-
公开(公告)号:US20230269270A1
公开(公告)日:2023-08-24
申请号:US18306877
申请日:2023-04-25
Applicant: Netflix, Inc.
Inventor: Randall Stewart
IPC: H04L9/40 , H04W12/108 , H04W12/122
CPC classification number: H04L63/1458 , H04L63/1425 , H04W12/108 , H04W12/122 , H04L2463/141 , H04W12/102
Abstract: The disclosed computer-implemented method includes applying transport protocol heuristics to selective acknowledgement (SACK) messages received at a network adapter from a network node. The transport protocol heuristics identify threshold values for operational functions that are performed when processing the SACK messages. The method further includes determining, by applying the transport protocol heuristics to the SACK messages received from the network node, that the threshold values for the transport protocol heuristics have been reached. In response to determining that the threshold values have been reached, the method includes identifying the network node as a security threat and taking remedial actions to mitigate the security threat. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US11122075B2
公开(公告)日:2021-09-14
申请号:US16576556
申请日:2019-09-19
Applicant: Netflix, Inc.
Inventor: Randall Stewart
IPC: H04L29/06 , H04W12/108 , H04W12/122 , H04W12/102 , H04W12/00 , H04W12/30 , H04W12/10
Abstract: The disclosed computer-implemented method includes applying transport protocol heuristics to selective acknowledgement (SACK) messages received at a network adapter from a network node. The transport protocol heuristics identify threshold values for operational functions that are performed when processing the SACK messages. The method further includes determining, by applying the transport protocol heuristics to the SACK messages received from the network node, that the threshold values for the transport protocol heuristics have been reached. In response to determining that the threshold values have been reached, the method includes identifying the network node as a security threat and taking remedial actions to mitigate the security threat. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US11683339B2
公开(公告)日:2023-06-20
申请号:US17399047
申请日:2021-08-11
Applicant: Netflix, Inc.
Inventor: Randall Stewart
IPC: H04L9/40 , H04W12/108 , H04W12/122 , H04W12/10 , H04W12/30 , H04W12/102 , H04W12/00
CPC classification number: H04L63/1458 , H04L63/1425 , H04W12/108 , H04W12/122 , H04L2463/141 , H04W12/00 , H04W12/10 , H04W12/102 , H04W12/30
Abstract: The disclosed computer-implemented method includes applying transport protocol heuristics to selective acknowledgement (SACK) messages received at a network adapter from a network node. The transport protocol heuristics identify threshold values for operational functions that are performed when processing the SACK messages. The method further includes determining, by applying the transport protocol heuristics to the SACK messages received from the network node, that the threshold values for the transport protocol heuristics have been reached. In response to determining that the threshold values have been reached, the method includes identifying the network node as a security threat and taking remedial actions to mitigate the security threat. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US20210006590A1
公开(公告)日:2021-01-07
申请号:US16576556
申请日:2019-09-19
Applicant: Netflix, Inc.
Inventor: Randall Stewart
IPC: H04L29/06
Abstract: The disclosed computer-implemented method includes applying transport protocol heuristics to selective acknowledgement (SACK) messages received at a network adapter from a network node. The transport protocol heuristics identify threshold values for operational functions that are performed when processing the SACK messages. The method further includes determining, by applying the transport protocol heuristics to the SACK messages received from the network node, that the threshold values for the transport protocol heuristics have been reached. In response to determining that the threshold values have been reached, the method includes identifying the network node as a security threat and taking remedial actions to mitigate the security threat. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US11985164B2
公开(公告)日:2024-05-14
申请号:US18306877
申请日:2023-04-25
Applicant: Netflix, Inc.
Inventor: Randall Stewart
IPC: H04L9/40 , H04W12/10 , H04W12/108 , H04W12/122 , H04W12/30 , H04W12/00 , H04W12/102
CPC classification number: H04L63/1458 , H04L63/1425 , H04W12/108 , H04W12/122 , H04L2463/141 , H04W12/00 , H04W12/10 , H04W12/102 , H04W12/30
Abstract: The disclosed computer-implemented method includes applying transport protocol heuristics to selective acknowledgement (SACK) messages received at a network adapter from a network node. The transport protocol heuristics identify threshold values for operational functions that are performed when processing the SACK messages. The method further includes determining, by applying the transport protocol heuristics to the SACK messages received from the network node, that the threshold values for the transport protocol heuristics have been reached. In response to determining that the threshold values have been reached, the method includes identifying the network node as a security threat and taking remedial actions to mitigate the security threat. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US20210367968A1
公开(公告)日:2021-11-25
申请号:US17399047
申请日:2021-08-11
Applicant: Netflix, Inc.
Inventor: Randall Stewart
IPC: H04L29/06 , H04W12/108 , H04W12/122
Abstract: The disclosed computer-implemented method includes applying transport protocol heuristics to selective acknowledgement (SACK) messages received at a network adapter from a network node. The transport protocol heuristics identify threshold values for operational functions that are performed when processing the SACK messages. The method further includes determining, by applying the transport protocol heuristics to the SACK messages received from the network node, that the threshold values for the transport protocol heuristics have been reached. In response to determining that the threshold values have been reached, the method includes identifying the network node as a security threat and taking remedial actions to mitigate the security threat. Various other methods, systems, and computer-readable media are also disclosed.
-
-
-
-
-