scispace - formally typeset
Patent

Identifying a Denial-of-Service Attack in a Cloud-Based Proxy Service

Reads0
Chats0
TLDR
In this article, a cloud-based proxy service identifies a denial-of-service (DoS) attack including determining that there is a potential DoS attack being directed to an IP address of the cloud based proxy service.
Abstract
A cloud-based proxy service identifies a denial-of-service (DoS) attack including determining that there is a potential DoS attack being directed to an IP address of the cloud-based proxy service; and responsive to determining that there are a plurality of domains that resolve to that IP address, identifying the one of the plurality of domains that is the target of the DoS attack. The domain that is under attack is identified by scattering the plurality of domains to resolve to different IP addresses, where a result of the scattering is that each of those domains resolves to a different IP address, and identifying one of those plurality of domains as the target of the DoS attack by determining that there is an abnormally high amount of traffic being directed to the IP address in which that domain resolves.

read more

Citations
More filters
Patent

Automated profiling of resource usage

TL;DR: In this paper, operating profiles for consumers of computing resources may be automatically determined based on an analysis of actual resource usage measurements and other operating metrics and assignment decisions may be made based on the profiles, and computing resources can be reallocated or oversubscribed if the profiles indicate that the consumers are unlikely to fully utilize the resources reserved for them.
Patent

Apparatus and method for automated privacy protection in distributed images

TL;DR: In this paper, a facial recognition technique is executed against an individual face within the image to obtain a recognized face, where the privacy rules are associated with privacy settings for a user associated with the recognized face.
Patent

Managing resources using resource expiration data

TL;DR: In this article, cache optimization techniques are employed to organize resources within caches such that the most requested content (e.g., the most popular content) is more readily available, and the resources propagate through a cache server hierarchy associated with the service provider.
Patent

Request routing utilizing client location information

TL;DR: In this paper, a system, method, and computer-readable medium for request routing based on client location information are provided, where a content delivery network service provider receives a DNS query from a client computing device.
Patent

Geolocation-based pictographs

TL;DR: In this paper, a system and method for geolocation-based pictographs are provided, in which a pictograph is identified based on the current geolocations of the user device.
References
More filters
Patent

Internet server access control and monitoring systems

TL;DR: In this paper, the authors describe a system for controlling and monitoring access to network servers that includes client-server sessions over the Internet, where when the user attempts to access an access-controlled file, the server subjects the request to a secondary server which determines whether the client has an authorization or valid account.
Patent

Method and System for Managing Computer Security Information

TL;DR: In this article, the authors present a fusion engine that can identify relationships between one or more real-time, raw computer events as they are received in realtime, and assess and rank the risk of realtime raw events as well as mature correlation events.
Patent

Active e-mail filter with challenge-response

Brian Wilson
TL;DR: In this article, an active filter installed in or cooperating with the user's e-mail system sends a challenge e mail back to the sender address, where the question is such that only humans can interpret and respond to it correctly.
Patent

Proximity-based redirection system for robust and scalable service-node location in an internetwork

TL;DR: In this paper, a proximity-oriented redirection system for service-to-client attachment in a virtual overlay distribution network is proposed, where a packet of data is routed from a source node to a destination node based on address fields of the packet.
Patent

System and method for source IP anti-spoofing security

TL;DR: In this article, a system and method that provides for using source IP addresses and MAC addresses in a network to provide security against attempts by users of the network to use false source IP address in data packets is presented.