Patent
Method for thwarting application layer hypertext transport protocol flood attacks focused on consecutively similar application-specific data packets
Reads0
Chats0
TLDR
In this article, the authors propose a methodology to thwart attacks that utilize consecutive hypertext transport protocol packets with similar structures, arriving from a plurality of computer systems on a network, such as the Internet, destined for a single or more computer system on a secondary network, at a rate with sufficient complexity to produce an effect on the target computer system or systems such that legitimate clients are denied access to requested services, thus creating a "denial of service" situation.Abstract:
The present invention provides a methodology to thwart attacks that utilize consecutive hypertext transport protocol packets with similar structures, arriving from a plurality of computer systems on a network, such as the Internet, destined for a single or more computer systems on a secondary network, at such a rate with sufficient complexity to produce an effect on the target computer system or systems such that legitimate clients are denied access to requested services, thus creating a “denial of service” situation. The methodology focuses on the dynamic and proactive reassessment of data packet payload content to maintain a running value of similarity or dissimilarity, thus permitting intermediary apparatuses that are performing this computation to create distinction between legitimate clients and illegitimate clients.read more
Citations
More filters
Patent
System for monitoring and managing datacenters
Navindra Yadav,Abhishek Ranjan Singh,Shashidhar Gandham,Ellen Christine Scheib,Omid Madani,Ali Parandehgheibi,Jackson Ngoc Ki Pang,Vimalkumar Jeyakumar,Michael Standish Watts,Hoang Viet Nguyen,Khawar Deen,Rohit Chandra Prasad,Sunil Gupta,Supreeth Rao,Anubhav Gupta,Ashutosh Kulshreshtha,Roberto Fernando Spadaro,Hai Trong Vu,Varun Sagar Malhotra,Shih-Chun Chang,Bharathwaj Sankara Viswanathan,Fnu Rachita Agasthy,Duane Thomas Barlow +22 more
TL;DR: In this article, an example method includes detecting, using sensors, packets throughout a datacenter and sending packet logs to various collectors which can then identify and summarize data flows in the data center.
Patent
Method and system for detecting dga-based malware
TL;DR: In this paper, a system and method for detecting a domain generation algorithm (DGA) comprising of processing processing associated with clustering, utilizing a name-based features clustering module accessing information from an electronic database of domain information, the randomly generated domain names based on the similarity in the make-up of the generated domains, performing processing associative clustering and clustering associated with determining the DGA that generated the clustered randomly generated domains.
Patent
MDL-based clustering for application dependency mapping
Ellen Christine Scheib,Ali Parandehgheibi,Omid Madani,Vimalkumar Jeyakumar,Navindra Yadav,Mohammadreza Alizadeh Attar +5 more
TL;DR: In this paper, the minimum description length principle (MDL) is used to determine an optimum number of clusters for the network using the minimum Description Length principle (DLP) score.
Patent
Policy-driven compliance
Sunil Gupta,Navindra Yadav,Michael Standish Watts,Ali Parandehgheibi,Shashidhar Gandham,Ashutosh Kulshreshtha,Khawar Deen +6 more
TL;DR: In this article, the authors propose a sensor network that provides multiple perspectives to monitor network data, host/endpoint data, process data, and user data for traffic, such as allowing traffic, denying traffic, configuring traffic for quality of service (QoS), or redirecting traffic along a specific route.
Patent
Operations, administration and management (oam) in overlay data center environments
TL;DR: In this article, the authors present a system for OAM in overlay networks, which can be coupled with the overlay network and can include a tunnel endpoint interface associated with an underlay address and an overlay address associated with a virtual interface.
References
More filters
Patent
Methods and apparatus for protecting against overload conditions on nodes of a distributed network
TL;DR: In this paper, the authors propose a mechanism to protect against and/or respond to an overload condition at a node ('victim') (H0-H4) in a distributed network by diverting traffic otherwise destined for the victim to one or more other nodes.
Patent
Denial of service attacks characterization
TL;DR: In this paper, a system architecture for thwarting denial-of-service attacks on a victim data center is described, which includes a first plurality of data monitors that monitor network traffic flow through the network.
Patent
Network overload detection and mitigation system and method
TL;DR: In this paper, a system and method for detecting and/or mitigating an overload condition from one or more first computers, such as a distributed denial of service (DDoS) attack, viral attack, or the like, targeting a plurality of second computers located on a network.
Patent
Identifying a distributed denial of service (DDoS) attack within a network and defending against such an attack
TL;DR: In this paper, a packet metric parameter which might comprise the volume of packets received is analyzed over selected time intervals with respect to specified geographical locations in which the hosts transmitting the packets are located.
Patent
Method and system for overcoming denial of service attacks
TL;DR: In this article, a system for handling denial of service attacks on behalf of a shared network resource is presented, where a request processing component (201) deployed within a network, the request processing components having an interface configured to receive requests, and a rate control component comprising program and data structures operable to selectively forward received requests to the shared network Resource at a rate selected to prevent the shared resource from crashing or becoming undesirably busy.