Identifying sources of network attacks

    公开(公告)号:US09794281B1

    公开(公告)日:2017-10-17

    申请号:US14864684

    申请日:2015-09-24

    CPC classification number: H04L63/1458 H04L61/1511 H04L63/1416

    Abstract: Systems and methods are described to enable identification of computing devices associated with network attacks, such as denial of service attacks. Data packets used to execute a network attack often include forged source address information, such that the address of an attacker is difficult or impossible to determine based on those data packets. However, attackers generally provide legitimate address information when resolving an identifier, such as a universal resource identifier (URI), of an attack target into corresponding destination addresses. The application enables individual client computing devices to be provided with different combinations of destination addresses, such that when an attack is detected on a given combination of destination address, the client computing device to which that combination of destination addresses was provided can be identified as a source of the attack.

    Mitigating network attacks
    22.
    发明授权

    公开(公告)号:US09742795B1

    公开(公告)日:2017-08-22

    申请号:US14864683

    申请日:2015-09-24

    CPC classification number: H04L63/1441 H04L63/0218 H04L63/1416 H04L63/1458

    Abstract: Systems and methods are described that enable the mitigation of network attacks directed to specific sets of content on a content delivery system. A set of content targeted in the attack may be identified based at least in part on a combination of network addresses to which attacked-related packets are transmitted. Thereafter, the content delivery system may mitigate the attack based on the identified target. For example, where both targeted and non-targeted sets of content are associated with the attacked network addresses, traffic directed to these sets of content may be separated, e.g., in order to reduce the impact of the attack on the non-targeted sets of content or increase the computing resources available to the targeted content. Redirection of traffic may occur using either or both of resolution-based redirection or routing-based redirection.

Patent Agency Ranking