Multi-device authentication
    1.
    发明授权

    公开(公告)号:US11632366B1

    公开(公告)日:2023-04-18

    申请号:US16582548

    申请日:2019-09-25

    申请人: F5 Networks, Inc.

    摘要: Technology related to multi-device authentication is disclosed. In one example, a method can include receiving a request from a requesting client device to access a secured server. A command can be sent to an authenticating device to capture environmental information in proximity to the authenticating device. The captured environmental information can be used to verify the requesting client device and the authenticating device are near each other. The received request can be forwarded to the secured server in response to verifying the requesting client device and the authenticating device are near each other.

    Methods for protecting CPU during DDoS attack and devices thereof

    公开(公告)号:US11539740B1

    公开(公告)日:2022-12-27

    申请号:US16266742

    申请日:2019-02-04

    申请人: F5 Networks, Inc.

    摘要: Methods, non-transitory computer readable media, and network traffic manager apparatus that assists with protecting a CPU during a DDOS attack includes monitoring network traffic data from plurality of client devices. Each of the plurality of client devices are classified as a valid device or a potential attacker device based on the monitoring. Next a determination of when CPU utilization of a network traffic manager apparatus is greater than a stored threshold value is made. The CPU utilization of the network traffic manager increases as a number of the plurality of client devices classified as the potential attacker device increases. One or more network actions are performed on the plurality of client devices classified as the potential attacker device to protect the CPU when the determination indicates the CPU utilization is greater than the stored threshold value.

    Methods for optimizing multimedia communication and devices thereof

    公开(公告)号:US11349981B1

    公开(公告)日:2022-05-31

    申请号:US17084064

    申请日:2020-10-29

    申请人: F5 Networks, Inc.

    IPC分类号: H04M3/02 H04L65/60 H04W76/12

    摘要: The technology discloses intercepting a request to initiate a call configured to utilize one of plurality of call initiation techniques. Next, it is determined when the one of the call initiation techniques in the intercepted request is in a subset of the plurality of call initiation techniques configured to integrate at least a part of media control negotiation and call establishment. One or more fields of the intercepted request is modified to disable the one of the plurality of call initiation techniques that is configured to integrate at least a part of media control negotiation and call establishment when the determination indicates the one of the plurality of call initiation techniques is in the subset. A permission is provided to the first mobile device to initiate the call with the second mobile device using a sequential call establishment and media control negotiation technique.

    SCHEDULING SERVICES ON A PLATFORM INCLUDING CONFIGURABLE RESOURCES

    公开(公告)号:US20220103445A1

    公开(公告)日:2022-03-31

    申请号:US17490639

    申请日:2021-09-30

    申请人: F5 Networks, Inc.

    摘要: Technology related to scheduling services on a platform including configurable computing resources is disclosed. In one example, a method includes scheduling a service to execute on a first computing node based on an availability of general-purpose computing resources at the first computing node. The first computing node can be selected from a plurality of computing nodes. Network traffic transiting the first computing node can be analyzed during the execution of the service to determine a hardware accelerator of a second computing node is capable of assisting the execution of the service. The service can be scheduled to execute on the second computing node and the hardware accelerator of the second computing node can be used to assist with the execution of the service.

    Methods for detecting and mitigating malicious network behavior and devices thereof

    公开(公告)号:US11122067B2

    公开(公告)日:2021-09-14

    申请号:US16534126

    申请日:2019-08-07

    申请人: F5 Networks, Inc.

    IPC分类号: H04L29/06

    摘要: Methods, non-transitory computer readable media, anomaly detection apparatuses, and network traffic management systems that generate, based on the application of one or more models and for a first flow associated with a received first set of network traffic, one or more likelihood scores and at least one flow score based on the likelihood scores. One or more of the one or more models are associated with one or more browsing patterns for a web application to which the first set of network traffic is directed. A determination is made when the flow score exceeds a threshold. A mitigation action is initiated, based on a stored policy, with respect to the first set of network traffic, when the determining indicates that the flow score exceeds the established threshold.

    SUBSCRIBER-AWARE NETWORK CONTROLLER

    公开(公告)号:US20210258248A1

    公开(公告)日:2021-08-19

    申请号:US16794390

    申请日:2020-02-19

    申请人: F5 Networks, Inc.

    IPC分类号: H04L12/725 H04L12/771

    摘要: Technology related to processing network packets in a subscriber-aware manner is disclosed. In one example, a method includes selecting one or more subscribers to move from a first network processing node to a second network processing node. In response to the selection, subscriber data associated with the one or more subscribers can be programmed at the second network processing node. After the subscriber data associated with the one or more subscribers is programmed on the second network processing node, a software defined network (SDN) switch can be reprogrammed to forward network traffic having network addresses associated with the one or more subscribers to the second network processing node instead of the first network processing node.

    Processing packets with returnable values

    公开(公告)号:US11019022B1

    公开(公告)日:2021-05-25

    申请号:US16774520

    申请日:2020-01-28

    申请人: F5 Networks, Inc.

    IPC分类号: H04L29/12 H04L29/08 H04L9/06

    摘要: Technology related to processing network packets with returnable values is disclosed. In one example, a method includes intercepting a Domain Name System (DNS) request including returnable request values in respective request packet fields. A hash function can be used to characterize or modify the intercepted returnable request values. The intercepted DNS request can be forwarded to a DNS server. A DNS response including returnable response values in respective response packet fields can be received. The returnable response values and the hash function can be used to determine whether the DNS response is legitimate. A legitimate DNS response can be forwarded to a client.

    Methods for server load balancing in a cloud environment using dynamic cloud pricing and devices thereof

    公开(公告)号:US10904323B2

    公开(公告)日:2021-01-26

    申请号:US16004279

    申请日:2018-06-08

    申请人: F5 Networks, Inc.

    IPC分类号: H04L12/26 H04L29/08

    摘要: The disclosed technology includes accessing a first network application programming interface exposed by a first cloud provider of the plurality of cloud providers to identify a first pricing profile, the first pricing profile associated with the first Cloud provider. Upon identifying the first pricing profile, accessing a second network application programming interface exposed by a second cloud provider of the plurality of cloud providers to identify a second pricing profile, the second pricing profile associated with the second Cloud provider. A load balancing decision is determined comparing the identified first pricing profile with the identified second pricing profile. Next, the determined load balancing decision is executed on a monitored computing-traffic.

    Methods and devices for automatically detecting attack signatures and generating attack signature identifications

    公开(公告)号:US10855701B2

    公开(公告)日:2020-12-01

    申请号:US16181042

    申请日:2018-11-05

    申请人: F5 Networks, Inc.

    IPC分类号: H04L29/06

    摘要: Network traffic management apparatuses, systems, methods, and computer-readable media for automatically detecting attack signatures and generating attack signature identifications, involving: collecting a stable dataset during a stable time; determining whether a cyber-attack is detected; when a cyber-attack is detected, periodically generating attack signatures and updating an enforcer with the attack signatures, the attack signatures representing dynamic rules to be enforced; validating the dynamic rules via a long-time validation mechanism, validating involving considering behavior of each dynamic rule after the cyber-attack and during a new cyber-attack and ranking each dynamic rule using the stable dataset, thereby generating persistent rules having a dynamic rule; exporting the persistent rules to a security enforcer; introducing the persistent rules to a persistent rule revocater; determining whether export of an unrevoked persistent rule is requested; and if requested, exporting the unrevoked persistent rule of the persistent rules through a mitigator and collecting statistics.

    Methods for preventing DDoS attack based on adaptive self learning of session and transport layers and devices thereof

    公开(公告)号:US10834110B1

    公开(公告)日:2020-11-10

    申请号:US15382668

    申请日:2016-12-18

    申请人: F5 Networks, Inc.

    IPC分类号: H04L29/06

    摘要: A method, non-transitory computer readable medium, and device includes monitoring a session layer and transport layer network traffic data received from a plurality of client computing devices and plurality of servers. A plurality of network traffic anomaly threshold values and a plurality of server health anomaly threshold values for the monitored session layer and the transport layer network traffic data are estimated. Whether a plurality of current network traffic anomaly values and a plurality of current server health anomaly values for the monitored network traffic data exceeds each of the corresponding estimated plurality of network traffic anomaly threshold values and the estimated plurality of server health anomaly threshold values, and whether the current plurality of network traffic anomaly values and the current plurality of server health anomaly values are not a false anomaly is determined. A mitigation action is initiated based on the determination.