摘要:
A method is disclosed for protecting a network against a denial-of-service attack by inspecting application layer messages at a network element. According to one aspect, when a network element intercepts data packets that contain an application layer message, the network element constructs the message from the payload portions of the packets. The network element determines whether the message satisfies specified criteria. The criteria may indicate characteristics of messages that are suspected to be involved in a denial-of-service attack, for example. If the message satisfies the specified criteria, then the network element prevents the data packets that contain the message from being received by the application for which the message was intended. The network element may accomplish this by dropping the packets, for example. As a result, the application's host does not waste processing resources on messages whose only purpose might be to deluge and overwhelm the application.
摘要:
Disclosed are systems and method for detecting a malicious computer system. An exemplary method comprises: collecting, via a processor, characteristics of a computer system; determining relations between collected characteristics of the computer system; determining a time dependency of at least one state of the computer system based on determined relations; determining the at least one state of the computer system based at least on determined time dependency; and analyzing the at least one state of the computer system in connection with selected patterns representing a legal or malicious computer system to determine a degree of harmfulness of the computer system.
摘要:
A denial-of-service protection system may include a memory operable to store a behavior model and a processor communicatively coupled to the memory. The processor is capable of detecting a potential attack on the system, and receiving a first request from an endpoint. In response to receiving the first request from the endpoint, the processor may communicate an error to the endpoint. The processor may also receive a second request, from the endpoint and determine whether the second request from the endpoint deviates from the behavior model. If the second request from the endpoint deviates from the behavior model, the processor may deny traffic from the endpoint. If the second request from the endpoint does not deviate from the behavior model, then the processor may allow traffic from the endpoint.
摘要:
A method for mitigating a denial of service attack includes determining, for a client (105), a number of requests (115) being transmitted to a server (110) and determining, for the client, that the number of requests for a time period is greater than a top talker threshold. The method includes classifying the client as a top talker based on the number of requests being greater than the top talker threshold and identifying, for the client, additional requests being transmitted to the server. The method also includes determining whether a number of the additional requests matches one or more attack patterns and preventing one or more of the additional requests from being transmitted to the server if the number of additional requests that matches one or more attack patterns is greater than a first threshold.
摘要:
A method (200) of detecting anomalies in a communication system (100), the method comprising: providing (202) a first packet flow portion (PFPl) and a second packet flow portion (PFP2); extracting (203) samples of a symbolic packet feature (x) associated to a traffic status of the first and second packet flow portions; computing (204) from said extracted samples a first statistical concentration quantity (Cq1) and a second statistical concentration quantity (Cq2) of the symbolic feature associated with the first and second packet flow portions, respectively; computing (205) from said concentration quantities a variation quantity (Δ) representing a concentration change from the first packet flow portion to the second packet flow portion; comparing (206) the variation quantity (Δ) with a comparison value (Thr); detecting (207) an anomaly in the system in response to said comparison.
摘要:
Systems (30), program product (91), and methods related to dynamic Internet security and risk assessment and management, are provided. For example, a system (30), program product (91), and method of identifying and servicing actual customer requests to a defended or protected computer or server (31) can include the steps/operations of receiving by the defended computer (31), a service request from each of a plurality of IP addresses associated with a separate one of a plurality of service requesting computers (71, 81), sending an inspection code adapted to perform a virtual attack on each existing service requesting computers (71, 81) at each respective associated IP address, and restricting provision of services from the defended computer (31) to a subset (81) of the service requesting computers (71, 81) identified for restriction when a security feature of the respective service requesting computer (71, 81) is determined to have been defeated by the virtual attack.
摘要:
The invention describes a method and system of protecting computer systems from attacks over a network to which the computer system is connected, the method comprising the steps of (a) establishing, during attack-free operation of the computer system, a database in the form of a source-IP-histogram storing all request received from all sender at the computer system; (b) calculating and storing a smoothed source-IP-histogram from the source-IP-histogram obtained in step a); (c) applying a probability threshold on the smoothed source-IP-histogram to differentiate between acceptable sender and sender to be rejected; (d) monitoring requests to the computer system; (e) accepting a new sender if its assumed probability value derived from the smoothed-IP-histogram exceeds the threshold.
摘要:
Disclosed is a method and system for identifying a controller of a first computer transmitting a network attack to an attacked computer. To identify an attacker implementing the attack on the attacked computer, the present invention traces the attack back to the controller one hop at a time. The invention examines traces of the attacked computer to identify the first computer. Traffic transmitted to the first computer is redirected through a monitoring complex before being transmitted to the first computer. The controller is then detected from traffic monitoring by the monitoring complex.
摘要:
A method of identifying traffic within a network representative of an abnormal network condition, including: monitoring a communications link for a high traffic volume level; identifying a domain being the source of the high traffic volume level; identifying within the domain, a sending entity transmitting traffic from the domain; using a detector located at or proximate to the domain to invoke a response from the sending entity; wherein a failure by the sending entity to provide an expected response to the message in accordance with a network protocol indicates that the traffic transmitted by the sending entity is traffic representative of an abnormal network condition.