Event driven route control
    11.
    发明授权

    公开(公告)号:US10999319B2

    公开(公告)日:2021-05-04

    申请号:US16449916

    申请日:2019-06-24

    Abstract: Embodiments provide system and methods for a DDoS service using a mix of mitigation systems (also called scrubbing centers) and non-mitigation systems. The non-mitigation systems are less expensive and thus can be placed at or near a customer's network resource (e.g., a computer, cluster of computers, or entire network). Under normal conditions, traffic for a customer's resource can go through a mitigation system or a non-mitigation system. When an attack is detected, traffic that would have otherwise gone through a non-mitigation system is re-routed to a mitigation system. Thus, the non-mitigation systems can be used to reduce latency and provide more efficient access to the customer's network resource during normal conditions. Since the non-mitigation servers are not equipped to respond to an attack, the non-mitigation systems are not used during an attack, thereby still providing protection to the customer network resource using the mitigation systems.

    MANAGING TRAFFIC CONTROL IN A NETWORK MITIGATING DDOS

    公开(公告)号:US20200267177A1

    公开(公告)日:2020-08-20

    申请号:US16861269

    申请日:2020-04-29

    Abstract: Embodiments are provided for managing routes of data traffic within a network. The management may be performed via a graphical user interface that interacts with a Web server to update a configuration file. The configuration file can be converted to router management commands by a network management device (e.g., a BGP speaker). The commands can then be sent to border routers for controlling network traffic. Embodiments are also provided for capturing and logging routing updates made in a network.

    IDENTIFYING A POTENTIAL DDOS ATTACK USING STATISTICAL ANALYSIS

    公开(公告)号:US20200169582A1

    公开(公告)日:2020-05-28

    申请号:US16704626

    申请日:2019-12-05

    Abstract: Embodiments can identify requests that may be tied to a DDOS attack. For example, the primary identifiers (e.g., a source address) of requests for a network resource (e.g., an entire website or a particular element of the website) can be tracked. In one embodiment, a statistical analysis of how often a particular source address (or other primary identifier) normally makes a request can be used to identify source addresses that make substantially more requests. A normal amount can correspond to an average number of request that a source address makes. According to some embodiments, a system can use statistical analysis methods on various request data in web server logs to identify potential attacks and send data concerned potential attacks to an HBA system for further analysis.

    EVENT DRIVEN ROUTE CONTROL
    15.
    发明申请

    公开(公告)号:US20180007086A1

    公开(公告)日:2018-01-04

    申请号:US15707772

    申请日:2017-09-18

    CPC classification number: H04L63/1458 H04L63/20

    Abstract: Embodiments provide system and methods for a DDoS service using a mix of mitigation systems (also called scrubbing centers) and non-mitigation systems. The non-mitigation systems are less expensive and thus can be placed at or near a customer's network resource (e.g., a computer, cluster of computers, or entire network). Under normal conditions, traffic for a customer's resource can go through a mitigation system or a non-mitigation system. When an attack is detected, traffic that would have otherwise gone through a non-mitigation system is re-routed to a mitigation system. Thus, the non-mitigation systems can be used to reduce latency and provide more efficient access to the customer's network resource during normal conditions. Since the non-mitigation servers are not equipped to respond to an attack, the non-mitigation systems are not used during an attack, thereby still providing protection to the customer network resource using the mitigation systems.

    EVENT DRIVEN ROUTE CONTROL
    17.
    发明申请
    EVENT DRIVEN ROUTE CONTROL 有权
    事件驱动路由控制

    公开(公告)号:US20160080412A1

    公开(公告)日:2016-03-17

    申请号:US14852518

    申请日:2015-09-12

    CPC classification number: H04L63/1458 H04L63/20

    Abstract: Embodiments provide system and methods for a DDoS service using a mix of mitigation systems (also called scrubbing centers) and non-mitigation systems. The non-mitigation systems are less expensive and thus can be placed at or near a customer's network resource (e.g., a computer, cluster of computers, or entire network). Under normal conditions, traffic for a customer's resource can go through a mitigation system or a non-mitigation system. When an attack is detected, traffic that would have otherwise gone through a non-mitigation system is re-routed to a mitigation system. Thus, the non-mitigation systems can be used to reduce latency and provide more efficient access to the customer's network resource during normal conditions. Since the non-mitigation servers are not equipped to respond to an attack, the non-mitigation systems are not used during an attack, thereby still providing protection to the customer network resource using the mitigation systems.

    Abstract translation: 实施例提供了使用缓解系统(也称为洗涤中心)和非缓解系统的混合的DDoS服务的系统和方法。 非缓解系统较便宜,因此可以放置在客户的网络资源(例如,计算机,计算机集群或整个网络)或附近。 在正常情况下,客户资源的流量可以通过缓解系统或非缓解系统。 当检测到攻击时,否则将通过非缓解系统的流量被重新路由到缓解系统。 因此,非缓解系统可用于在正常情况下减少延迟并提供对客户网络资源的更有效的访问。 由于非缓解服务器没有配备来应对攻击,所以在攻击期间不使用非缓解系统,从而仍然使用缓解系统为客户网络资源提供保护。

    EVENT DRIVEN ROUTE CONTROL
    20.
    发明申请

    公开(公告)号:US20210243225A1

    公开(公告)日:2021-08-05

    申请号:US17239745

    申请日:2021-04-26

    Abstract: Embodiments provide system and methods for a DDoS service using a mix of mitigation systems (also called scrubbing centers) and non-mitigation systems. The non-mitigation systems are less expensive and thus can be placed at or near a customer's network resource (e.g., a computer, cluster of computers, or entire network). Under normal conditions, traffic for a customer's resource can go through a mitigation system or a non-mitigation system. When an attack is detected, traffic that would have otherwise gone through a non-mitigation system is re-routed to a mitigation system. Thus, the non-mitigation systems can be used to reduce latency and provide more efficient access to the customer's network resource during normal conditions. Since the non-mitigation servers are not equipped to respond to an attack, the non-mitigation systems are not used during an attack, thereby still providing protection to the customer network resource using the mitigation systems.

Patent Agency Ranking