ATTACK MITIGATION IN A PACKET-SWITCHED NETWORK

    公开(公告)号:US20230269270A1

    公开(公告)日:2023-08-24

    申请号:US18306877

    申请日:2023-04-25

    Applicant: Netflix, Inc.

    Inventor: Randall Stewart

    Abstract: The disclosed computer-implemented method includes applying transport protocol heuristics to selective acknowledgement (SACK) messages received at a network adapter from a network node. The transport protocol heuristics identify threshold values for operational functions that are performed when processing the SACK messages. The method further includes determining, by applying the transport protocol heuristics to the SACK messages received from the network node, that the threshold values for the transport protocol heuristics have been reached. In response to determining that the threshold values have been reached, the method includes identifying the network node as a security threat and taking remedial actions to mitigate the security threat. Various other methods, systems, and computer-readable media are also disclosed.

    Attack mitigation in a packet-switched network

    公开(公告)号:US11122075B2

    公开(公告)日:2021-09-14

    申请号:US16576556

    申请日:2019-09-19

    Applicant: Netflix, Inc.

    Inventor: Randall Stewart

    Abstract: The disclosed computer-implemented method includes applying transport protocol heuristics to selective acknowledgement (SACK) messages received at a network adapter from a network node. The transport protocol heuristics identify threshold values for operational functions that are performed when processing the SACK messages. The method further includes determining, by applying the transport protocol heuristics to the SACK messages received from the network node, that the threshold values for the transport protocol heuristics have been reached. In response to determining that the threshold values have been reached, the method includes identifying the network node as a security threat and taking remedial actions to mitigate the security threat. Various other methods, systems, and computer-readable media are also disclosed.

    ATTACK MITIGATION IN A PACKET-SWITCHED NETWORK

    公开(公告)号:US20210006590A1

    公开(公告)日:2021-01-07

    申请号:US16576556

    申请日:2019-09-19

    Applicant: Netflix, Inc.

    Inventor: Randall Stewart

    Abstract: The disclosed computer-implemented method includes applying transport protocol heuristics to selective acknowledgement (SACK) messages received at a network adapter from a network node. The transport protocol heuristics identify threshold values for operational functions that are performed when processing the SACK messages. The method further includes determining, by applying the transport protocol heuristics to the SACK messages received from the network node, that the threshold values for the transport protocol heuristics have been reached. In response to determining that the threshold values have been reached, the method includes identifying the network node as a security threat and taking remedial actions to mitigate the security threat. Various other methods, systems, and computer-readable media are also disclosed.

    ATTACK MITIGATION IN A PACKET-SWITCHED NETWORK

    公开(公告)号:US20210367968A1

    公开(公告)日:2021-11-25

    申请号:US17399047

    申请日:2021-08-11

    Applicant: Netflix, Inc.

    Inventor: Randall Stewart

    Abstract: The disclosed computer-implemented method includes applying transport protocol heuristics to selective acknowledgement (SACK) messages received at a network adapter from a network node. The transport protocol heuristics identify threshold values for operational functions that are performed when processing the SACK messages. The method further includes determining, by applying the transport protocol heuristics to the SACK messages received from the network node, that the threshold values for the transport protocol heuristics have been reached. In response to determining that the threshold values have been reached, the method includes identifying the network node as a security threat and taking remedial actions to mitigate the security threat. Various other methods, systems, and computer-readable media are also disclosed.

Patent Agency Ranking