scispace - formally typeset
Patent

Method for thwarting application layer hypertext transport protocol flood attacks focused on consecutively similar application-specific data packets

Mehdi Mahvi
Reads0
Chats0
TLDR
In this article, the authors propose a methodology to thwart attacks that utilize consecutive hypertext transport protocol packets with similar structures, arriving from a plurality of computer systems on a network, such as the Internet, destined for a single or more computer system on a secondary network, at a rate with sufficient complexity to produce an effect on the target computer system or systems such that legitimate clients are denied access to requested services, thus creating a "denial of service" situation.
Abstract
The present invention provides a methodology to thwart attacks that utilize consecutive hypertext transport protocol packets with similar structures, arriving from a plurality of computer systems on a network, such as the Internet, destined for a single or more computer systems on a secondary network, at such a rate with sufficient complexity to produce an effect on the target computer system or systems such that legitimate clients are denied access to requested services, thus creating a “denial of service” situation. The methodology focuses on the dynamic and proactive reassessment of data packet payload content to maintain a running value of similarity or dissimilarity, thus permitting intermediary apparatuses that are performing this computation to create distinction between legitimate clients and illegitimate clients.

read more

Citations
More filters
Patent

Method and system for detecting dga-based malware

TL;DR: In this paper, a system and method for detecting a domain generation algorithm (DGA) comprising of processing processing associated with clustering, utilizing a name-based features clustering module accessing information from an electronic database of domain information, the randomly generated domain names based on the similarity in the make-up of the generated domains, performing processing associative clustering and clustering associated with determining the DGA that generated the clustered randomly generated domains.
Patent

MDL-based clustering for application dependency mapping

TL;DR: In this paper, the minimum description length principle (MDL) is used to determine an optimum number of clusters for the network using the minimum Description Length principle (DLP) score.
Patent

Policy-driven compliance

TL;DR: In this article, the authors propose a sensor network that provides multiple perspectives to monitor network data, host/endpoint data, process data, and user data for traffic, such as allowing traffic, denying traffic, configuring traffic for quality of service (QoS), or redirecting traffic along a specific route.
Patent

Operations, administration and management (oam) in overlay data center environments

TL;DR: In this article, the authors present a system for OAM in overlay networks, which can be coupled with the overlay network and can include a tunnel endpoint interface associated with an underlay address and an overlay address associated with a virtual interface.
References
More filters
Patent

Methods and apparatus for protecting against overload conditions on nodes of a distributed network

TL;DR: In this paper, the authors propose a mechanism to protect against and/or respond to an overload condition at a node ('victim') (H0-H4) in a distributed network by diverting traffic otherwise destined for the victim to one or more other nodes.
Patent

Denial of service attacks characterization

TL;DR: In this paper, a system architecture for thwarting denial-of-service attacks on a victim data center is described, which includes a first plurality of data monitors that monitor network traffic flow through the network.
Patent

Network overload detection and mitigation system and method

Barrett Lyon
TL;DR: In this paper, a system and method for detecting and/or mitigating an overload condition from one or more first computers, such as a distributed denial of service (DDoS) attack, viral attack, or the like, targeting a plurality of second computers located on a network.
Patent

Identifying a distributed denial of service (DDoS) attack within a network and defending against such an attack

TL;DR: In this paper, a packet metric parameter which might comprise the volume of packets received is analyzed over selected time intervals with respect to specified geographical locations in which the hosts transmitting the packets are located.
Patent

Method and system for overcoming denial of service attacks

TL;DR: In this article, a system for handling denial of service attacks on behalf of a shared network resource is presented, where a request processing component (201) deployed within a network, the request processing components having an interface configured to receive requests, and a rate control component comprising program and data structures operable to selectively forward received requests to the shared network Resource at a rate selected to prevent the shared resource from crashing or becoming undesirably busy.