MANAGING TRAFFIC CONTROL IN A NETWORK MITIGATING DDOS

    公开(公告)号:US20190081978A1

    公开(公告)日:2019-03-14

    申请号:US16189580

    申请日:2018-11-13

    Abstract: Embodiments are provided for managing routes of data traffic within a network. The management may be performed via a graphical user interface that interacts with a Web server to update a configuration file. The configuration file can be converted to router management commands by a network management device (e.g., a BGP speaker). The commands can then be sent to border routers for controlling network traffic. Embodiments are also provided for capturing and logging routing updates made in a network.

    Managing traffic control in a network mitigating DDOS

    公开(公告)号:US10129293B2

    公开(公告)日:2018-11-13

    申请号:US14991024

    申请日:2016-01-08

    Abstract: Embodiments are provided for managing routes of data traffic within a network. The management may be performed via a graphical user interface that interacts with a Web server to update a configuration file. The configuration file can be converted to router management commands by a network management device (e.g., a BGP speaker). The commands can then be sent to border routers for controlling network traffic. Embodiments are also provided for capturing and logging routing updates made in a network.

    Event driven route control
    43.
    发明授权

    公开(公告)号:US09769202B2

    公开(公告)日:2017-09-19

    申请号:US14852518

    申请日:2015-09-12

    CPC classification number: H04L63/1458 H04L63/20

    Abstract: Embodiments provide system and methods for a DDoS service using a mix of mitigation systems (also called scrubbing centers) and non-mitigation systems. The non-mitigation systems are less expensive and thus can be placed at or near a customer's network resource (e.g., a computer, cluster of computers, or entire network). Under normal conditions, traffic for a customer's resource can go through a mitigation system or a non-mitigation system. When an attack is detected, traffic that would have otherwise gone through a non-mitigation system is re-routed to a mitigation system. Thus, the non-mitigation systems can be used to reduce latency and provide more efficient access to the customer's network resource during normal conditions. Since the non-mitigation servers are not equipped to respond to an attack, the non-mitigation systems are not used during an attack, thereby still providing protection to the customer network resource using the mitigation systems.

    MANAGING TRAFFIC CONTROL IN A NETWORK MITIGATING DDOS
    45.
    发明申请
    MANAGING TRAFFIC CONTROL IN A NETWORK MITIGATING DDOS 审中-公开
    管理DDOS网络中的流量控制

    公开(公告)号:US20160119187A1

    公开(公告)日:2016-04-28

    申请号:US14920465

    申请日:2015-10-22

    Inventor: Robert Smith

    Abstract: Embodiments are provided for managing routes of data traffic within a network. The management may be performed via a graphical user interface that interacts with a Web server to update a configuration file. The configuration file can be converted to router management commands by a network management device (e.g., a BGP speaker). The commands can then be sent to a border routers for controlling network traffic. Embodiments are also provided for capturing and logging routing updates made in a network.

    Abstract translation: 提供了用于管理网络内的数据业务的路由的实施例。 管理可以通过与Web服务器交互以更新配置文件的图形用户界面来执行。 配置文件可以由网络管理设备(例如,BGP扬声器)转换为路由器管理命令。 然后可以将命令发送到边界路由器以控制网络流量。 还提供了用于捕获和记录在网络中进行的路由更新的实施例。

    BLOCKING FORGIVENESS FOR DDOS
    46.
    发明申请
    BLOCKING FORGIVENESS FOR DDOS 审中-公开
    阻止DDOS阻止

    公开(公告)号:US20160080413A1

    公开(公告)日:2016-03-17

    申请号:US14852519

    申请日:2015-09-12

    Abstract: Techniques are provided for blocking forgiveness in a system that mitigates distributed denial of service (DDoS) attacks on a network. A user's network address can be blocked as a result performing human behavior analysis on network resource request activity from the user's address. The system can block an address temporarily based on their behavior, classifying legitimate human users as a malicious attacker performing a DDoS attack. But subsequent behavioral analysis of network resource requests can identify that the user should not have been blocked. The system can automatically unblock the user's address, and allow further network resource requests. Previously blocked requests can also be unblocked. The number of infractions (e.g., action classified as malicious) can be tracked and compared to a threshold. If the number is less than the threshold, then that address is not blocked, thereby allowing forgiveness of a certain number of infractions.

    Abstract translation: 提供了技术来阻止系统中的宽恕,以减轻网络上的分布式拒绝服务(DDoS)攻击。 可以阻止用户的网络地址,从用户地址对网络资源请求活动进行人为行为分析。 系统可以根据其行为暂时阻止地址,将合法的用户分类为执行DDoS攻击的恶意攻击者。 但网络资源请求的后续行为分析可以识别用户不应该被阻止。 系统可以自动取消阻止用户的地址,并允许进一步的网络资源请求。 先前阻止的请求也可以被解除封锁。 可以跟踪违规的数量(例如,分类为恶意的动作)并将其与阈值进行比较。 如果数字小于阈值,则该地址不被阻止,从而允许宽恕一定数量的违规。

Patent Agency Ranking