Patent
Identifying a Denial-of-Service Attack in a Cloud-Based Proxy Service
Lee Hahn Holloway,Srikanth N. Rao,Matthew Browning Prince,Matthieu Philippe François Tourne,Ian Gerald Pye,Ray Raymond Bejjani,Terry Paul Rodery +6 more
Reads0
Chats0
TLDR
In this article, a cloud-based proxy service identifies a denial-of-service (DoS) attack including determining that there is a potential DoS attack being directed to an IP address of the cloud based proxy service.Abstract:
A cloud-based proxy service identifies a denial-of-service (DoS) attack including determining that there is a potential DoS attack being directed to an IP address of the cloud-based proxy service; and responsive to determining that there are a plurality of domains that resolve to that IP address, identifying the one of the plurality of domains that is the target of the DoS attack. The domain that is under attack is identified by scattering the plurality of domains to resolve to different IP addresses, where a result of the scattering is that each of those domains resolves to a different IP address, and identifying one of those plurality of domains as the target of the DoS attack by determining that there is an abnormally high amount of traffic being directed to the IP address in which that domain resolves.read more
Citations
More filters
Patent
Automated profiling of resource usage
TL;DR: In this paper, operating profiles for consumers of computing resources may be automatically determined based on an analysis of actual resource usage measurements and other operating metrics and assignment decisions may be made based on the profiles, and computing resources can be reallocated or oversubscribed if the profiles indicate that the consumers are unlikely to fully utilize the resources reserved for them.
Patent
Apparatus and method for automated privacy protection in distributed images
TL;DR: In this paper, a facial recognition technique is executed against an individual face within the image to obtain a recognized face, where the privacy rules are associated with privacy settings for a user associated with the recognized face.
Patent
Managing resources using resource expiration data
TL;DR: In this article, cache optimization techniques are employed to organize resources within caches such that the most requested content (e.g., the most popular content) is more readily available, and the resources propagate through a cache server hierarchy associated with the service provider.
Patent
Request routing utilizing client location information
TL;DR: In this paper, a system, method, and computer-readable medium for request routing based on client location information are provided, where a content delivery network service provider receives a DNS query from a client computing device.
Patent
Geolocation-based pictographs
TL;DR: In this paper, a system and method for geolocation-based pictographs are provided, in which a pictograph is identified based on the current geolocations of the user device.
References
More filters
Patent
Internet server access control and monitoring systems
Thomas Mark Levergood,Lawrence C. Stewart,Stephen Jeffrey Morris,Andrew C. Payne,George Winfield Treese +4 more
TL;DR: In this paper, the authors describe a system for controlling and monitoring access to network servers that includes client-server sessions over the Internet, where when the user attempts to access an access-controlled file, the server subjects the request to a secondary server which determines whether the client has an authorization or valid account.
Patent
Method and System for Managing Computer Security Information
Timothy P. Farley,John M. Hammer,Bryan Douglas Williams,Philip Charles Brass,George C. Young,Derek John Mezack +5 more
TL;DR: In this article, the authors present a fusion engine that can identify relationships between one or more real-time, raw computer events as they are received in realtime, and assess and rank the risk of realtime raw events as well as mature correlation events.
Patent
Active e-mail filter with challenge-response
TL;DR: In this article, an active filter installed in or cooperating with the user's e-mail system sends a challenge e mail back to the sender address, where the question is such that only humans can interpret and respond to it correctly.
Patent
Proximity-based redirection system for robust and scalable service-node location in an internetwork
TL;DR: In this paper, a proximity-oriented redirection system for service-to-client attachment in a virtual overlay distribution network is proposed, where a packet of data is routed from a source node to a destination node based on address fields of the packet.
Patent
System and method for source IP anti-spoofing security
TL;DR: In this article, a system and method that provides for using source IP addresses and MAC addresses in a network to provide security against attempts by users of the network to use false source IP address in data packets is presented.