004-12-09Brian RamelsonSecure network processing
US20040268358A1 (en)2003-06-302004-12-30Microsoft CorporationNetwork load balancing with host status information
US20050005207A1 (en)2001-09-282005-01-06Thierry HernequeMethod of improving the performance of a transmission protocol using a retransmission timer
US20050009520A1 (en)2001-07-032005-01-13Herrero Antonio Juan SanchezMethod and system for handling multiple registration
US20050021848A1 (en)2000-10-132005-01-27Jorgenson Daniel ScottSystem and method for distributing load among redundant independent stateful World Wide Web server sites
CN1575582A (en)2001-09-282005-02-02塞维斯通讯公司 Configurable Adaptive Global Communications Control and Management
US20050027862A1 (en)2003-07-182005-02-03Nguyen Tien LeSystem and methods of cooperatively load-balancing clustered servers
US20050036511A1 (en)2003-08-142005-02-17International Business Machines Corp.Method, system and article for improved TCP performance during packet reordering
US20050039033A1 (en)2003-07-252005-02-17Activeviews, Inc.Method and system for building a report for execution against a data store
US20050036501A1 (en)2003-08-112005-02-17Samsung Electronics Co., Ltd.Domain name service system and method thereof
US20050044270A1 (en)2000-02-072005-02-24Grove Adam J.Method for high-performance delivery of web content
US20050074013A1 (en)1998-02-022005-04-07Hershey Paul C.System and associated method for the synchronization and control of multiplexed payloads over a telecommunications network
US20050080890A1 (en)2003-10-142005-04-14Yang Sun HeeServer load balancing apparatus and method using MPLS session
US20050102400A1 (en)2003-11-062005-05-12Masahiko NakaharaLoad balancing system
US20050125276A1 (en)2003-12-052005-06-09Grigore RusuSystem and method for event tracking across plural contact mediums
US20050163073A1 (en)2002-06-102005-07-28Ipr Licensing, IncApplying session services based on packet flows
US20050198335A1 (en)2001-02-062005-09-08Microsoft CorporationDistributed load balancing for single entry-point systems
US20050213586A1 (en)2004-02-052005-09-29David CyganskiSystem and method to increase network throughput
US6952728B1 (en)1999-12-012005-10-04Nortel Networks LimitedProviding desired service policies to subscribers accessing internet
US20050240989A1 (en)*2004-04-232005-10-27Seoul National University Industry FoundationMethod of sharing state between stateful inspection firewalls on mep network
US20050249225A1 (en)2004-05-102005-11-10Singhal Tara CMethod and apparatus for packet source validation architecture system for enhanced Internet security
US20050259586A1 (en)2004-05-192005-11-24Abdelhakim HafidDynamic traffic rearrangement and restoration for MPLS networks with differentiated services capabilities
US20050281190A1 (en)2004-06-172005-12-22Mcgee Michael SAutomated recovery from a split segment condition in a layer2 network for teamed network resources of a computer systerm
CN1714545A (en)2002-01-242005-12-28艾维西系统公司System and method for fault tolerant data communication
CN1725702A (en)2004-07-202006-01-25联想网御科技(北京)有限公司Network safety equipment and assemblied system and method for implementing high availability
US20060023721A1 (en)*2004-07-292006-02-02Ntt Docomo, Inc.Server device, method for controlling a server device, and method for establishing a connection using the server device
US20060036733A1 (en)2004-07-092006-02-16Toshiba America Research, Inc.Dynamic host configuration and network access authentication
US20060036610A1 (en)2004-08-132006-02-16Reallusion Inc.File conversion and sharing system and the method of the same
US20060041745A1 (en)2002-06-192006-02-23Marratech AbApparatus and method for conveying private information within a group communication system
US7010605B1 (en)2000-08-292006-03-07Microsoft CorporationMethod and apparatus for encoding and storing session data
US7013482B1 (en)2000-07-072006-03-14802 Systems LlcMethods for packet filtering including packet invalidation if packet validity determination not timely made
US20060064478A1 (en)2004-05-032006-03-23Level 3 Communications, Inc.Geo-locating load balancing
US20060069804A1 (en)*2004-08-252006-03-30Ntt Docomo, Inc.Server device, client device, and process execution method
US20060069774A1 (en)2004-06-172006-03-30International Business Machine CorporationMethod and apparatus for managing data center using Web services
US20060077926A1 (en)2004-10-082006-04-13Telefonaktiebolaget Lm Ericsson (Publ)Home network-assisted selection of intermediary network for a roaming mobile terminal
US20060092950A1 (en)2004-10-282006-05-04Cisco Technology, Inc.Architecture and method having redundancy in active/active stateful devices based on symmetric global load balancing protocol (sGLBP)
US20060098645A1 (en)2004-11-092006-05-11Lev WalkinSystem and method for providing client identifying information to a server
US20060112170A1 (en)2004-05-032006-05-25Craig SirkinGeo-locating load balancing
US7069438B2 (en)*2002-08-192006-06-27Sowl Associates, Inc.Establishing authenticated network connections
US7076555B1 (en)2002-01-232006-07-11Novell, Inc.System and method for transparent takeover of TCP connections between servers
US20060164978A1 (en)2005-01-212006-07-27At&T Corp.Methods, systems, and devices for determining COS level
US20060168319A1 (en)2004-11-182006-07-27Nokia CorporationSystems and methods for multipoint service invocation
US20060190997A1 (en)2005-02-222006-08-24Mahajani Amol VMethod and system for transparent in-line protection of an electronic communications network
US20060187901A1 (en)2005-02-232006-08-24Lucent Technologies Inc.Concurrent dual-state proxy server, method of providing a proxy and SIP network employing the same
US20060209789A1 (en)2005-03-042006-09-21Sun Microsystems, Inc.Method and apparatus for reducing bandwidth usage in secure transactions
WO2006098033A1 (en)2005-03-172006-09-21Fujitsu LimitedLoad-distributing communication device and load-distribution managing device
US20060230129A1 (en)*2005-02-042006-10-12Nokia CorporationApparatus, method and computer program product to reduce TCP flooding attacks while conserving wireless network bandwidth
US20060233100A1 (en)2005-04-132006-10-19Luft Siegfried JApplication aware traffic shaping service node positioned between the access and core networks
US20060251057A1 (en)2005-05-062006-11-09Sung-Bok KwonName service system and method thereof
US7143087B2 (en)2002-02-012006-11-28John FairweatherSystem and method for creating a distributed network architecture
JP2006332825A (en)2005-05-242006-12-07Fujitsu Ltd Load distribution program, load distribution method, and load distribution apparatus
US20060277303A1 (en)2005-06-062006-12-07Nikhil HegdeMethod to improve response time when clients use network services
US20060280121A1 (en)*2005-06-132006-12-14Fujitsu LimitedFrame-transfer control device, DoS-attack preventing device, and DoS-attack preventing system
US7167927B2 (en)1997-10-142007-01-23Alacritech, Inc.TCP/IP offload device with fast-path TCP ACK generating and transmitting mechanism
US20070022479A1 (en)2005-07-212007-01-25Somsubhra SikdarNetwork interface and firewall device
US20070019543A1 (en)*2005-07-062007-01-25Fortinet, Inc.Systems and methods for detecting and preventing flooding attacks in a network environment
CN1910869A (en)2003-12-052007-02-07艾拉克瑞技术公司TCP/IP offload device with reduced sequential processing
US7181524B1 (en)2003-06-132007-02-20Veritas Operating CorporationMethod and apparatus for balancing a load among a plurality of servers in a computer system
EP1770915A1 (en)2005-09-292007-04-04Matsushita Electric Industrial Co., Ltd.Policy control in the evolved system architecture
US20070076653A1 (en)2005-09-192007-04-05Park Vincent DPacket routing in a wireless communications environment
US20070086382A1 (en)2005-10-172007-04-19Vidya NarayananMethods of network access configuration in an IP network
US20070094396A1 (en)2005-10-202007-04-26Hitachi, Ltd.Server pool management method
US7218722B1 (en)2000-12-182007-05-15Westell Technologies, Inc.System and method for providing call management services in a virtual private network using voice or video over internet protocol
US20070118881A1 (en)2005-11-182007-05-24Julian MitchellApplication control at a policy server
US20070124502A1 (en)2005-11-282007-05-31Huawei Technologies Co., Ltd.Script language based network device configuration management system and method
US7228359B1 (en)2002-02-122007-06-05Cisco Technology, Inc.Methods and apparatus for providing domain name service based on a client identifier
US7234161B1 (en)2002-12-312007-06-19Nvidia CorporationMethod and apparatus for deflecting flooding attacks
US7236457B2 (en)2002-10-042007-06-26Intel CorporationLoad balancing in a network
US20070156919A1 (en)2005-06-212007-07-05Sunil PottiEnforcing network service level agreements in a network element
US20070165622A1 (en)2006-01-172007-07-19Cisco Technology, Inc.Techniques for load balancing over a cluster of subscriber-aware application servers
CN101004740A (en)2006-01-182007-07-25腾讯科技(深圳)有限公司Method and system for reading information at network resource site, and searching engine
US20070180119A1 (en)2006-01-312007-08-02Roundbox, Inc.Reliable event broadcaster with multiplexing and bandwidth control functions
US7254133B2 (en)*2002-07-152007-08-07Intel CorporationPrevention of denial of service attacks
US20070185998A1 (en)2006-02-062007-08-09Cisco Technology, Inc.Supporting options in a communication session using a TCP cookie
US20070195792A1 (en)*2006-02-212007-08-23A10 Networks Inc.System and method for an adaptive TCP SYN cookie with time validation
US7269850B2 (en)2002-12-312007-09-11Intel CorporationSystems and methods for detecting and tracing denial of service attacks
US7277963B2 (en)2002-06-262007-10-02Sandvine IncorporatedTCP proxy providing application layer modifications
US20070230337A1 (en)2006-03-302007-10-04Ntt Docomo, Inc.Communication terminal and retransmission control method
US20070245090A1 (en)2006-03-242007-10-18Chris KingMethods and Systems for Caching Content at Multiple Levels
US20070243879A1 (en)2006-04-142007-10-18Park Vincent DMethods and apparatus for supporting quality of service in communication systems
US20070242738A1 (en)2006-04-142007-10-18Park Vincent DProviding quality of service for various traffic flows in a communications environment
US20070248009A1 (en)2006-04-242007-10-25Petersen Brian ADistributed congestion avoidance in a network switching system
US20070259673A1 (en)2006-05-042007-11-08Telefonaktiebolaget Lm Ericsson (Publ)Inactivity monitoring for different traffic or service classifications
US7301899B2 (en)*2001-01-312007-11-27Comverse Ltd.Prevention of bandwidth congestion in a denial of service or other internet-based attack
US20070283429A1 (en)2006-05-302007-12-06A10 Networks Inc.Sequence number based TCP session proxy
US7308499B2 (en)2003-04-302007-12-11Avaya Technology Corp.Dynamic load balancing for enterprise IP traffic
US20070288247A1 (en)2006-06-112007-12-13Michael MackayDigital life server
US20070286077A1 (en)2006-06-072007-12-13Nokia CorporationCommunication system
US7310686B2 (en)2002-10-272007-12-18Paxfire, Inc.Apparatus and method for transparent selection of an Internet server based on geographic location of a user
US20070294209A1 (en)2006-06-202007-12-20Lyle StrubCommunication network application activity monitoring and control
CN101094225A (en)2006-11-242007-12-26中兴通讯股份有限公司Network, system and method of differentiated security service
US20080016161A1 (en)2006-07-142008-01-17George TsirtsisMethods and apparatus for using electronic envelopes to configure parameters
US7328267B1 (en)2002-01-182008-02-05Cisco Technology, Inc.TCP proxy connection management in a gigabit environment
EP1885096A1 (en)2006-08-012008-02-06Alcatel LucentApplication session border element
US20080031263A1 (en)2006-08-072008-02-07Cisco Technology, Inc.Method and apparatus for load balancing over virtual network links
US7334232B2 (en)1998-11-052008-02-19Bea Systems, Inc.Clustered enterprise Java™ in a secure distributed processing system
JP2008040718A (en)2006-08-042008-02-21Nippon Telegr & Teleph Corp <Ntt> Load balancing control apparatus and method
US7337241B2 (en)2002-09-272008-02-26Alacritech, Inc.Fast-path apparatus for receiving data corresponding to a TCP connection
US7349970B2 (en)2001-03-292008-03-25International Business Machines CorporationWorkload management of stateful program entities
US20080076432A1 (en)2004-06-042008-03-27Nimal SenarathMethod and System for Soft Handoff in Mobile Broadband Systems
CN101163336A (en)2007-11-152008-04-16中兴通讯股份有限公司Method of implementing mobile phone terminal access authority authentication
CN101169785A (en)2007-11-212008-04-30浪潮电子信息产业股份有限公司 A Dynamic Load Balancing Method for Cluster Database System
US20080101396A1 (en)2006-10-312008-05-01Hiroaki MiyataPacket forwarding apparatus having gateway load distribution function
US7370353B2 (en)*2001-11-052008-05-06Cisco Technology, Inc.System and method for managing dynamic network sessions
WO2008053954A1 (en)2006-11-012008-05-08Panasonic CorporationCommunication control method, communication system, home agent allocation server, and mobile node
US20080109452A1 (en)2002-02-152008-05-08Cognos IncorporatedQueuing model for a plurality of servers
US20080109870A1 (en)2006-11-082008-05-08Kieran Gerard SherlockIdentities Correlation Infrastructure for Passive Network Monitoring
KR100830413B1 (en)2006-05-252008-05-20(주)씨디네트웍스 Server access system for clients and load balancing network system including the same
US20080120129A1 (en)2006-05-132008-05-22Michael SeubertConsistent set of interfaces derived from a business object model
CN101189598A (en)2005-03-092008-05-28泰克迪亚科技公司Method, apparatus and system for location-based uniform resource locator
CN101193089A (en)2006-11-202008-06-04阿里巴巴公司Stateful session system and its realization method
US20080134332A1 (en)2006-12-042008-06-05Susann Marie KeohaneMethod and apparatus for reduced redundant security screening
US7391725B2 (en)*2004-05-182008-06-24Christian HuitemaSystem and method for defeating SYN attacks
US20080162679A1 (en)2006-12-292008-07-03Ebay Inc.Alerting as to denial of service attacks
WO2008078593A1 (en)2006-12-222008-07-03International Business Machines CorporationMessage hub, program, and method
CN101247349A (en)2008-03-132008-08-20华耀环宇科技(北京)有限公司Network flux fast distribution method
US7423977B1 (en)2004-08-232008-09-09Foundry Networks Inc.Smoothing algorithm for round trip time (RTT) measurements
CN101261644A (en)2008-04-302008-09-10杭州华三通信技术有限公司Method and device for accessing united resource positioning symbol database
US20080225722A1 (en)2007-03-122008-09-18Prakash KhemaniSystems and methods for configuring policy bank invocations
US7430755B1 (en)*2002-09-032008-09-30Fs Networks, Inc.Method and system for providing persistence in a secure network access
US20080250099A1 (en)2007-04-062008-10-09Jinmei ShenOn-Demand Propagation of Routing Information in Distributed Computing System
US20080253390A1 (en)2007-04-162008-10-16Kamala Prasad DasMethod and apparatus for priority services management
US20080263209A1 (en)2007-04-202008-10-23Array Networks, Inc.Active-active operation for a cluster of SSL virtual private network (VPN) devices with load distribution
US20080271130A1 (en)2007-04-302008-10-30Shankar RamamoorthyMinimizing client-side inconsistencies in a distributed virtual file system
US20080282254A1 (en)2007-05-092008-11-13Radware, Ltd.Geographic Resiliency and Load Balancing for SIP Application Services
US20080291911A1 (en)2007-05-212008-11-27Ist International, Inc.Method and apparatus for setting a TCP retransmission timer
US20080298303A1 (en)2007-01-222008-12-04Qualcomm IncorporatedMulti-link support for network based mobility management systems
US7463648B1 (en)1999-08-232008-12-09Sun Microsystems, Inc.Approach for allocating resources to an apparatus based on optional resource requirements
US7467202B2 (en)2003-09-102008-12-16Fidelis Security SystemsHigh-performance network content analysis platform
US7472190B2 (en)2003-10-172008-12-30International Business Machines CorporationMethod, system and program product for preserving a user state in an application
JP2009500731A (en)2005-06-292009-01-08ビザ ユー.エス.エー. インコーポレイテッド Gateway adapted to switch transactions and data using context-based rules over unreliable networks
US20090024722A1 (en)2007-07-172009-01-22International Business Machines CorporationProxying availability indications in a failover configuration
US20090031415A1 (en)2007-07-262009-01-29International Business Machines CorporationDynamic Network Tunnel Endpoint Selection
US7492766B2 (en)2006-02-222009-02-17Juniper Networks, Inc.Dynamic building of VLAN interfaces based on subscriber information strings
US20090049198A1 (en)2007-08-142009-02-19Microsoft CorporationValidating change of name server
US20090070470A1 (en)2005-08-032009-03-12International Business Machines CorporationPriority Based LDAP Service Publication Mechanism
US7506360B1 (en)*2002-10-012009-03-17Mirage Networks, Inc.Tracking communication for determining device states
US20090077651A1 (en)2001-07-132009-03-19Yuri PoeluevMethod and apparatus for resolving a web site address when connected with a virtual private network (vpn)
US7509369B1 (en)2001-07-112009-03-24Swsoft Holdings, Ltd.Balancing shared servers in virtual environments
US7512980B2 (en)*2001-11-302009-03-31Lancope, Inc.Packet sampling flow-based detection of network intrusions
US20090092124A1 (en)2007-10-032009-04-09Microsoft CorporationNetwork routing of endpoints to content based on content swarms
US20090106830A1 (en)2005-06-032009-04-23Thomas MaherSecure Network Communication System and Method
US7533409B2 (en)2001-03-222009-05-12Corente, Inc.Methods and systems for firewalling virtual private networks
CN101442425A (en)2007-11-222009-05-27华为技术有限公司Gateway management method, address allocation method, device and system
US20090138606A1 (en)2002-10-082009-05-28Brian MoranTransferring sessions between devices
US20090141634A1 (en)2007-12-042009-06-04Jesse Abraham RothsteinAdaptive Network Traffic Classification Using Historical Context
US7552323B2 (en)*2002-11-182009-06-23Liquidware Labs, Inc.System, apparatuses, methods, and computer-readable media using identification data in packet communications
US20090164614A1 (en)2007-12-202009-06-25Christian Michael FDns wildcard beaconing to determine client location and resolver load for global traffic load balancing
US20090172093A1 (en)2007-12-262009-07-02International Business Machines CorporationTechnique For Previously Providing Estimate of Time Required For Processing
CN101495993A (en)2006-08-082009-07-29瑞科网信科技有限公司System and method for distributed multi-processing security gateway
US20090213858A1 (en)2008-02-272009-08-27Alcatel LucentApplication-aware MPLS tunnel selection
US7584301B1 (en)2004-05-062009-09-01Foundry Networks, Inc.Host-level policies for global server load balancing
US7584262B1 (en)2002-02-112009-09-01Extreme NetworksMethod of and system for allocating resources to resource requests based on application of persistence policies
US20090222583A1 (en)2008-03-032009-09-03Microsoft CorporationClient-side load balancing
US20090227228A1 (en)2008-03-072009-09-10Hu Q JamesEnhanced policy capabilities for mobile data services
US20090228547A1 (en)2008-03-042009-09-10Kddi CorporationServer apparatus and communication system
US7590736B2 (en)2003-06-302009-09-15Microsoft CorporationFlexible network load balancing
US20090262741A1 (en)2000-06-232009-10-22Jungck Peder JTransparent Provisioning of Services Over a Network
US20090271472A1 (en)2008-04-282009-10-29Scheifler Robert WSystem and Method for Programmatic Management of Distributed Computing Resources
US7613822B2 (en)2003-06-302009-11-03Microsoft CorporationNetwork load balancing with session information
US20090285196A1 (en)2008-05-152009-11-19Cellco Partnership D/B/A Verizon WirelessScheduling with quality of service support in wireless system
US20090313379A1 (en)2006-07-032009-12-17Telefonaktiebolaget L M Ericsson (Publ)Topology Hiding Of Mobile Agents
US20100008229A1 (en)2008-07-112010-01-14Qi BiMethod and system for joint reverse link access and traffic channel radio frequency overload control
US20100023621A1 (en)2008-07-242010-01-28Netapp, Inc.Load-derived probability-based domain name service in a network storage cluster
US20100036952A1 (en)2008-08-112010-02-11International Business Machines CorporationLoad balancing using replication delay
US20100042869A1 (en)2008-08-182010-02-18F5 Networks, Inc.Upgrading network traffic management devices while maintaining availability
US20100054139A1 (en)2005-03-292010-03-04Lg Electronics Inc.Method and apparatus of controlling transmission of data block
US20100064008A1 (en)2007-03-132010-03-11Huawei Technologies Co., Ltd.Peer-to-peer network system, proxy service peer, and method for peer interworking between overlay networks
CN101682532A (en)2007-01-262010-03-24蔚蓝公司Multiple network access system and method
US20100082787A1 (en)2000-09-262010-04-01Foundry Networks, Inc.Global server load balancing
US20100083076A1 (en)2008-09-262010-04-01Brother Kogyo Kabushiki KaishaTerminal device, time adjusting method of terminal device and communication system
US20100094985A1 (en)2008-10-142010-04-15Mamoun Abu-SamahaHttp push to simulate server-initiated sessions
US7703102B1 (en)1999-08-232010-04-20Oracle America, Inc.Approach for allocating resources to an apparatus based on preemptable resource requirements
US20100098417A1 (en)2002-11-182010-04-22Tse-Au Elizabeth Suet HRouter having dual propagation paths for packets
US7707295B1 (en)2002-05-032010-04-27Foundry Networks, Inc.Connection rate limiting
US20100106833A1 (en)2008-10-232010-04-29International Business Machines CorporationDynamic expiration of domain name service entries
US20100106854A1 (en)2008-10-292010-04-29Hostway CorporationSystem and method for controlling non-existing domain traffic
US7711790B1 (en)*2000-08-242010-05-04Foundry Networks, Inc.Securing an accessible computer system
US20100128606A1 (en)2008-11-262010-05-27Patel Rahul GFirst-hop domain reliability measurement and load balancing in a computer network
US7733866B2 (en)*2004-04-152010-06-08Qualcomm IncorporatedPacket concatenation in wireless networks
US20100162378A1 (en)2008-12-182010-06-24Thusitha JayawardenaMethods and apparatus to enhance security in residential networks
US7747748B2 (en)1998-11-172010-06-29Democrasoft, Inc.Method for connection acceptance control and rapid determination of optimal multi-media content delivery over networks
US7765328B2 (en)2001-07-062010-07-27Juniper Networks, Inc.Content service aggregation system
US20100205310A1 (en)2009-02-122010-08-12Yaniv AltshulerSystem and method for dynamically optimizing tcp window size
US20100210265A1 (en)2009-02-172010-08-19Nokia CorporationMethod and apparatus for providing shared services
US20100217819A1 (en)2006-10-172010-08-26A10 Networks, Inc.System and Method to Associate a Private User Identity with a Public User Identity
US20100217793A1 (en)2009-02-232010-08-26Research In Motion LimitedMethod, system and apparatus for connecting a plurality of client machines to a plurality of servers
US20100223630A1 (en)2007-06-262010-09-02Sap AgSystem and method for switching between stateful and stateless communication modes
US7792113B1 (en)2002-10-212010-09-07Cisco Technology, Inc.Method and system for policy-based forwarding
US20100228819A1 (en)2009-03-052010-09-09Yottaa IncSystem and method for performance acceleration, data protection, disaster recovery and on-demand scaling of computer applications
US20100235522A1 (en)2009-03-112010-09-16Juniper Networks Inc.Session-cache-based http acceleration
US20100235880A1 (en)2006-10-172010-09-16A10 Networks, Inc.System and Method to Apply Network Traffic Policy to an Application Session
US20100235507A1 (en)2002-05-032010-09-16Brocade Communications Systems, Inc.Connection rate limiting for server load balancing and transparent cache switching
US20100238828A1 (en)2009-03-232010-09-23Corvil LimitedSystem and method for estimation of round trip times within a tcp based data network
US7808994B1 (en)2006-02-222010-10-05Juniper Networks, Inc.Forwarding traffic to VLAN interfaces built based on subscriber information strings
US20100265824A1 (en)2007-11-092010-10-21Blade Network Technologies, IncSession-less Load Balancing of Client Traffic Across Servers in a Server Group
US20100268814A1 (en)2008-11-192010-10-21Seachange International, Inc.Intercept Device for Providing Content
US7826487B1 (en)*2005-05-092010-11-02F5 Network, IncCoalescing acknowledgement responses to improve network communications
CN101878663A (en)2007-11-292010-11-03瑞科网信科技有限公司 Systems and methods for distributed multiprocessing security gateways
US20100312740A1 (en)2009-06-092010-12-09Clemm L AlexanderTracking policy decisions in a network
US20100318631A1 (en)2009-06-122010-12-16Yahoo! Inc.User Location Dependent DNS Lookup
US20100322252A1 (en)2009-06-222010-12-23Josephine SuganthiSystems and methods for handling a multi-connection protocol between a client and server traversing a multi-core system
US20100330971A1 (en)2009-06-262010-12-30Oracle International CorporationSystem and method for providing a production upgrade of components within a multiprotocol gateway
US20100333101A1 (en)2007-11-292010-12-30Solarflare Communications Inc.Virtualised receive side scaling
US20110007652A1 (en)2008-05-092011-01-13Huawei Technologies Co., Ltd.Method and device for path switchover
US20110023071A1 (en)2008-03-282011-01-27Huawei Technologies Co., Ltd.Method, System, and Apparatus for Creating Content-on-Demand Service
US7881215B1 (en)2004-03-182011-02-01Avaya Inc.Stateful and stateless data processing
US20110029599A1 (en)2000-07-132011-02-03Infoblox, Inc.Domain name service server
US20110032941A1 (en)2002-11-082011-02-10Juniper Networks, Inc.Systems and methods for accelerating tcp/ip data stream processing
US20110040826A1 (en)2009-08-132011-02-17Sap AgTransparently stateful execution of stateless applications
US20110060831A1 (en)2008-06-122011-03-10Tomoki IshiiNetwork monitoring device, bus system monitoring device, method and program
EP2296313A1 (en)2008-07-162011-03-16Huawei Technologies Co., Ltd.Control method and device for wireless multi-hopping network congestion
US20110093522A1 (en)2009-10-212011-04-21A10 Networks, Inc.Method and System to Determine an Application Delivery Server Based on Geo-Location Information
US20110099403A1 (en)2009-10-262011-04-28Hitachi, Ltd.Server management apparatus and server management method
US20110099623A1 (en)2009-10-282011-04-28Garrard Kenneth WSystem and method for providing unified transport and security protocols
US20110110294A1 (en)2009-11-062011-05-12Vamsidhar ValluriVIRTUAL CARE-OF ADDRESS FOR MOBILE IP (Internet Protocol)
US7948952B2 (en)2004-06-282011-05-24Nokia CorporationControlling services in a packet data network
US20110145324A1 (en)2009-12-162011-06-16Quantum CorporationReducing messaging in a client-server system
US7965727B2 (en)2006-09-142011-06-21Fujitsu LimitedBroadcast distributing system and broadcast distributing method
US20110153834A1 (en)2009-12-172011-06-23Sonus Networks, Inc.Transparent Recovery of Transport Connections Using Packet Translation Techniques
US20110149879A1 (en)2009-12-232011-06-23At&T Mobility Ii LlcChromatic scheduler for network traffic with disparate service requirements
US7970934B1 (en)2006-07-312011-06-28Google Inc.Detecting events of interest
WO2011079381A1 (en)2009-12-312011-07-07Bce Inc.Method and system for increasing performance of transmission control protocol sessions in data networks
US7979694B2 (en)*2003-03-032011-07-12Cisco Technology, Inc.Using TCP to authenticate IP source addresses
US7983258B1 (en)2005-11-092011-07-19Juniper Networks, Inc.Dynamic virtual local area network (VLAN) interface configuration
US20110178985A1 (en)2008-10-032011-07-21Marta San Martin ArribasMaster monitoring mechanism for a geographical distributed database
US20110185073A1 (en)2009-11-252011-07-28Ashok Kumar JagadeeswaranSystems and methods for client ip address insertion via tcp options
US7990847B1 (en)2005-04-152011-08-02Cisco Technology, Inc.Method and system for managing servers in a server cluster
US7991859B1 (en)2009-12-282011-08-02Amazon Technologies, Inc.Using virtual networking devices to connect managed computer networks
CN102143075A (en)2011-03-282011-08-03中国人民解放军国防科学技术大学Method and system for achieving load balance
US20110191773A1 (en)2010-02-012011-08-04Computer Associates Think, Inc.System and Method for Datacenter Power Management
US20110196971A1 (en)2010-02-102011-08-11Praveenkumar ReguramanApplication session control using packet inspection
US8019870B1 (en)1999-08-232011-09-13Oracle America, Inc.Approach for allocating resources to an apparatus based on alternative resource requirements
US8032634B1 (en)1999-08-232011-10-04Oracle America, Inc.Approach for allocating resources to an apparatus based on resource requirements
US20110276982A1 (en)2010-05-062011-11-10Hitachi, Ltd.Load Balancer and Load Balancing System
US20110276695A1 (en)2010-05-062011-11-10Juliano MaldanerContinuous upgrading of computers in a load balanced environment
US20110289496A1 (en)2010-05-182011-11-24North End Technologies, Inc.Method & apparatus for load balancing software update across a plurality of publish/subscribe capable client devices
US20110292939A1 (en)2009-05-282011-12-01Krishnamurthy SubramaianMethod & apparatus for forwarding table reduction
US20110302256A1 (en)2010-06-072011-12-08Salesforce.Com, Inc.Methods and systems for providing customized domain messages
US20110307541A1 (en)2010-06-102011-12-15Microsoft CorporationServer load balancing and draining in enhanced communication systems
US8081640B2 (en)2007-10-242011-12-20Hitachi, Ltd.Network system, network management server, and access filter reconfiguration method
US20120008495A1 (en)2010-02-252012-01-12The Trustees Of Columbia University In The City Of New YorkMethods And Systems For Controlling SIP Overload
US8099492B2 (en)2002-07-252012-01-17Intellectual Ventures Holding 40 LlcMethod and system for background replication of data objects
US20120023231A1 (en)2009-10-232012-01-26Nec CorporationNetwork system, control method for the same, and controller
US20120026897A1 (en)2010-07-292012-02-02Cisco Technology, Inc., A Corporation Of CaliforniaPacket Switching Device Using Results Determined by an Application Node
US20120030341A1 (en)2010-07-282012-02-02International Business Machines CorporationTransparent Header Modification for Reducing Serving Load Based on Current and Projected Usage
US8116312B2 (en)2006-02-082012-02-14Solarflare Communications, Inc.Method and apparatus for multicast packet reception
US8122116B2 (en)2008-10-312012-02-21Hitachi, Ltd.Storage management method and management server
US20120066371A1 (en)2010-09-102012-03-15Cisco Technology, Inc.Server Load Balancer Scaling for Virtual Servers
US8151019B1 (en)2008-04-222012-04-03Lockheed Martin CorporationAdaptive network traffic shaper
US20120084460A1 (en)2010-10-042012-04-05Openwave Systems Inc.Method and system for dynamic traffic steering
US20120084419A1 (en)2010-09-302012-04-05A10 Networks, Inc.System and method to balance servers based on server load status
US20120106355A1 (en)2009-06-102012-05-03Telefonaktiebolaget L M Ericsson (Publ)Performance Monitoring in a Communication Network
US20120117382A1 (en)1998-10-302012-05-10Virnetx, Inc.System and method employing an agile network protocol for secure communications using secure domain names
US20120117571A1 (en)2010-11-052012-05-10Adam DavisLoad balancer and firewall self-provisioning system
US8179809B1 (en)1999-08-232012-05-15Oracle America, Inc.Approach for allocating resources to an apparatus based on suspendable resource requirements
US8185651B2 (en)2002-01-102012-05-22Network General TechnologyMulti-segment network application monitoring and correlation architecture
US8191106B2 (en)2007-06-072012-05-29Alcatel LucentSystem and method of network access security policy management for multimodal device
US20120144015A1 (en)2010-12-022012-06-07A10 Networks, Inc.System and Method for Distributing Application Traffic to Servers Based on Dynamic Service Response Time
US20120144014A1 (en)2010-12-012012-06-07Cisco Technology, Inc.Directing data flows in data centers with clustering services
US20120151353A1 (en)2010-12-092012-06-14Verizon Patent And Licensing Inc.Server ip addressing in a computing-on-demand system
WO2012083264A2 (en)2010-12-172012-06-21Microsoft CorporationSynchronizing state among load balancer components
US20120170548A1 (en)2011-01-042012-07-05Cisco Technology, Inc.Distributed load management on network devices
US20120173759A1 (en)2010-12-292012-07-05Mugdha AgarwalSystems and Methods for Policy Based Integration to Horizontally Deployed WAN Optimization Appliances
US20120179770A1 (en)2011-01-112012-07-12A10 Networks, Inc.Virtual application delivery chassis system
US8224971B1 (en)2009-12-282012-07-17Amazon Technologies, Inc.Using virtual networking devices and routing information to initiate external actions
US20120215910A1 (en)2011-02-182012-08-23Canon Kabushiki KaishaWeb service system, server management apparatus, and web service providing method
US20120239792A1 (en)2011-03-152012-09-20Subrata BanerjeePlacement of a cloud service using network topology and infrastructure performance
US20120240185A1 (en)2000-09-252012-09-20Harsh KapoorSystems and methods for processing data flows
US8296434B1 (en)2009-05-282012-10-23Amazon Technologies, Inc.Providing dynamically scaling computing load balancing
KR20120117461A (en)2011-04-152012-10-24서강대학교산학협력단Method and system of controlling data transfer rate for downward vertical handover in overlayed network environment
US20120297046A1 (en)2009-12-232012-11-22Murali RajaSystems and methods for gslb spillover
US20120311116A1 (en)2011-06-062012-12-06A10 Networks, Inc.Sychronization of configuration file of virtual application distribution chassis
US8379515B1 (en)2007-02-012013-02-19F5 Networks, Inc.TCP throughput control by imposing temporal delay
US20130046876A1 (en)2008-11-252013-02-21Raghav Somanahalli NarayanaSystems and methods for gslb site persistence
US20130058335A1 (en)2010-07-062013-03-07Teemu KoponenPacket processing for logical datapath sets
US20130074177A1 (en)2008-08-142013-03-21Juniper Networks, Inc.Routing device having integrated mpls-aware firewall
US20130083725A1 (en)2011-10-042013-04-04Juniper Networks, Inc.Methods and apparatus for enforcing a common user policy within a network
US20130100958A1 (en)2011-10-242013-04-25A10 Networks, Inc.Methods to combine stateless and stateful server load balancing
US20130124713A1 (en)2011-11-102013-05-16Microsoft CorporationPattern-based computational health and configuration monitoring
US20130136139A1 (en)2011-11-292013-05-30A10 Networks, Inc.Accelerating Service Processing Using Fast Path TCP
US20130135996A1 (en)2011-11-292013-05-30Hughes Networks Systems, LlcMethod and system for traffic management and resource allocation on a shared access network
US20130148500A1 (en)2011-04-182013-06-13Kentaro SonodaTerminal, control device, communication method, communication system, communication module, program, and information processing device
US20130166762A1 (en)2011-12-232013-06-27A10 Networks, Inc.Methods to Manage Services over a Service Gateway
US20130173795A1 (en)2011-12-302013-07-04Verisign, Inc.DNS Package in a Partitioned Network
US20130176854A1 (en)2012-01-092013-07-11Motorola Mobility, Inc.Dynamic tcp layer optimization for real-time field performance
US20130191486A1 (en)2012-01-242013-07-25Sony CorporationTime control apparatus, time control method, and program
US8499093B2 (en)2010-05-142013-07-30Extreme Networks, Inc.Methods, systems, and computer readable media for stateless load balancing of network traffic flows
US20130198385A1 (en)2012-01-282013-08-01A10 Networks, Inc.System and Method to Generate Secure Name Records
KR20130096624A (en)2012-02-222013-08-30유대영Led lighting apparatus and led lighting system having the same
US8539075B2 (en)2006-04-212013-09-17International Business Machines CorporationOn-demand global server load balancing system and method of use
US20130250765A1 (en)2012-03-232013-09-26Qualcomm IncorporatedDelay based active queue management for uplink traffic in user equipment
US20130258846A1 (en)2010-12-072013-10-03Telefonaktiebolaget L M Ericsson (Publ)Method for Enabling Traffic Acceleration in a Mobile Telecommunication Network
US20130282791A1 (en)2012-04-192013-10-24Empire Technology Development LlcMigration in place
US8584199B1 (en)2006-10-172013-11-12A10 Networks, Inc.System and method to apply a packet routing policy to an application session
US20140012972A1 (en)2012-07-052014-01-09A10 Networks, Inc.Method to Allocate Buffer for TCP Proxy Session Based on Dynamic Network Conditions
WO2014031046A1 (en)2012-08-232014-02-27Telefonaktiebolaget L M Ericsson (Publ)Tcp proxy server
US8675488B1 (en)2010-09-072014-03-18Juniper Networks, Inc.Subscriber-based network traffic management
US20140089500A1 (en)2012-09-252014-03-27Swaminathan SankarLoad distribution in data networks
US8750164B2 (en)2010-07-062014-06-10Nicira, Inc.Hierarchical managed switch architecture
WO2014088741A1 (en)2012-12-062014-06-12A10 Networks, Inc.Forwarding policies on a virtual service network
WO2014093829A1 (en)2012-12-152014-06-19A10 Networks, Inc.Configuration of a virtual service network
CN103944954A (en)2013-01-232014-07-23A10网络股份有限公司Reducing Buffer Usage For Tcp Proxy Session Based On Delayed Acknowledgment
US20140258465A1 (en)2013-03-112014-09-11Cisco Technology, Inc.Identification of originating ip address and client port connection to a web server via a proxy server
US20140258536A1 (en)2013-03-082014-09-11A10 Networks, Inc.Application delivery controller and global server load balancer
US20140269728A1 (en)2013-03-152014-09-18Rajkumar JalanProcessing data packets using a policy based network path
US20140286313A1 (en)2011-11-232014-09-25Telefonaktiebolaget L M Ericsson (Publ)Methods and arrangements for improving transmission control protocol performance in a cellular network
US20140298091A1 (en)2013-04-012014-10-02Nebula, Inc.Fault Tolerance for a Distributed Computing System
US8879427B2 (en)2000-07-072014-11-04802 Systems Inc.Methods for updating the configuration of a programmable packet filtering device including a determination as to whether a packet is to be junked
US20140330982A1 (en)2013-05-032014-11-06A10 Networks, Inc.Facilitating secure network traffic by an application delivery controller
US8885463B1 (en)2011-10-172014-11-11Juniper Networks, Inc.Path computation element communication protocol (PCEP) extensions for stateful label switched path management
US20140334485A1 (en)2013-05-092014-11-13Vmware, Inc.Method and system for service switching using service tags
US20140359052A1 (en)2013-05-282014-12-04Verizon Patent And Licensing Inc.Resilient tcp splicing for proxy services
US20150026794A1 (en)2013-07-182015-01-22Palo Alto Networks, Inc.Packet classification for network routing
US8965957B2 (en)2010-12-152015-02-24Sap SeService delivery framework
US20150156223A1 (en)2013-12-022015-06-04Feilong XuNetwork proxy layer for policy-based application proxies
US20150215436A1 (en)2012-04-302015-07-30Brocade Communications Systems, Inc.Techniques for protecting against denial of service attacks
US20150244566A1 (en)2014-02-242015-08-27Red Hat Israel, Ltd.Network configuration via abstraction components and standard commands
US9137301B1 (en)2009-06-302015-09-15Amazon Technologies, Inc.Client based opportunistic routing
US20150281104A1 (en)2014-03-312015-10-01Ali GolshanActive application response delay time
US20150281087A1 (en)2014-03-252015-10-01A10 Networks, Inc.Forwarding data packets using a service-based forwarding policy
US20150312092A1 (en)2014-04-242015-10-29Ali GolshanEnabling planned upgrade/downgrade of network devices without impacting network sessions
US20150312268A1 (en)2014-04-282015-10-29Sophos LimitedIntrusion detection using a heartbeat
US20150333988A1 (en)2014-05-162015-11-19A10 Networks, Inc.Distributed system to determine a server's health
US20150350048A1 (en)2014-06-032015-12-03A10 Networks, Inc.User Defined Objects for Network Devices
US20150350379A1 (en)2014-06-032015-12-03A10 Networks, Inc.Programming a data network device using user defined scripts
US20160014126A1 (en)2013-05-032016-01-14A10 Networks, Inc.Facilitating a Secure 3 Party Network Session by a Network Device
US20160042014A1 (en)2012-09-252016-02-11A10 Networks, Inc.Distributed database in software driven networks
US20160044095A1 (en)2012-09-252016-02-11A10 Networks, Inc.Distributing service sessions
US20160043901A1 (en)2012-09-252016-02-11A10 Networks, Inc.Graceful scaling in software driven networks
US20170048107A1 (en)2015-08-132017-02-16A10 Networks, Inc.Automated Adjustment of Subscriber Policies
US20170048356A1 (en)2015-08-122017-02-16A10 Networks, Inc.Transmission Control of Protocol State Exchange for Dynamic Stateful Service Insertion

Patent Citations (544)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5218602A (en)1991-04-041993-06-08Dsc Communications CorporationInterprocessor switching network
TW269763B (en)1995-09-121996-02-01Ind Tech Res InstSeamless handoff for a wireless/wired LAN internetworking
JPH0997233A (en)1995-09-281997-04-08Nec CorpLoad distributing method for on-line information processing system
US5875185A (en)1995-10-101999-02-23Industrial Technology Research Inst.Seamless handoff for a wireless lan/wired lan internetworking
US5935207A (en)1996-06-031999-08-10Webtv Networks, Inc.Method and apparatus for providing remote site administrators with user hits on mirrored web sites
US5862339A (en)1996-07-091999-01-19Webtv Networks, Inc.Client connects to an internet access provider using algorithm downloaded from a central server based upon client's desired criteria after disconnected from the server
US5774660A (en)1996-08-051998-06-30Resonate, Inc.World-wide-web server with delayed resource-binding for resource-based load balancing on a distributed resource multi-node network
US5958053A (en)*1997-01-301999-09-28At&T Corp.Communications protocol with improved security
US6075783A (en)1997-03-062000-06-13Bell Atlantic Network Services, Inc.Internet phone to PSTN cellular/PCS system
US5995981A (en)1997-06-161999-11-30Telefonaktiebolaget Lm EricssonInitialization of replicated data objects
US20030091028A1 (en)1997-07-252003-05-15Chang Gordon K.Apparatus and method for integrated voice gateway
US6456617B1 (en)1997-08-122002-09-24Kokusai Denshin Denwa Co., Ltd.Routing control communication system between circuit switched network and internet
JPH1196128A (en)1997-09-221999-04-09Fujitsu Ltd Network service server load adjusting device, method and recording medium
US6259705B1 (en)1997-09-222001-07-10Fujitsu LimitedNetwork service server load balancing device, network service server load balancing method and computer-readable storage medium recorded with network service server load balancing program
US20020091844A1 (en)1997-10-142002-07-11Alacritech, Inc.Network interface device that fast-path processes solicited session layer read commands
US7673072B2 (en)1997-10-142010-03-02Alacritech, Inc.Fast-path apparatus for transmitting data corresponding to a TCP connection
US20040073703A1 (en)1997-10-142004-04-15Alacritech, Inc.Fast-path apparatus for receiving data corresponding a TCP connection
US7167927B2 (en)1997-10-142007-01-23Alacritech, Inc.TCP/IP offload device with fast-path TCP ACK generating and transmitting mechanism
US20040078480A1 (en)1997-10-142004-04-22Boucher Laurence B.Parsing a packet header
US20040062246A1 (en)1997-10-142004-04-01Alacritech, Inc.High performance network interface
US6047268A (en)*1997-11-042000-04-04A.T.&T. CorporationMethod and apparatus for billing for transactions conducted over the internet
US6003069A (en)1997-12-161999-12-14Lexmark International, Inc.Client/server printer driver system
US20050074013A1 (en)1998-02-022005-04-07Hershey Paul C.System and associated method for the synchronization and control of multiplexed payloads over a telecommunications network
US6131163A (en)1998-02-172000-10-10Cisco Technology, Inc.Network gateway mechanism having a protocol stack proxy
US6459682B1 (en)1998-04-072002-10-01International Business Machines CorporationArchitecture for supporting service level agreements in an IP network
JPH11338836A (en)1998-05-251999-12-10Nippon Telegr & Teleph Corp <Ntt> Computer Network Load Balancing System
US6219706B1 (en)1998-10-162001-04-17Cisco Technology, Inc.Access control for networks
US20120117382A1 (en)1998-10-302012-05-10Virnetx, Inc.System and method employing an agile network protocol for secure communications using secure domain names
US7334232B2 (en)1998-11-052008-02-19Bea Systems, Inc.Clustered enterprise Java™ in a secure distributed processing system
US6321338B1 (en)*1998-11-092001-11-20Sri InternationalNetwork surveillance
US7747748B2 (en)1998-11-172010-06-29Democrasoft, Inc.Method for connection acceptance control and rapid determination of optimal multi-media content delivery over networks
US6535516B1 (en)1998-12-102003-03-18Industrial Technology Research InstituteShared memory based network switch and the network constructed with the same
TW444478B (en)1998-12-102001-07-01Ind Tech Res InstEthernet switch IC with shared memory structure and its network
US6483600B1 (en)1999-02-262002-11-193Com CorporationSystem and method for communicating real-time facsimiles over data networks
US6772205B1 (en)1999-03-122004-08-03Nortel Networks LimitedExecuting applications on a target network device using a proxy network device
JP2000276432A (en)1999-03-242000-10-06Nec CorpDynamic load distribution system for transaction message
JP2000307634A (en)1999-04-152000-11-02Kdd Corp Congestion control method by relay station in packet switching network
US6779017B1 (en)1999-04-292004-08-17International Business Machines CorporationMethod and system for dispatching client sessions within a cluster of servers connected to the world wide web
US6658114B1 (en)1999-05-312003-12-02Industrial Technology Research InstituteKey management method
TW425821B (en)1999-05-312001-03-11Ind Tech Res InstKey management method
US20010049741A1 (en)1999-06-182001-12-06Bryan D. SkeneMethod and system for balancing load distribution on a wide area network
CN1372662A (en)1999-07-092002-10-02卡纳尔股份有限公司Running and testing applications
US6374300B2 (en)1999-07-152002-04-16F5 Networks, Inc.Method and system for storing load balancing information with an HTTP cookie
JP2001051859A (en)1999-08-112001-02-23Hitachi Ltd Load information communication method
WO2001013228A2 (en)1999-08-132001-02-22Sun Microsystems, Inc.Graceful distribution in application server load balancing
WO2001014990A1 (en)1999-08-212001-03-01Webever, Inc.Method for content delivery over the internet
US7703102B1 (en)1999-08-232010-04-20Oracle America, Inc.Approach for allocating resources to an apparatus based on preemptable resource requirements
US7463648B1 (en)1999-08-232008-12-09Sun Microsystems, Inc.Approach for allocating resources to an apparatus based on optional resource requirements
US8019870B1 (en)1999-08-232011-09-13Oracle America, Inc.Approach for allocating resources to an apparatus based on alternative resource requirements
US8032634B1 (en)1999-08-232011-10-04Oracle America, Inc.Approach for allocating resources to an apparatus based on resource requirements
US8179809B1 (en)1999-08-232012-05-15Oracle America, Inc.Approach for allocating resources to an apparatus based on suspendable resource requirements
US6578066B1 (en)1999-09-172003-06-10Alteon WebsystemsDistributed load-balancing internet servers
US6600738B1 (en)1999-10-022003-07-29Ericsson, Inc.Routing in an IP network based on codec availability and subscriber preference
US6748414B1 (en)1999-11-152004-06-08International Business Machines CorporationMethod and apparatus for the load balancing of non-identical servers in a network environment
US6952728B1 (en)1999-12-012005-10-04Nortel Networks LimitedProviding desired service policies to subscribers accessing internet
WO2001045349A2 (en)1999-12-162001-06-21Speedera Networks, Inc.Scalable domain name system with persistence and load balancing
US6587866B1 (en)2000-01-102003-07-01Sun Microsystems, Inc.Method for distributing packets to server nodes using network client affinity and packet distribution table
US20050044270A1 (en)2000-02-072005-02-24Grove Adam J.Method for high-performance delivery of web content
US20040199646A1 (en)2000-02-182004-10-07Netscaler, Inc.Apparatus, method and computer program product for guaranteed content delivery incorporating putting a client on-hold based on response time
US6804224B1 (en)2000-02-292004-10-123Com CorporationSystem and method for providing telephone service having private branch exchange features in a voice-over-data network telephony system
US20020138618A1 (en)2000-03-212002-09-26F5 Networks, Inc.Simplified method for processing multiple connections from the same client
JP2001298449A (en)2000-04-122001-10-26Matsushita Electric Ind Co Ltd Security communication method, communication system and its device
US20020032799A1 (en)2000-05-022002-03-14Globalstar L.P.Deferring DNS service for a satellite ISP system using non-geosynchronous orbit satellites
US20010042200A1 (en)*2000-05-122001-11-15International Business MachinesMethods and systems for defeating TCP SYN flooding attacks
US20090262741A1 (en)2000-06-232009-10-22Jungck Peder JTransparent Provisioning of Services Over a Network
US8879427B2 (en)2000-07-072014-11-04802 Systems Inc.Methods for updating the configuration of a programmable packet filtering device including a determination as to whether a packet is to be junked
US7013482B1 (en)2000-07-072006-03-14802 Systems LlcMethods for packet filtering including packet invalidation if packet validity determination not timely made
US20110029599A1 (en)2000-07-132011-02-03Infoblox, Inc.Domain name service server
US20030035420A1 (en)2000-08-182003-02-20Zhisheng NiuTCP aware local retransmissioner scheme for unreliable transmission network
US7711790B1 (en)*2000-08-242010-05-04Foundry Networks, Inc.Securing an accessible computer system
US20020026515A1 (en)2000-08-292002-02-28AlcatelData network
US7010605B1 (en)2000-08-292006-03-07Microsoft CorporationMethod and apparatus for encoding and storing session data
US6772334B1 (en)*2000-08-312004-08-03Networks Associates, Inc.System and method for preventing a spoofed denial of service attack in a networked computing environment
CN1449618A (en)2000-09-042003-10-15国际商业机器公司System communication between computer systems
US7398317B2 (en)*2000-09-072008-07-08Mazu Networks, Inc.Thwarting connection-based denial of service attacks
US20020103916A1 (en)*2000-09-072002-08-01Benjie ChenThwarting connection-based denial of service attacks
JP2002091936A (en)2000-09-112002-03-29Hitachi Ltd Load distribution device and load estimation method
US20020032777A1 (en)2000-09-112002-03-14Yoko KawataLoad sharing apparatus and a load estimation method
US20120240185A1 (en)2000-09-252012-09-20Harsh KapoorSystems and methods for processing data flows
US20100082787A1 (en)2000-09-262010-04-01Foundry Networks, Inc.Global server load balancing
US20100293296A1 (en)2000-09-262010-11-18Foundry Networks, Inc.Global server load balancing
CN1473300A (en)2000-09-292004-02-04Intelligent network storage interface system and device
US20050021848A1 (en)2000-10-132005-01-27Jorgenson Daniel ScottSystem and method for distributing load among redundant independent stateful World Wide Web server sites
US20020133491A1 (en)2000-10-262002-09-19Prismedia Networks, Inc.Method and system for managing distributed content and related metadata
EP1209876A2 (en)2000-11-212002-05-29Avaya Communication Israel Ltd.Dynamic load balancer
US20020078164A1 (en)2000-12-132002-06-20Marnetics Ltd.System and method for data transfer acceleration in a TCP network environment
US7218722B1 (en)2000-12-182007-05-15Westell Technologies, Inc.System and method for providing call management services in a virtual private network using voice or video over internet protocol
US6779033B1 (en)*2000-12-282004-08-17Networks Associates Technology, Inc.System and method for transacting a validated application session in a networked computing environment
US7301899B2 (en)*2001-01-312007-11-27Comverse Ltd.Prevention of bandwidth congestion in a denial of service or other internet-based attack
US20050198335A1 (en)2001-02-062005-09-08Microsoft CorporationDistributed load balancing for single entry-point systems
US20030014544A1 (en)2001-02-152003-01-16BanderacomInfiniband TM work queue to TCP/IP translation
US20030023873A1 (en)2001-03-162003-01-30Yuval Ben-ItzhakApplication-layer security method and system
US20020143991A1 (en)2001-03-162002-10-03Kingsum ChowGeographic location determination including inspection of network address
US7533409B2 (en)2001-03-222009-05-12Corente, Inc.Methods and systems for firewalling virtual private networks
US7349970B2 (en)2001-03-292008-03-25International Business Machines CorporationWorkload management of stateful program entities
US20020141386A1 (en)2001-03-292002-10-03Minert Brian D.System, apparatus and method for voice over internet protocol telephone calling using enhanced signaling packets and localized time slot interchanging
US20030061506A1 (en)2001-04-052003-03-27Geoffrey CooperSystem and method for security policy
US20020178259A1 (en)2001-05-232002-11-28International Business Machines CorporationLoad balancing content requests using dynamic document generation cost information
US20020188678A1 (en)2001-06-052002-12-12Edecker Ada MaeNetworked computer system for communicating and operating in a virtual reality environment
US20040103315A1 (en)2001-06-072004-05-27Geoffrey CooperAssessment tool
US20040213158A1 (en)2001-06-072004-10-28Paul CollettReal time processing
US20020191575A1 (en)2001-06-182002-12-19Broadwave, Inc.Method and apparatus for converging local area and wide area wireless data networks
US20020194350A1 (en)2001-06-182002-12-19Lu Leonard L.Content-aware web switch without delayed binding and methods thereof
US20120191839A1 (en)2001-06-192012-07-26William Pat MaynardMethod and apparatus for load balancing
US20020194335A1 (en)2001-06-192002-12-19Maynard William PatMethod and apparatus for load balancing
US7343399B2 (en)2001-06-252008-03-11Nortel Networks LimitedApparatus and method for managing internet resource requests
US20030009591A1 (en)2001-06-252003-01-09Clive HayballApparatus and method for managing internet resource requests
US20050009520A1 (en)2001-07-032005-01-13Herrero Antonio Juan SanchezMethod and system for handling multiple registration
US20110019550A1 (en)2001-07-062011-01-27Juniper Networks, Inc.Content service aggregation system
US7765328B2 (en)2001-07-062010-07-27Juniper Networks, Inc.Content service aggregation system
US7509369B1 (en)2001-07-112009-03-24Swsoft Holdings, Ltd.Balancing shared servers in virtual environments
US20090077651A1 (en)2001-07-132009-03-19Yuri PoeluevMethod and apparatus for resolving a web site address when connected with a virtual private network (vpn)
US20030023711A1 (en)2001-07-302003-01-30Parmar Pankaj N.Identifying network management policies
US20040187032A1 (en)2001-08-072004-09-23Christoph GelsMethod, data carrier, computer system and computer progamme for the identification and defence of attacks in server of network service providers and operators
US20030035409A1 (en)2001-08-202003-02-20Wang Jiwei R.Method and apparatus for providing service selection, redirection and managing of subscriber access to multiple WAP (Wireless Application Protecol) geteways simultaneously
CN1575582A (en)2001-09-282005-02-02塞维斯通讯公司 Configurable Adaptive Global Communications Control and Management
US20050005207A1 (en)2001-09-282005-01-06Thierry HernequeMethod of improving the performance of a transmission protocol using a retransmission timer
US20040078419A1 (en)2001-11-022004-04-22Stephen FerrariSwitching system
JP2003141068A (en)2001-11-022003-05-16Canon Software IncSession management device, and session management method, program and storage medium
US7370353B2 (en)*2001-11-052008-05-06Cisco Technology, Inc.System and method for managing dynamic network sessions
US7512980B2 (en)*2001-11-302009-03-31Lancope, Inc.Packet sampling flow-based detection of network intrusions
JP2003186776A (en)2001-12-132003-07-04Hitachi Ltd Congestion control system
US20030131245A1 (en)2002-01-042003-07-10Michael LindermanCommunication security system
US8185651B2 (en)2002-01-102012-05-22Network General TechnologyMulti-segment network application monitoring and correlation architecture
US7058718B2 (en)*2002-01-152006-06-06International Business Machines CorporationBlended SYN cookies
US20030135625A1 (en)*2002-01-152003-07-17International Business Machines CorporationBlended SYN cookies
US8090866B1 (en)2002-01-182012-01-03Cisco Technology, Inc.TCP proxy connection management in a gigabit environment
US7328267B1 (en)2002-01-182008-02-05Cisco Technology, Inc.TCP proxy connection management in a gigabit environment
US7076555B1 (en)2002-01-232006-07-11Novell, Inc.System and method for transparent takeover of TCP connections between servers
CN1714545A (en)2002-01-242005-12-28艾维西系统公司System and method for fault tolerant data communication
US7143087B2 (en)2002-02-012006-11-28John FairweatherSystem and method for creating a distributed network architecture
US8560693B1 (en)2002-02-112013-10-15Extreme Networks, Inc.Method of and system for allocating resources to resource requests based on application of persistence policies
US7584262B1 (en)2002-02-112009-09-01Extreme NetworksMethod of and system for allocating resources to resource requests based on application of persistence policies
US7228359B1 (en)2002-02-122007-06-05Cisco Technology, Inc.Methods and apparatus for providing domain name service based on a client identifier
US20080109452A1 (en)2002-02-152008-05-08Cognos IncorporatedQueuing model for a plurality of servers
US20030195962A1 (en)2002-04-102003-10-16Satoshi KikuchiLoad balancing of servers
US8554929B1 (en)2002-05-032013-10-08Foundry Networks, LlcConnection rate limiting for server load balancing and transparent cache switching
US20100235507A1 (en)2002-05-032010-09-16Brocade Communications Systems, Inc.Connection rate limiting for server load balancing and transparent cache switching
US7707295B1 (en)2002-05-032010-04-27Foundry Networks, Inc.Connection rate limiting
WO2003103237A1 (en)2002-06-042003-12-11Cosine Communications, Inc.System and method for controlling routing in a virtual router system
US20050163073A1 (en)2002-06-102005-07-28Ipr Licensing, IncApplying session services based on packet flows
US20040010545A1 (en)2002-06-112004-01-15Pandya Ashish A.Data processing system using internet protocols and RDMA
US20060041745A1 (en)2002-06-192006-02-23Marratech AbApparatus and method for conveying private information within a group communication system
US7277963B2 (en)2002-06-262007-10-02Sandvine IncorporatedTCP proxy providing application layer modifications
US7254133B2 (en)*2002-07-152007-08-07Intel CorporationPrevention of denial of service attacks
US8099492B2 (en)2002-07-252012-01-17Intellectual Ventures Holding 40 LlcMethod and system for background replication of data objects
US7069438B2 (en)*2002-08-192006-06-27Sowl Associates, Inc.Establishing authenticated network connections
US7430755B1 (en)*2002-09-032008-09-30Fs Networks, Inc.Method and system for providing persistence in a secure network access
US7337241B2 (en)2002-09-272008-02-26Alacritech, Inc.Fast-path apparatus for receiving data corresponding to a TCP connection
US7506360B1 (en)*2002-10-012009-03-17Mirage Networks, Inc.Tracking communication for determining device states
US7236457B2 (en)2002-10-042007-06-26Intel CorporationLoad balancing in a network
US20090138606A1 (en)2002-10-082009-05-28Brian MoranTransferring sessions between devices
US7792113B1 (en)2002-10-212010-09-07Cisco Technology, Inc.Method and system for policy-based forwarding
US7310686B2 (en)2002-10-272007-12-18Paxfire, Inc.Apparatus and method for transparent selection of an Internet server based on geographic location of a user
US20110032941A1 (en)2002-11-082011-02-10Juniper Networks, Inc.Systems and methods for accelerating tcp/ip data stream processing
US7552323B2 (en)*2002-11-182009-06-23Liquidware Labs, Inc.System, apparatuses, methods, and computer-readable media using identification data in packet communications
US20100098417A1 (en)2002-11-182010-04-22Tse-Au Elizabeth Suet HRouter having dual propagation paths for packets
US20040111516A1 (en)2002-12-062004-06-10Stuart CainReduced wireless internet connect time
US20040199616A1 (en)2002-12-302004-10-07Mika KarhuAutomatic and dynamic service information delivery from service providers to data terminals in an access point network
US7269850B2 (en)2002-12-312007-09-11Intel CorporationSystems and methods for detecting and tracing denial of service attacks
US20040139057A1 (en)2002-12-312004-07-15International Business Machines CorporationSystem and method for searching a plurality of databases distributed across a multi server domain
US20040128312A1 (en)2002-12-312004-07-01International Business Machines CorporationSystem and method for invoking methods on place objects in a distributed environment
US20040139108A1 (en)2002-12-312004-07-15International Business Machines CorporationSystem and method for aggregating user project information in a multi-server system
US7234161B1 (en)2002-12-312007-06-19Nvidia CorporationMethod and apparatus for deflecting flooding attacks
US20040143599A1 (en)2003-01-222004-07-22International Business Machines CorporationSystem and method for command line administration of project spaces using XML objects
US20040141005A1 (en)2003-01-222004-07-22International Business Machines CorporationSystem and method for integrating online meeting materials in a place
US20040202182A1 (en)2003-02-122004-10-14Martin LundMethod and system to provide blade server load balancing using spare link bandwidth
US7979694B2 (en)*2003-03-032011-07-12Cisco Technology, Inc.Using TCP to authenticate IP source addresses
US20040210623A1 (en)2003-03-062004-10-21Aamer HydrieVirtual network topology generation
WO2004084085A1 (en)2003-03-182004-09-30Fujitsu LimitedLoad distributing system by intersite cooperation
US20040250059A1 (en)2003-04-152004-12-09Brian RamelsonSecure network processing
US7373500B2 (en)2003-04-152008-05-13Sun Microsystems, Inc.Secure network processing
US20040210663A1 (en)2003-04-152004-10-21Paul PhillipsObject-aware transport-layer network processing engine
US7308499B2 (en)2003-04-302007-12-11Avaya Technology Corp.Dynamic load balancing for enterprise IP traffic
US7181524B1 (en)2003-06-132007-02-20Veritas Operating CorporationMethod and apparatus for balancing a load among a plurality of servers in a computer system
US20040268358A1 (en)2003-06-302004-12-30Microsoft CorporationNetwork load balancing with host status information
US7613822B2 (en)2003-06-302009-11-03Microsoft CorporationNetwork load balancing with session information
US7590736B2 (en)2003-06-302009-09-15Microsoft CorporationFlexible network load balancing
US20050027862A1 (en)2003-07-182005-02-03Nguyen Tien LeSystem and methods of cooperatively load-balancing clustered servers
US20050039033A1 (en)2003-07-252005-02-17Activeviews, Inc.Method and system for building a report for execution against a data store
US20050036501A1 (en)2003-08-112005-02-17Samsung Electronics Co., Ltd.Domain name service system and method thereof
US20050036511A1 (en)2003-08-142005-02-17International Business Machines Corp.Method, system and article for improved TCP performance during packet reordering
US20090138945A1 (en)2003-09-102009-05-28Fidelis Security SystemsHigh-Performance Network Content Analysis Platform
US7467202B2 (en)2003-09-102008-12-16Fidelis Security SystemsHigh-performance network content analysis platform
CN1529460A (en)2003-10-142004-09-15北京邮电大学 Global load balancing method based on global network location
US20050080890A1 (en)2003-10-142005-04-14Yang Sun HeeServer load balancing apparatus and method using MPLS session
US7472190B2 (en)2003-10-172008-12-30International Business Machines CorporationMethod, system and program product for preserving a user state in an application
JP2005141441A (en)2003-11-062005-06-02Hitachi Ltd Load balancing system
US20050102400A1 (en)2003-11-062005-05-12Masahiko NakaharaLoad balancing system
CN1910869A (en)2003-12-052007-02-07艾拉克瑞技术公司TCP/IP offload device with reduced sequential processing
US20050125276A1 (en)2003-12-052005-06-09Grigore RusuSystem and method for event tracking across plural contact mediums
US20050213586A1 (en)2004-02-052005-09-29David CyganskiSystem and method to increase network throughput
US7881215B1 (en)2004-03-182011-02-01Avaya Inc.Stateful and stateless data processing
US7733866B2 (en)*2004-04-152010-06-08Qualcomm IncorporatedPacket concatenation in wireless networks
US8559437B2 (en)*2004-04-152013-10-15Qualcomm IncorporatedPacket concatenation in wireless networks
US20050240989A1 (en)*2004-04-232005-10-27Seoul National University Industry FoundationMethod of sharing state between stateful inspection firewalls on mep network
US20060112170A1 (en)2004-05-032006-05-25Craig SirkinGeo-locating load balancing
US20060064478A1 (en)2004-05-032006-03-23Level 3 Communications, Inc.Geo-locating load balancing
US7584301B1 (en)2004-05-062009-09-01Foundry Networks, Inc.Host-level policies for global server load balancing
US20050249225A1 (en)2004-05-102005-11-10Singhal Tara CMethod and apparatus for packet source validation architecture system for enhanced Internet security
US7391725B2 (en)*2004-05-182008-06-24Christian HuitemaSystem and method for defeating SYN attacks
US20050259586A1 (en)2004-05-192005-11-24Abdelhakim HafidDynamic traffic rearrangement and restoration for MPLS networks with differentiated services capabilities
US20080076432A1 (en)2004-06-042008-03-27Nimal SenarathMethod and System for Soft Handoff in Mobile Broadband Systems
US8990262B2 (en)2004-06-172015-03-24International Business Machines Corporationmanaging data center using web services
US20080228781A1 (en)2004-06-172008-09-18International Business Machines CorporationMethod and Apparatus for Managing Data Center Using Web Services
US20050281190A1 (en)2004-06-172005-12-22Mcgee Michael SAutomated recovery from a split segment condition in a layer2 network for teamed network resources of a computer systerm
US20060069774A1 (en)2004-06-172006-03-30International Business Machine CorporationMethod and apparatus for managing data center using Web services
US7948952B2 (en)2004-06-282011-05-24Nokia CorporationControlling services in a packet data network
US20060036733A1 (en)2004-07-092006-02-16Toshiba America Research, Inc.Dynamic host configuration and network access authentication
CN1725702A (en)2004-07-202006-01-25联想网御科技(北京)有限公司Network safety equipment and assemblied system and method for implementing high availability
US20060023721A1 (en)*2004-07-292006-02-02Ntt Docomo, Inc.Server device, method for controlling a server device, and method for establishing a connection using the server device
US20060036610A1 (en)2004-08-132006-02-16Reallusion Inc.File conversion and sharing system and the method of the same
US7423977B1 (en)2004-08-232008-09-09Foundry Networks Inc.Smoothing algorithm for round trip time (RTT) measurements
US20060069804A1 (en)*2004-08-252006-03-30Ntt Docomo, Inc.Server device, client device, and process execution method
US20060077926A1 (en)2004-10-082006-04-13Telefonaktiebolaget Lm Ericsson (Publ)Home network-assisted selection of intermediary network for a roaming mobile terminal
US20060092950A1 (en)2004-10-282006-05-04Cisco Technology, Inc.Architecture and method having redundancy in active/active stateful devices based on symmetric global load balancing protocol (sGLBP)
US20060098645A1 (en)2004-11-092006-05-11Lev WalkinSystem and method for providing client identifying information to a server
US20060168319A1 (en)2004-11-182006-07-27Nokia CorporationSystems and methods for multipoint service invocation
US20060164978A1 (en)2005-01-212006-07-27At&T Corp.Methods, systems, and devices for determining COS level
US7613193B2 (en)*2005-02-042009-11-03Nokia CorporationApparatus, method and computer program product to reduce TCP flooding attacks while conserving wireless network bandwidth
US20060230129A1 (en)*2005-02-042006-10-12Nokia CorporationApparatus, method and computer program product to reduce TCP flooding attacks while conserving wireless network bandwidth
US20060190997A1 (en)2005-02-222006-08-24Mahajani Amol VMethod and system for transparent in-line protection of an electronic communications network
US20060187901A1 (en)2005-02-232006-08-24Lucent Technologies Inc.Concurrent dual-state proxy server, method of providing a proxy and SIP network employing the same
US20060209789A1 (en)2005-03-042006-09-21Sun Microsystems, Inc.Method and apparatus for reducing bandwidth usage in secure transactions
CN101189598A (en)2005-03-092008-05-28泰克迪亚科技公司Method, apparatus and system for location-based uniform resource locator
WO2006098033A1 (en)2005-03-172006-09-21Fujitsu LimitedLoad-distributing communication device and load-distribution managing device
US20100054139A1 (en)2005-03-292010-03-04Lg Electronics Inc.Method and apparatus of controlling transmission of data block
US20060233100A1 (en)2005-04-132006-10-19Luft Siegfried JApplication aware traffic shaping service node positioned between the access and core networks
US7990847B1 (en)2005-04-152011-08-02Cisco Technology, Inc.Method and system for managing servers in a server cluster
US20060251057A1 (en)2005-05-062006-11-09Sung-Bok KwonName service system and method thereof
US7826487B1 (en)*2005-05-092010-11-02F5 Network, IncCoalescing acknowledgement responses to improve network communications
JP2006332825A (en)2005-05-242006-12-07Fujitsu Ltd Load distribution program, load distribution method, and load distribution apparatus
US20090106830A1 (en)2005-06-032009-04-23Thomas MaherSecure Network Communication System and Method
US20060277303A1 (en)2005-06-062006-12-07Nikhil HegdeMethod to improve response time when clients use network services
US20060280121A1 (en)*2005-06-132006-12-14Fujitsu LimitedFrame-transfer control device, DoS-attack preventing device, and DoS-attack preventing system
US20070156919A1 (en)2005-06-212007-07-05Sunil PottiEnforcing network service level agreements in a network element
US20110047294A1 (en)2005-06-292011-02-24Visa U.S.A., Inc.Adaptive gateway for switching transactions and data on unreliable networks using context-based rules
JP2009500731A (en)2005-06-292009-01-08ビザ ユー.エス.エー. インコーポレイテッド Gateway adapted to switch transactions and data using context-based rules over unreliable networks
US20070019543A1 (en)*2005-07-062007-01-25Fortinet, Inc.Systems and methods for detecting and preventing flooding attacks in a network environment
US20070022479A1 (en)2005-07-212007-01-25Somsubhra SikdarNetwork interface and firewall device
US20090070470A1 (en)2005-08-032009-03-12International Business Machines CorporationPriority Based LDAP Service Publication Mechanism
US20070076653A1 (en)2005-09-192007-04-05Park Vincent DPacket routing in a wireless communications environment
EP1770915A1 (en)2005-09-292007-04-04Matsushita Electric Industrial Co., Ltd.Policy control in the evolved system architecture
US20070086382A1 (en)2005-10-172007-04-19Vidya NarayananMethods of network access configuration in an IP network
US20070094396A1 (en)2005-10-202007-04-26Hitachi, Ltd.Server pool management method
US7983258B1 (en)2005-11-092011-07-19Juniper Networks, Inc.Dynamic virtual local area network (VLAN) interface configuration
US20070118881A1 (en)2005-11-182007-05-24Julian MitchellApplication control at a policy server
US20070124502A1 (en)2005-11-282007-05-31Huawei Technologies Co., Ltd.Script language based network device configuration management system and method
US20070165622A1 (en)2006-01-172007-07-19Cisco Technology, Inc.Techniques for load balancing over a cluster of subscriber-aware application servers
CN101004740A (en)2006-01-182007-07-25腾讯科技(深圳)有限公司Method and system for reading information at network resource site, and searching engine
US20070180119A1 (en)2006-01-312007-08-02Roundbox, Inc.Reliable event broadcaster with multiplexing and bandwidth control functions
US20070185998A1 (en)2006-02-062007-08-09Cisco Technology, Inc.Supporting options in a communication session using a TCP cookie
US7610622B2 (en)*2006-02-062009-10-27Cisco Technology, Inc.Supporting options in a communication session using a TCP cookie
US8116312B2 (en)2006-02-082012-02-14Solarflare Communications, Inc.Method and apparatus for multicast packet reception
US20070195792A1 (en)*2006-02-212007-08-23A10 Networks Inc.System and method for an adaptive TCP SYN cookie with time validation
US7675854B2 (en)*2006-02-212010-03-09A10 Networks, Inc.System and method for an adaptive TCP SYN cookie with time validation
USRE44701E1 (en)*2006-02-212014-01-14A10 Networks, Inc.System and method for an adaptive TCP SYN cookie with time validation
US7808994B1 (en)2006-02-222010-10-05Juniper Networks, Inc.Forwarding traffic to VLAN interfaces built based on subscriber information strings
US7492766B2 (en)2006-02-222009-02-17Juniper Networks, Inc.Dynamic building of VLAN interfaces based on subscriber information strings
US20070245090A1 (en)2006-03-242007-10-18Chris KingMethods and Systems for Caching Content at Multiple Levels
US20070230337A1 (en)2006-03-302007-10-04Ntt Docomo, Inc.Communication terminal and retransmission control method
US20070243879A1 (en)2006-04-142007-10-18Park Vincent DMethods and apparatus for supporting quality of service in communication systems
US20070242738A1 (en)2006-04-142007-10-18Park Vincent DProviding quality of service for various traffic flows in a communications environment
US8539075B2 (en)2006-04-212013-09-17International Business Machines CorporationOn-demand global server load balancing system and method of use
US20070248009A1 (en)2006-04-242007-10-25Petersen Brian ADistributed congestion avoidance in a network switching system
US20070259673A1 (en)2006-05-042007-11-08Telefonaktiebolaget Lm Ericsson (Publ)Inactivity monitoring for different traffic or service classifications
US20080120129A1 (en)2006-05-132008-05-22Michael SeubertConsistent set of interfaces derived from a business object model
KR100830413B1 (en)2006-05-252008-05-20(주)씨디네트웍스 Server access system for clients and load balancing network system including the same
US20070283429A1 (en)2006-05-302007-12-06A10 Networks Inc.Sequence number based TCP session proxy
US20070286077A1 (en)2006-06-072007-12-13Nokia CorporationCommunication system
US20070288247A1 (en)2006-06-112007-12-13Michael MackayDigital life server
US20070294209A1 (en)2006-06-202007-12-20Lyle StrubCommunication network application activity monitoring and control
US20090313379A1 (en)2006-07-032009-12-17Telefonaktiebolaget L M Ericsson (Publ)Topology Hiding Of Mobile Agents
US20080016161A1 (en)2006-07-142008-01-17George TsirtsisMethods and apparatus for using electronic envelopes to configure parameters
US7970934B1 (en)2006-07-312011-06-28Google Inc.Detecting events of interest
EP1885096A1 (en)2006-08-012008-02-06Alcatel LucentApplication session border element
JP2008040718A (en)2006-08-042008-02-21Nippon Telegr & Teleph Corp <Ntt> Load balancing control apparatus and method
US20080031263A1 (en)2006-08-072008-02-07Cisco Technology, Inc.Method and apparatus for load balancing over virtual network links
CN101495993A (en)2006-08-082009-07-29瑞科网信科技有限公司System and method for distributed multi-processing security gateway
US7965727B2 (en)2006-09-142011-06-21Fujitsu LimitedBroadcast distributing system and broadcast distributing method
US8584199B1 (en)2006-10-172013-11-12A10 Networks, Inc.System and method to apply a packet routing policy to an application session
US8826372B1 (en)2006-10-172014-09-02A10 Networks, Inc.Applying a packet routing policy to an application session
US20160119382A1 (en)2006-10-172016-04-28A10 Networks, Inc.Applying Security Policy to an Application Session
US9270705B1 (en)2006-10-172016-02-23A10 Networks, Inc.Applying security policy to an application session
US8595791B1 (en)2006-10-172013-11-26A10 Networks, Inc.System and method to apply network traffic policy to an application session
US9356910B2 (en)2006-10-172016-05-31A10 Networks, Inc.Applying a packet routing policy to an application session
US8813180B1 (en)2006-10-172014-08-19A10 Networks, Inc.Applying network traffic policy to an application session
US20160105395A1 (en)2006-10-172016-04-14A10 Networks, Inc.Applying a Packet Routing Policy to an Application Session
US20160105446A1 (en)2006-10-172016-04-14A10 Networks, Inc.Applying forwarding policy to an application session
US8312507B2 (en)2006-10-172012-11-13A10 Networks, Inc.System and method to apply network traffic policy to an application session
US20100235880A1 (en)2006-10-172010-09-16A10 Networks, Inc.System and Method to Apply Network Traffic Policy to an Application Session
US9350744B2 (en)2006-10-172016-05-24A10 Networks, Inc.Applying forwarding policy to an application session
US20160050233A1 (en)2006-10-172016-02-18A10 Networks, Inc.Applying security policy to an application session
CN102123156A (en)2006-10-172011-07-13瑞科网信科技有限公司 Systems and methods for associating private and public user identities
US9219751B1 (en)2006-10-172015-12-22A10 Networks, Inc.System and method to apply forwarding policy to an application session
US20160036778A1 (en)2006-10-172016-02-04A10 Networks, Inc.Applying a packet routing policy to an application session
US9253152B1 (en)2006-10-172016-02-02A10 Networks, Inc.Applying a packet routing policy to an application session
US20100217819A1 (en)2006-10-172010-08-26A10 Networks, Inc.System and Method to Associate a Private User Identity with a Public User Identity
US20080101396A1 (en)2006-10-312008-05-01Hiroaki MiyataPacket forwarding apparatus having gateway load distribution function
WO2008053954A1 (en)2006-11-012008-05-08Panasonic CorporationCommunication control method, communication system, home agent allocation server, and mobile node
US20100061319A1 (en)2006-11-012010-03-11Panasonic CorporationCommunication control method, communication system, home agent allocation server, and mobile node
US20080109870A1 (en)2006-11-082008-05-08Kieran Gerard SherlockIdentities Correlation Infrastructure for Passive Network Monitoring
CN101193089A (en)2006-11-202008-06-04阿里巴巴公司Stateful session system and its realization method
CN101094225A (en)2006-11-242007-12-26中兴通讯股份有限公司Network, system and method of differentiated security service
US20080134332A1 (en)2006-12-042008-06-05Susann Marie KeohaneMethod and apparatus for reduced redundant security screening
WO2008078593A1 (en)2006-12-222008-07-03International Business Machines CorporationMessage hub, program, and method
US20080162679A1 (en)2006-12-292008-07-03Ebay Inc.Alerting as to denial of service attacks
US20080298303A1 (en)2007-01-222008-12-04Qualcomm IncorporatedMulti-link support for network based mobility management systems
CN101682532A (en)2007-01-262010-03-24蔚蓝公司Multiple network access system and method
US8379515B1 (en)2007-02-012013-02-19F5 Networks, Inc.TCP throughput control by imposing temporal delay
US8681610B1 (en)2007-02-012014-03-25F5 Networks, Inc.TCP throughput control by imposing temporal delay
US20080225722A1 (en)2007-03-122008-09-18Prakash KhemaniSystems and methods for configuring policy bank invocations
US20100095018A1 (en)2007-03-122010-04-15Prakash KhemaniSystems and methods for configuring policy bank invocations
US20100064008A1 (en)2007-03-132010-03-11Huawei Technologies Co., Ltd.Peer-to-peer network system, proxy service peer, and method for peer interworking between overlay networks
US20080250099A1 (en)2007-04-062008-10-09Jinmei ShenOn-Demand Propagation of Routing Information in Distributed Computing System
US20080253390A1 (en)2007-04-162008-10-16Kamala Prasad DasMethod and apparatus for priority services management
US20080263209A1 (en)2007-04-202008-10-23Array Networks, Inc.Active-active operation for a cluster of SSL virtual private network (VPN) devices with load distribution
US20080271130A1 (en)2007-04-302008-10-30Shankar RamamoorthyMinimizing client-side inconsistencies in a distributed virtual file system
US20080282254A1 (en)2007-05-092008-11-13Radware, Ltd.Geographic Resiliency and Load Balancing for SIP Application Services
US20080291911A1 (en)2007-05-212008-11-27Ist International, Inc.Method and apparatus for setting a TCP retransmission timer
US8191106B2 (en)2007-06-072012-05-29Alcatel LucentSystem and method of network access security policy management for multimodal device
US20100223630A1 (en)2007-06-262010-09-02Sap AgSystem and method for switching between stateful and stateless communication modes
US20090024722A1 (en)2007-07-172009-01-22International Business Machines CorporationProxying availability indications in a failover configuration
US8261339B2 (en)2007-07-262012-09-04International Business Machines CorporationDynamic network tunnel endpoint selection
US7992201B2 (en)2007-07-262011-08-02International Business Machines CorporationDynamic network tunnel endpoint selection
US20090031415A1 (en)2007-07-262009-01-29International Business Machines CorporationDynamic Network Tunnel Endpoint Selection
US20110083174A1 (en)2007-07-262011-04-07International Business Machines CorporationDynamic Network Tunnel Endpoint Selection
US20090049198A1 (en)2007-08-142009-02-19Microsoft CorporationValidating change of name server
US20090092124A1 (en)2007-10-032009-04-09Microsoft CorporationNetwork routing of endpoints to content based on content swarms
US8081640B2 (en)2007-10-242011-12-20Hitachi, Ltd.Network system, network management server, and access filter reconfiguration method
US20100265824A1 (en)2007-11-092010-10-21Blade Network Technologies, IncSession-less Load Balancing of Client Traffic Across Servers in a Server Group
CN101163336A (en)2007-11-152008-04-16中兴通讯股份有限公司Method of implementing mobile phone terminal access authority authentication
CN101169785A (en)2007-11-212008-04-30浪潮电子信息产业股份有限公司 A Dynamic Load Balancing Method for Cluster Database System
CN101442425A (en)2007-11-222009-05-27华为技术有限公司Gateway management method, address allocation method, device and system
US20100333101A1 (en)2007-11-292010-12-30Solarflare Communications Inc.Virtualised receive side scaling
CN101878663A (en)2007-11-292010-11-03瑞科网信科技有限公司 Systems and methods for distributed multiprocessing security gateways
US20090141634A1 (en)2007-12-042009-06-04Jesse Abraham RothsteinAdaptive Network Traffic Classification Using Historical Context
US20090164614A1 (en)2007-12-202009-06-25Christian Michael FDns wildcard beaconing to determine client location and resolver load for global traffic load balancing
US20090172093A1 (en)2007-12-262009-07-02International Business Machines CorporationTechnique For Previously Providing Estimate of Time Required For Processing
US20090213858A1 (en)2008-02-272009-08-27Alcatel LucentApplication-aware MPLS tunnel selection
US20090222583A1 (en)2008-03-032009-09-03Microsoft CorporationClient-side load balancing
US20090228547A1 (en)2008-03-042009-09-10Kddi CorporationServer apparatus and communication system
US20090227228A1 (en)2008-03-072009-09-10Hu Q JamesEnhanced policy capabilities for mobile data services
CN101247349A (en)2008-03-132008-08-20华耀环宇科技(北京)有限公司Network flux fast distribution method
US20110023071A1 (en)2008-03-282011-01-27Huawei Technologies Co., Ltd.Method, System, and Apparatus for Creating Content-on-Demand Service
US8151019B1 (en)2008-04-222012-04-03Lockheed Martin CorporationAdaptive network traffic shaper
US20090271472A1 (en)2008-04-282009-10-29Scheifler Robert WSystem and Method for Programmatic Management of Distributed Computing Resources
CN101261644A (en)2008-04-302008-09-10杭州华三通信技术有限公司Method and device for accessing united resource positioning symbol database
US20110007652A1 (en)2008-05-092011-01-13Huawei Technologies Co., Ltd.Method and device for path switchover
US20090285196A1 (en)2008-05-152009-11-19Cellco Partnership D/B/A Verizon WirelessScheduling with quality of service support in wireless system
US20110060831A1 (en)2008-06-122011-03-10Tomoki IshiiNetwork monitoring device, bus system monitoring device, method and program
US20100008229A1 (en)2008-07-112010-01-14Qi BiMethod and system for joint reverse link access and traffic channel radio frequency overload control
EP2296313A1 (en)2008-07-162011-03-16Huawei Technologies Co., Ltd.Control method and device for wireless multi-hopping network congestion
US20100023621A1 (en)2008-07-242010-01-28Netapp, Inc.Load-derived probability-based domain name service in a network storage cluster
US20100036952A1 (en)2008-08-112010-02-11International Business Machines CorporationLoad balancing using replication delay
US20130074177A1 (en)2008-08-142013-03-21Juniper Networks, Inc.Routing device having integrated mpls-aware firewall
US20100042869A1 (en)2008-08-182010-02-18F5 Networks, Inc.Upgrading network traffic management devices while maintaining availability
US20100083076A1 (en)2008-09-262010-04-01Brother Kogyo Kabushiki KaishaTerminal device, time adjusting method of terminal device and communication system
US20110178985A1 (en)2008-10-032011-07-21Marta San Martin ArribasMaster monitoring mechanism for a geographical distributed database
US20100094985A1 (en)2008-10-142010-04-15Mamoun Abu-SamahaHttp push to simulate server-initiated sessions
US20100106833A1 (en)2008-10-232010-04-29International Business Machines CorporationDynamic expiration of domain name service entries
US20100106854A1 (en)2008-10-292010-04-29Hostway CorporationSystem and method for controlling non-existing domain traffic
US8122116B2 (en)2008-10-312012-02-21Hitachi, Ltd.Storage management method and management server
US20100268814A1 (en)2008-11-192010-10-21Seachange International, Inc.Intercept Device for Providing Content
US20130046876A1 (en)2008-11-252013-02-21Raghav Somanahalli NarayanaSystems and methods for gslb site persistence
US20100128606A1 (en)2008-11-262010-05-27Patel Rahul GFirst-hop domain reliability measurement and load balancing in a computer network
US20100162378A1 (en)2008-12-182010-06-24Thusitha JayawardenaMethods and apparatus to enhance security in residential networks
US20100205310A1 (en)2009-02-122010-08-12Yaniv AltshulerSystem and method for dynamically optimizing tcp window size
US20100210265A1 (en)2009-02-172010-08-19Nokia CorporationMethod and apparatus for providing shared services
US20100217793A1 (en)2009-02-232010-08-26Research In Motion LimitedMethod, system and apparatus for connecting a plurality of client machines to a plurality of servers
US20100228819A1 (en)2009-03-052010-09-09Yottaa IncSystem and method for performance acceleration, data protection, disaster recovery and on-demand scaling of computer applications
US20100235522A1 (en)2009-03-112010-09-16Juniper Networks Inc.Session-cache-based http acceleration
US20100238828A1 (en)2009-03-232010-09-23Corvil LimitedSystem and method for estimation of round trip times within a tcp based data network
US20110292939A1 (en)2009-05-282011-12-01Krishnamurthy SubramaianMethod & apparatus for forwarding table reduction
US8296434B1 (en)2009-05-282012-10-23Amazon Technologies, Inc.Providing dynamically scaling computing load balancing
US20100312740A1 (en)2009-06-092010-12-09Clemm L AlexanderTracking policy decisions in a network
US20120106355A1 (en)2009-06-102012-05-03Telefonaktiebolaget L M Ericsson (Publ)Performance Monitoring in a Communication Network
US20100318631A1 (en)2009-06-122010-12-16Yahoo! Inc.User Location Dependent DNS Lookup
US20100322252A1 (en)2009-06-222010-12-23Josephine SuganthiSystems and methods for handling a multi-connection protocol between a client and server traversing a multi-core system
US20100330971A1 (en)2009-06-262010-12-30Oracle International CorporationSystem and method for providing a production upgrade of components within a multiprotocol gateway
US9137301B1 (en)2009-06-302015-09-15Amazon Technologies, Inc.Client based opportunistic routing
US20110040826A1 (en)2009-08-132011-02-17Sap AgTransparently stateful execution of stateless applications
CN102577252B (en)2009-10-212016-03-16瑞科网信科技有限公司Determine based on geographical location information to apply the method and system transmitting server
US20110093522A1 (en)2009-10-212011-04-21A10 Networks, Inc.Method and System to Determine an Application Delivery Server Based on Geo-Location Information
WO2011049770A2 (en)2009-10-212011-04-28A10 Networks Inc.Method and system to determine an application delivery server based on geo-location information
CN102577252A (en)2009-10-212012-07-11瑞科网信科技有限公司Method and system to determine an application delivery server based on geo-location information
US20120023231A1 (en)2009-10-232012-01-26Nec CorporationNetwork system, control method for the same, and controller
US20110099403A1 (en)2009-10-262011-04-28Hitachi, Ltd.Server management apparatus and server management method
US20110099623A1 (en)2009-10-282011-04-28Garrard Kenneth WSystem and method for providing unified transport and security protocols
US20110110294A1 (en)2009-11-062011-05-12Vamsidhar ValluriVIRTUAL CARE-OF ADDRESS FOR MOBILE IP (Internet Protocol)
US20110185073A1 (en)2009-11-252011-07-28Ashok Kumar JagadeeswaranSystems and methods for client ip address insertion via tcp options
US20110145324A1 (en)2009-12-162011-06-16Quantum CorporationReducing messaging in a client-server system
US20110153834A1 (en)2009-12-172011-06-23Sonus Networks, Inc.Transparent Recovery of Transport Connections Using Packet Translation Techniques
US20110149879A1 (en)2009-12-232011-06-23At&T Mobility Ii LlcChromatic scheduler for network traffic with disparate service requirements
US20120297046A1 (en)2009-12-232012-11-22Murali RajaSystems and methods for gslb spillover
US8224971B1 (en)2009-12-282012-07-17Amazon Technologies, Inc.Using virtual networking devices and routing information to initiate external actions
US7991859B1 (en)2009-12-282011-08-02Amazon Technologies, Inc.Using virtual networking devices to connect managed computer networks
WO2011079381A1 (en)2009-12-312011-07-07Bce Inc.Method and system for increasing performance of transmission control protocol sessions in data networks
US20120290727A1 (en)2009-12-312012-11-15Bce Inc.Method and system for increasing performance of transmission control protocol sessions in data networks
US20110191773A1 (en)2010-02-012011-08-04Computer Associates Think, Inc.System and Method for Datacenter Power Management
US20110196971A1 (en)2010-02-102011-08-11Praveenkumar ReguramanApplication session control using packet inspection
US20120008495A1 (en)2010-02-252012-01-12The Trustees Of Columbia University In The City Of New YorkMethods And Systems For Controlling SIP Overload
US20110276982A1 (en)2010-05-062011-11-10Hitachi, Ltd.Load Balancer and Load Balancing System
US20110276695A1 (en)2010-05-062011-11-10Juliano MaldanerContinuous upgrading of computers in a load balanced environment
US8499093B2 (en)2010-05-142013-07-30Extreme Networks, Inc.Methods, systems, and computer readable media for stateless load balancing of network traffic flows
US20110289496A1 (en)2010-05-182011-11-24North End Technologies, Inc.Method & apparatus for load balancing software update across a plurality of publish/subscribe capable client devices
WO2011149796A2 (en)2010-05-272011-12-01A10 Networks Inc.System and method to apply network traffic policy to an application session
CN102918801B (en)2010-05-272016-05-25瑞科网信科技有限公司By network traffics application of policies in the system and method for utility cession
CN102918801A (en)2010-05-272013-02-06瑞科网信科技有限公司System and method to apply network traffic policy to an application session
JP2013528330A (en)2010-05-272013-07-08エイ10 ネットワークス インコーポレイテッド System and method for applying a network traffic policy to an application session
EP2577910A2 (en)2010-05-272013-04-10A10 Networks Inc.System and method to apply network traffic policy to an application session
US20110302256A1 (en)2010-06-072011-12-08Salesforce.Com, Inc.Methods and systems for providing customized domain messages
US20110307541A1 (en)2010-06-102011-12-15Microsoft CorporationServer load balancing and draining in enhanced communication systems
US20130058335A1 (en)2010-07-062013-03-07Teemu KoponenPacket processing for logical datapath sets
US8750164B2 (en)2010-07-062014-06-10Nicira, Inc.Hierarchical managed switch architecture
US20120030341A1 (en)2010-07-282012-02-02International Business Machines CorporationTransparent Header Modification for Reducing Serving Load Based on Current and Projected Usage
US20120026897A1 (en)2010-07-292012-02-02Cisco Technology, Inc., A Corporation Of CaliforniaPacket Switching Device Using Results Determined by an Application Node
US8675488B1 (en)2010-09-072014-03-18Juniper Networks, Inc.Subscriber-based network traffic management
US20120066371A1 (en)2010-09-102012-03-15Cisco Technology, Inc.Server Load Balancer Scaling for Virtual Servers
CN102571742A (en)2010-09-302012-07-11瑞科网信科技有限公司System and method to balance servers based on server load status
EP2622795A2 (en)2010-09-302013-08-07A10 Networks Inc.System and method to balance servers based on server load status
WO2012050747A2 (en)2010-09-302012-04-19A10 Networks Inc.System and method to balance servers based on server load status
US9215275B2 (en)2010-09-302015-12-15A10 Networks, Inc.System and method to balance servers based on server load status
US20160088074A1 (en)2010-09-302016-03-24A10 Networks, Inc.System and Method to Balance Servers Based on Server Load Status
US20120084419A1 (en)2010-09-302012-04-05A10 Networks, Inc.System and method to balance servers based on server load status
JP5855663B2 (en)2010-09-302016-02-09エイ10 ネットワークス インコーポレイテッドA10 Networks, Inc. System and method for balancing servers based on server load conditions
US20120084460A1 (en)2010-10-042012-04-05Openwave Systems Inc.Method and system for dynamic traffic steering
US20120117571A1 (en)2010-11-052012-05-10Adam DavisLoad balancer and firewall self-provisioning system
US20120144014A1 (en)2010-12-012012-06-07Cisco Technology, Inc.Directing data flows in data centers with clustering services
CN102546590A (en)2010-12-022012-07-04瑞科网信科技有限公司System and method for distributing application traffic to servers based on dynamic service response time
WO2012075237A2 (en)2010-12-022012-06-07A10 Networks Inc.System and method to distribute application traffic to servers based on dynamic service response time
US20120144015A1 (en)2010-12-022012-06-07A10 Networks, Inc.System and Method for Distributing Application Traffic to Servers Based on Dynamic Service Response Time
EP2647174A2 (en)2010-12-022013-10-09A10 Networks Inc.System and method to distribute application traffic to servers based on dynamic service response time
US20130258846A1 (en)2010-12-072013-10-03Telefonaktiebolaget L M Ericsson (Publ)Method for Enabling Traffic Acceleration in a Mobile Telecommunication Network
US20120151353A1 (en)2010-12-092012-06-14Verizon Patent And Licensing Inc.Server ip addressing in a computing-on-demand system
US8965957B2 (en)2010-12-152015-02-24Sap SeService delivery framework
WO2012083264A2 (en)2010-12-172012-06-21Microsoft CorporationSynchronizing state among load balancer components
JP2014504484A (en)2010-12-172014-02-20マイクロソフト コーポレーション State synchronization between load balancer components
US20120173759A1 (en)2010-12-292012-07-05Mugdha AgarwalSystems and Methods for Policy Based Integration to Horizontally Deployed WAN Optimization Appliances
US20120170548A1 (en)2011-01-042012-07-05Cisco Technology, Inc.Distributed load management on network devices
WO2012097015A2 (en)2011-01-112012-07-19A10 Networks Inc.Virtual application delivery chassis system
US20120179770A1 (en)2011-01-112012-07-12A10 Networks, Inc.Virtual application delivery chassis system
US8266235B2 (en)2011-01-112012-09-11A10 Networks, Inc.Virtual application delivery chassis system
US20120215910A1 (en)2011-02-182012-08-23Canon Kabushiki KaishaWeb service system, server management apparatus, and web service providing method
US20120239792A1 (en)2011-03-152012-09-20Subrata BanerjeePlacement of a cloud service using network topology and infrastructure performance
CN102143075A (en)2011-03-282011-08-03中国人民解放军国防科学技术大学Method and system for achieving load balance
KR20120117461A (en)2011-04-152012-10-24서강대학교산학협력단Method and system of controlling data transfer rate for downward vertical handover in overlayed network environment
US20130148500A1 (en)2011-04-182013-06-13Kentaro SonodaTerminal, control device, communication method, communication system, communication module, program, and information processing device
US20120311116A1 (en)2011-06-062012-12-06A10 Networks, Inc.Sychronization of configuration file of virtual application distribution chassis
US9154577B2 (en)2011-06-062015-10-06A10 Networks, Inc.Sychronization of configuration file of virtual application distribution chassis
US20130083725A1 (en)2011-10-042013-04-04Juniper Networks, Inc.Methods and apparatus for enforcing a common user policy within a network
US8885463B1 (en)2011-10-172014-11-11Juniper Networks, Inc.Path computation element communication protocol (PCEP) extensions for stateful label switched path management
CN104067569A (en)2011-10-242014-09-24A10网络股份有限公司 A method for combining stateless and stateful server load balancing
JP5913609B2 (en)2011-10-242016-04-27エイ10 ネットワークス インコーポレイテッドA10 Networks, Inc. How to combine stateless and stateful server load balancing
US8897154B2 (en)2011-10-242014-11-25A10 Networks, Inc.Combining stateless and stateful server load balancing
US20150039671A1 (en)2011-10-242015-02-05A10 Networks, Inc.Combining stateless and stateful server load balancing
JP2015507380A (en)2011-10-242015-03-05エイ10 ネットワークス インコーポレイテッドA10 Networks, Inc. How to combine stateless and stateful server load balancing
WO2013070391A1 (en)2011-10-242013-05-16A10 Networks Inc.Methods to combine stateless and stateful server load balancing
HK1198565A1 (en)2011-10-242015-05-15A10网络股份有限公司Methods to combine stateless and stateful server load balancing
US20130100958A1 (en)2011-10-242013-04-25A10 Networks, Inc.Methods to combine stateless and stateful server load balancing
US20160156708A1 (en)2011-10-242016-06-02A10 Networks, Inc.Combining Stateless and Stateful Server Load Balancing
EP2772026A1 (en)2011-10-242014-09-03A10 Networks Inc.Methods to combine stateless and stateful server load balancing
US9270774B2 (en)2011-10-242016-02-23A10 Networks, Inc.Combining stateless and stateful server load balancing
US20130124713A1 (en)2011-11-102013-05-16Microsoft CorporationPattern-based computational health and configuration monitoring
US20140286313A1 (en)2011-11-232014-09-25Telefonaktiebolaget L M Ericsson (Publ)Methods and arrangements for improving transmission control protocol performance in a cellular network
HK1199153A1 (en)2011-11-292015-06-19A10 Networks Inc.Method and system of accelerating service processing using fast path tcp
CN104040990A (en)2011-11-292014-09-10瑞科网信科技有限公司Accelerating service processing using fast path TCP
US20130135996A1 (en)2011-11-292013-05-30Hughes Networks Systems, LlcMethod and system for traffic management and resource allocation on a shared access network
US9386088B2 (en)2011-11-292016-07-05A10 Networks, Inc.Accelerating service processing using fast path TCP
US20130136139A1 (en)2011-11-292013-05-30A10 Networks, Inc.Accelerating Service Processing Using Fast Path TCP
WO2013081952A1 (en)2011-11-292013-06-06A10 Networks Inc.Accelerating service processing using fast path tcp
WO2013096019A1 (en)2011-12-232013-06-27A10 Networks Inc.Methods to manage services over a service gateway
US20130166762A1 (en)2011-12-232013-06-27A10 Networks, Inc.Methods to Manage Services over a Service Gateway
CN104137491A (en)2011-12-232014-11-05瑞科网信科技有限公司 Methods of managing services through the service gateway
US9094364B2 (en)2011-12-232015-07-28A10 Networks, Inc.Methods to manage services over a service gateway
HK1200617A1 (en)2011-12-232015-08-07A10 Networks Inc.Method to manage services over a service gateway and system for managing services
US20150296058A1 (en)2011-12-232015-10-15A10 Networks, Inc.Methods to Manage Services over a Service Gateway
US20130173795A1 (en)2011-12-302013-07-04Verisign, Inc.DNS Package in a Partitioned Network
US20130176854A1 (en)2012-01-092013-07-11Motorola Mobility, Inc.Dynamic tcp layer optimization for real-time field performance
US20130191486A1 (en)2012-01-242013-07-25Sony CorporationTime control apparatus, time control method, and program
US20130198385A1 (en)2012-01-282013-08-01A10 Networks, Inc.System and Method to Generate Secure Name Records
HK1198848A1 (en)2012-01-282015-06-12A10 Networks, Inc.System and method to generate secure name records
WO2013112492A1 (en)2012-01-282013-08-01A10 Networks, Inc.System and method to generate secure name records
CN104106241A (en)2012-01-282014-10-15瑞科网信科技有限公司 Systems and methods for generating security name records
KR20130096624A (en)2012-02-222013-08-30유대영Led lighting apparatus and led lighting system having the same
US20130250765A1 (en)2012-03-232013-09-26Qualcomm IncorporatedDelay based active queue management for uplink traffic in user equipment
US20130282791A1 (en)2012-04-192013-10-24Empire Technology Development LlcMigration in place
US20150215436A1 (en)2012-04-302015-07-30Brocade Communications Systems, Inc.Techniques for protecting against denial of service attacks
US20160014052A1 (en)2012-07-052016-01-14A10 Networks, Inc.Allocating buffer for tcp proxy session based on dynamic network conditions
US9154584B1 (en)2012-07-052015-10-06A10 Networks, Inc.Allocating buffer for TCP proxy session based on dynamic network conditions
US20140012972A1 (en)2012-07-052014-01-09A10 Networks, Inc.Method to Allocate Buffer for TCP Proxy Session Based on Dynamic Network Conditions
CN103533018A (en)2012-07-052014-01-22A10网络股份有限公司Method to allocate buffer for TCP proxy session based on dynamic network conditions
US8782221B2 (en)2012-07-052014-07-15A10 Networks, Inc.Method to allocate buffer for TCP proxy session based on dynamic network conditions
US8977749B1 (en)2012-07-052015-03-10A10 Networks, Inc.Allocating buffer for TCP proxy session based on dynamic network conditions
US20150237173A1 (en)2012-08-232015-08-20Telefonaktiebolaget L M Ericsson (Publ)TCP Proxy Server
WO2014031046A1 (en)2012-08-232014-02-27Telefonaktiebolaget L M Ericsson (Publ)Tcp proxy server
WO2014052099A2 (en)2012-09-252014-04-03A10 Networks, Inc.Load distribution in data networks
US20160044095A1 (en)2012-09-252016-02-11A10 Networks, Inc.Distributing service sessions
EP2901308A2 (en)2012-09-252015-08-05A10 Networks Inc.Load distribution in data networks
US20160043901A1 (en)2012-09-252016-02-11A10 Networks, Inc.Graceful scaling in software driven networks
US20160042014A1 (en)2012-09-252016-02-11A10 Networks, Inc.Distributed database in software driven networks
US20140089500A1 (en)2012-09-252014-03-27Swaminathan SankarLoad distribution in data networks
US20140169168A1 (en)2012-12-062014-06-19A10 Networks, Inc.Configuration of a virtual service network
WO2014088741A1 (en)2012-12-062014-06-12A10 Networks, Inc.Forwarding policies on a virtual service network
US20140164617A1 (en)2012-12-062014-06-12A10 Networks, Inc.Forwarding policies on a virtual service network
US9338225B2 (en)2012-12-062016-05-10A10 Networks, Inc.Forwarding policies on a virtual service network
US20160173579A1 (en)2012-12-062016-06-16A10 Networks, Inc.Forwarding Policies on a Virtual Service Network
US9106561B2 (en)2012-12-062015-08-11A10 Networks, Inc.Configuration of a virtual service network
WO2014093829A1 (en)2012-12-152014-06-19A10 Networks, Inc.Configuration of a virtual service network
US20140207845A1 (en)2013-01-232014-07-24A10 Networks, Inc.Reducing Buffer Usage for TCP Proxy Session Based on Delayed Acknowledgement
EP2760170B1 (en)2013-01-232015-12-02A10 Networks Inc.Reducing buffer usage for TCP proxy session based on delayed acknowledgment
CN103944954A (en)2013-01-232014-07-23A10网络股份有限公司Reducing Buffer Usage For Tcp Proxy Session Based On Delayed Acknowledgment
EP2760170A1 (en)2013-01-232014-07-30A10 Networks Inc.Reducing buffer usage for TCP proxy session based on delayed acknowledgment
KR101576585B1 (en)2013-01-232015-12-10에이10 네트워크스, 인코포레이티드Reducing buffer usage for tcp proxy session based on delayed acknowledgment
JP2014143686A (en)2013-01-232014-08-07A10 Networks IncReducing buffer usage for tcp proxy session based on delayed acknowledgement
HK1199779A1 (en)2013-01-232015-07-17A10网络股份有限公司Method, medium and system for reducing buffer usage for tcp proxy session based on delayed acknowledgment
US9531846B2 (en)2013-01-232016-12-27A10 Networks, Inc.Reducing buffer usage for TCP proxy session based on delayed acknowledgement
JP5906263B2 (en)2013-01-232016-04-20エイ10 ネットワークス,インコーポレーテッド Reducing buffer usage for TCP proxy sessions based on delayed acknowledgments
US20140258536A1 (en)2013-03-082014-09-11A10 Networks, Inc.Application delivery controller and global server load balancer
WO2014138483A1 (en)2013-03-082014-09-12A10 Networks, Inc.Application delivery controller and global server load balancer
US20140258465A1 (en)2013-03-112014-09-11Cisco Technology, Inc.Identification of originating ip address and client port connection to a web server via a proxy server
WO2014144837A1 (en)2013-03-152014-09-18A10 Networks, Inc.Processing data packets using a policy based network path
US20140269728A1 (en)2013-03-152014-09-18Rajkumar JalanProcessing data packets using a policy based network path
US20140298091A1 (en)2013-04-012014-10-02Nebula, Inc.Fault Tolerance for a Distributed Computing System
US20160014126A1 (en)2013-05-032016-01-14A10 Networks, Inc.Facilitating a Secure 3 Party Network Session by a Network Device
US20140330982A1 (en)2013-05-032014-11-06A10 Networks, Inc.Facilitating secure network traffic by an application delivery controller
WO2014179753A2 (en)2013-05-032014-11-06A10 Networks, Inc.Facilitating secure network traffic by an application delivery controller
US20140334485A1 (en)2013-05-092014-11-13Vmware, Inc.Method and system for service switching using service tags
US20140359052A1 (en)2013-05-282014-12-04Verizon Patent And Licensing Inc.Resilient tcp splicing for proxy services
US20150026794A1 (en)2013-07-182015-01-22Palo Alto Networks, Inc.Packet classification for network routing
US20150156223A1 (en)2013-12-022015-06-04Feilong XuNetwork proxy layer for policy-based application proxies
CN104796396A (en)2013-12-022015-07-22瑞科网信科技有限公司Network proxy layer for policy-based application proxies
US20150244566A1 (en)2014-02-242015-08-27Red Hat Israel, Ltd.Network configuration via abstraction components and standard commands
US20150281087A1 (en)2014-03-252015-10-01A10 Networks, Inc.Forwarding data packets using a service-based forwarding policy
US20150281104A1 (en)2014-03-312015-10-01Ali GolshanActive application response delay time
WO2015153020A1 (en)2014-03-312015-10-08A10 Networks, Inc.Active application response delay time
US20150312092A1 (en)2014-04-242015-10-29Ali GolshanEnabling planned upgrade/downgrade of network devices without impacting network sessions
WO2015164026A1 (en)2014-04-242015-10-29A10 Networks, Inc.Enabling planned upgrade/downgrade of network devices without impacting network sessions
US20150312268A1 (en)2014-04-282015-10-29Sophos LimitedIntrusion detection using a heartbeat
US20150333988A1 (en)2014-05-162015-11-19A10 Networks, Inc.Distributed system to determine a server's health
US20150350379A1 (en)2014-06-032015-12-03A10 Networks, Inc.Programming a data network device using user defined scripts
US20150350048A1 (en)2014-06-032015-12-03A10 Networks, Inc.User Defined Objects for Network Devices
US20170048356A1 (en)2015-08-122017-02-16A10 Networks, Inc.Transmission Control of Protocol State Exchange for Dynamic Stateful Service Insertion
US20170048107A1 (en)2015-08-132017-02-16A10 Networks, Inc.Automated Adjustment of Subscriber Policies

Non-Patent Citations (18)

* Cited by examiner, † Cited by third party
Title
"EIGRP MPLS VPN PE-CE Site of Origin (SoO)", Cisco Systems, Feb. 28, 2006, 14 pages.
"Enhanced Interior Gateway Routing Protocol", Cisco, Document ID 16406, Sep. 9, 2005 update, 43 pages.
"Tcp—TCP Protocol", Linux Programmer's Manual, accessed Apr. 13, 2016 at URL: «https://www.freebsd.org/cgi/man.cgi?query=tcp&apropos=0&sektion=7&manpath=SuSE+Linux%2Fi386+11.0&format=asci», Nov. 25, 2007, 11 pages.
Abe et al., "Adaptive Split Connection Schemes in Advanced Relay Nodes," IEICE Technical Report, Feb. 22, 2010, vol. 109, No. 438, pp. 25-30.
Cardellini et al., "Dynamic Load Balancing on Web-server Systems", IEEE Internet Computing, vol. 3, No. 3, pp. 28-39, May-Jun. 1999.
Chen, Jianhua et al., "SSL/TLS-based Secure Tunnel Gateway System Design and Implementation", IEEE International Workshop on Anti-counterfeiting, Security, Identification, Apr. 16-18, 2007, pp. 258-261.
Crotti, Manuel et al., "Detecting HTTP Tunnels with Statistical Mechanisms", IEEE International Conference on communications, Jun. 24-28, 2007, pp. 6162-6168.
Gite, Vivek, "Linux Tune Network Stack (Buffers Size) To Increase Networking Performance," accessed Apr. 13, 2016 at URL: «http://www.cyberciti.biz/faq/linux-tcp-tuning/», Jul. 8, 2009, 24 pages.
Haruyama, Takahiro et al., "Dial-to-Connect VPN System for Remote DLNA Communication", IEEE Consumer Communications and Networking Conference, CCNC 2008. 5th IEEE, Jan. 10-12, 2008, pp. 1224-1225.
Hunt et al. NetDispatcher: A TCP Connection Router, IBM Research Report RC 20853 May 19, 1997.
Kjaer et al. "Resource allocation and disturbance rejection in web servers using SLAs and virtualized servers", IEEE Transactions on Network and Service Management, IEEE, US, vol. 6, No. 4, Dec. 1, 2009.
Koike et al., "Transport Middleware for Network-Based Control," IEICE Technical Report, Jun. 22, 2000, vol. 100, No. 53, pp. 13-18.
Noguchi, "Realizing the Highest Level "Layer 7" Switch"= Totally Managing Network Resources, Applications, and Users =, Computer & Network LAN, Jan. 1, 2000, vol. 18, No. 1, p. 109-112.
Ohnuma, "AppSwitch: 7th Layer Switch Provided with Full Setup and Report Tools", Interop Magazine, Jun. 1, 2000, vol. 10, No. 6, p. 148-150.
Sharifian et al. "An approximation-based load-balancing algorithm with admission control for cluster web servers with dynamic workloads", The Journal of Supercomputing, Kluwer Academic Publishers, BO, vol. 53, No. 3, Jul. 3, 2009.
Spatscheck et al., "Optimizing TCP Forwarder Performance", IEEE/ACM Transactions on Networking, vol. 8, No. 2, Apr. 2000.
Takahashi, "The Fundamentals of the Windows Network: Understanding the Mystery of the Windows Network from the Basics", Network Magazine, Jul. 1, 2006, vol. 11, No. 7, p. 32-35.
Yamamoto et al., "Performance Evaluation of Window Size in Proxy-based TCP for Multi-hop Wireless Networks," IPSJ SIG Technical Reports, May 15, 2008, vol. 2008, No. 44, pp. 109-114.

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
USRE49053E1 (en)*2006-02-212022-04-26A10 Networks, Inc.System and method for an adaptive TCP SYN cookie with time validation

Also Published As

Publication numberPublication date
US20070195792A1 (en)2007-08-23
USRE49053E1 (en)2022-04-26
US7675854B2 (en)2010-03-09
USRE44701E1 (en)2014-01-14

Similar Documents

PublicationPublication DateTitle
USRE49053E1 (en)System and method for an adaptive TCP SYN cookie with time validation
KR100431231B1 (en)Method and system for defeating tcp syn flooding attacks
US7584352B2 (en)Protection against denial of service attacks
Moskowitz et al.Host identity protocol version 2 (HIPv2)
JP4271451B2 (en) Method and apparatus for fragmenting and reassembling Internet key exchange data packets
US8984268B2 (en)Encrypted record transmission
CN101764799B (en) Establish a connection using a server capability profile
BellovinDefending against sequence number attacks
US8418242B2 (en)Method, system, and device for negotiating SA on IPv6 network
US20070283429A1 (en)Sequence number based TCP session proxy
US20120227088A1 (en)Method for authenticating communication traffic, communication system and protective apparatus
US8683572B1 (en)Method and apparatus for providing continuous user verification in a packet-based network
EP3442195B1 (en)Reliable and secure parsing of packets
WO2010000171A1 (en)Communication establishing method, system and device
US7536719B2 (en)Method and apparatus for preventing a denial of service attack during key negotiation
CN110392128A (en) Method and system for providing quasi-addressless IPv6 open world wide web service
Luo et al.A keyed-hashing based self-synchronization mechanism for port address hopping communication
CN109067774B (en)Security access system based on trust token and security access method thereof
CN102427452B (en)Synchronize (SYN) message transmitting method and device and network equipment
JP4183664B2 (en) Authentication method, server computer, client computer, and program
US8364949B1 (en)Authentication for TCP-based routing and management protocols
CN110417804B (en)Bidirectional identity authentication encryption communication method and system suitable for single-chip microcomputer implementation
Kim et al.Efficient design for secure multipath TCP against eavesdropper in initial handshake
Fung et al.A denial-of-service resistant public-key authentication and key establishment protocol
EP2753043A1 (en)Reverse authorized syn cookie

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:A10 NETWORKS, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHEN, LEE;SZETO, RONALD WAI LUN;HWANG, SHIH-TSUNG;REEL/FRAME:038101/0358

Effective date:20060217

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:12


[8]ページ先頭

©2009-2025 Movatter.jp