System and method for location, time-of-day, and quality-of-service based prioritized access control
    1.
    发明授权
    System and method for location, time-of-day, and quality-of-service based prioritized access control 有权
    用于定位,时间和基于服务质量的优先级访问控制的系统和方法

    公开(公告)号:US08644159B2

    公开(公告)日:2014-02-04

    申请号:US13557909

    申请日:2012-07-25

    摘要: A priority server for a provider network includes a traffic volume detection module, a traffic analyzer module, and a rules module. The traffic volume detection module receives operational information from the provider network and determines that a host is experiencing a flash event based upon the operational information. The traffic analyzer module determines that the flash event is not a distributed denial of service attack on the host. When it is determined that the flash event is not a distributed denial of service attack, the rules module provides a priority rule to an access router that is coupled to the host.

    摘要翻译: 提供商网络的优先服务器包括流量检测模块,流量分析器模块和规则模块。 流量检测模块从提供商网络接收操作信息,并且基于操作信息确定主机正在经历闪存事件。 流量分析器模块确定闪存事件不是主机上的分布式拒绝服务攻击。 当确定闪存事件不是分布式拒绝服务攻击时,规则模块向耦合到主机的接入路由器提供优先级规则。

    System and Method for Location, Time-of-Day, and Quality-of-Service Based Prioritized Access Control
    2.
    发明申请
    System and Method for Location, Time-of-Day, and Quality-of-Service Based Prioritized Access Control 有权
    系统和方法的位置,时间和基于服务质量的优先级访问控制

    公开(公告)号:US20120291128A1

    公开(公告)日:2012-11-15

    申请号:US13557909

    申请日:2012-07-25

    IPC分类号: G06F21/00

    摘要: A priority server for a provider network includes a traffic volume detection module, a traffic analyzer module, and a rules module. The traffic volume detection module receives operational information from the provider network and determines that a host is experiencing a flash event based upon the operational information. The traffic analyzer module determines that the flash event is not a distributed denial of service attack on the host. When it is determined that the flash event is not a distributed denial of service attack, the rules module provides a priority rule to an access router that is coupled to the host.

    摘要翻译: 提供商网络的优先服务器包括流量检测模块,流量分析器模块和规则模块。 流量检测模块从提供商网络接收操作信息,并且基于操作信息确定主机正在经历闪存事件。 流量分析器模块确定闪存事件不是主机上的分布式拒绝服务攻击。 当确定闪存事件不是分布式拒绝服务攻击时,规则模块向耦合到主机的接入路由器提供优先级规则。

    System and method to detect and mitigate distributed denial of service attacks using random internet protocol hopping
    3.
    发明授权
    System and method to detect and mitigate distributed denial of service attacks using random internet protocol hopping 有权
    使用随机互联网协议跳频来检测和减轻分布式拒绝服务攻击的系统和方法

    公开(公告)号:US08566465B2

    公开(公告)日:2013-10-22

    申请号:US12884976

    申请日:2010-09-17

    IPC分类号: G06F15/173

    摘要: A method includes sending a first redirect instruction to a first client in response to a first session request received at a service address, and establishing a first session with the first client in response to a second session request received at the first redirect address indicated by the first redirect instruction. Additionally, the method includes determining a first service interval has passed, and sending a second redirect instruction to a second client in response to a third session request received at the service address after the first service interval has passed. The method still further includes establishing a second session with the second client in response to the fourth session request received at the second redirect address indicated by the second redirect instruction after the first service interval has passed, and rejecting the fifth session request received from a third client at the first redirect address after the first service interval has passed.

    摘要翻译: 一种方法包括响应于在服务地址处接收到的第一会话请求向第一客户端发送第一重定向指令,以及响应于在由所述第一重定向地址指示的第一重定向地址接收到的第二会话请求,建立与第一客户端的第一会话 第一个重定向指令。 此外,该方法包括确定已经过去的第一服务间隔,并且响应于在经过第一服务间隔之后在服务地址处接收的第三会话请求,向第二客户端发送第二重定向指令。 该方法还包括响应于在第一服务间隔已经过去之后由第二重定向指令指示的第二重定向地址处接收到的第四会话请求,建立与第二客户端的第二会话,并且拒绝从第三客户端接收到的第五会话请求 客户端在第一个服务间隔之后的第一个重定向地址。

    System and Method to Detect and Mitigate Distributed Denial of Service Attacks using Random Internet Protocol Hopping
    4.
    发明申请
    System and Method to Detect and Mitigate Distributed Denial of Service Attacks using Random Internet Protocol Hopping 有权
    使用随机互联网协议跳跃检测和缓解分布式拒绝服务攻击的系统和方法

    公开(公告)号:US20120072605A1

    公开(公告)日:2012-03-22

    申请号:US12884976

    申请日:2010-09-17

    IPC分类号: G06F21/20

    摘要: A method includes sending a first redirect instruction to a first client in response to a first session request received at a service address, and establishing a first session with the first client in response to a second session request received at the first redirect address indicated by the first redirect instruction. Additionally, the method includes determining a first service interval has passed, and sending a second redirect instruction to a second client in response to a third session request received at the service address after the first service interval has passed. The method still further includes establishing a second session with the second client in response to the fourth session request received at the second redirect address indicated by the second redirect instruction after the first service interval has passed, and rejecting the fifth session request received from a third client at the first redirect address after the first service interval has passed.

    摘要翻译: 一种方法包括响应于在服务地址处接收到的第一会话请求向第一客户端发送第一重定向指令,以及响应于在由所述第一重定向地址指示的第一重定向地址接收到的第二会话请求,建立与第一客户端的第一会话 第一个重定向指令。 此外,该方法包括确定已经过去的第一服务间隔,并且响应于在经过第一服务间隔之后在服务地址处接收的第三会话请求,向第二客户端发送第二重定向指令。 该方法还包括响应于在第一服务间隔已经过去之后由第二重定向指令指示的第二重定向地址处接收到的第四会话请求,建立与第二客户端的第二会话,并且拒绝从第三客户端接收到的第五会话请求 客户端在第一个服务间隔之后的第一个重定向地址。

    System and Method for Location, Time-of-Day, and Quality-of-Service Based Prioritized Access Control
    5.
    发明申请
    System and Method for Location, Time-of-Day, and Quality-of-Service Based Prioritized Access Control 有权
    系统和方法的位置,时间和基于服务质量的优先级访问控制

    公开(公告)号:US20110141900A1

    公开(公告)日:2011-06-16

    申请号:US12636198

    申请日:2009-12-11

    IPC分类号: H04L12/26

    摘要: A priority server for a provider network includes a traffic volume detection module, a traffic analyzer module, and a rules module. The traffic volume detection module receives operational information from the provider network and determines that a host is experiencing a flash event based upon the operational information. The traffic analyzer module determines that the flash event is not a distributed denial of service attack on the host. When it is determined that the flash event is not a distributed denial of service attack, the rules module provides a priority rule to an access router that is coupled to the host. The priority rule is based upon a characteristic of packets routed in the provider network that are associated with the flash event, and the characteristic is determined not solely by information included in the packets.

    摘要翻译: 提供商网络的优先服务器包括流量检测模块,流量分析器模块和规则模块。 流量检测模块从提供商网络接收操作信息,并且基于操作信息确定主机正在经历闪存事件。 流量分析器模块确定闪存事件不是主机上的分布式拒绝服务攻击。 当确定闪存事件不是分布式拒绝服务攻击时,规则模块向耦合到主机的接入路由器提供优先级规则。 优先权规则基于在提供商网络中路由在与闪存事件相关联的分组的特征,并且该特性不仅由包括在分组中的信息来确定。

    Method and system for dynamic traffic prioritization
    6.
    发明授权
    Method and system for dynamic traffic prioritization 有权
    动态流量优先级的方法和系统

    公开(公告)号:US09148376B2

    公开(公告)日:2015-09-29

    申请号:US12963227

    申请日:2010-12-08

    摘要: A method provides for the dynamic traffic prioritization in a communication network. The method electronically monitors traffic in a communication network and determines when traffic exceeds configured thresholds on the links of the communication network. Thus, the method determines a link which is potentially about to be congested in the communication network. The method categorizes the traffic on this link by an end system attached to one end of the potentially congested link into a plurality of priority categories using application layer parameters. Using a re-direct capability of the end system, the method re-directs at least one of the pluralities of priority categories of traffic to an alternate Internet Protocol address. The method uses preconfigured Quality of Service mechanisms on the provider edge router attached to the other end of the potentially congested link to guarantee a predetermined amount of bandwidth capacity of the link to traffic destined to the alternate Internet Protocol address.

    摘要翻译: 一种方法提供通信网络中的动态流量优先级。 该方法电子监控通信网络中的流量,并确定流量何时超过通信网络链路上的配置阈值。 因此,该方法确定通信网络中潜在地将拥塞的链路。 该方法通过使用应用层参数将附接到潜在拥塞链路的一端的终端系统在该链路上分类为多个优先级类别。 使用终端系统的直接能力,该方法将多个优先级别的业务中的至少一个重定向到备用因特网协议地址。 该方法在连接到可能拥塞链路的另一端的提供商边缘路由器上使用预配置的服务质量机制,以保证到达备用因特网协议地址的流量的链路的预定量的带宽容量。

    Methods, devices, systems, and computer program products for edge driven communications network security monitoring
    7.
    发明授权
    Methods, devices, systems, and computer program products for edge driven communications network security monitoring 有权
    用于边缘驱动通信网络安全监控的方法,设备,系统和计算机程序产品

    公开(公告)号:US08302189B2

    公开(公告)日:2012-10-30

    申请号:US12627733

    申请日:2009-11-30

    IPC分类号: G06F21/00

    CPC分类号: H04L63/0209 H04L63/1416

    摘要: An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim sub-network. The aggregated low bandwidth attacks can generate a relatively high bandwidth attack including un-solicited data traffic directed to the victim' so that the aggregated attack becomes more detectable at an edge monitor circuit located proximate to the victim. Related systems, devices, and computer program products are also disclosed.

    摘要翻译: 可以利用边缘监控方法来检测包括多个相对低带宽的攻击的攻击,这些攻击在受害子网络处被聚合。 聚合的低带宽攻击可以产生相对较高的带宽攻击,包括针对受害者的非请求数据流量,使得聚合攻击在位于受害者附近的边缘监视器电路更可检测。 还公开了相关系统,设备和计算机程序产品。

    System and method for location, time-of-day, and quality-of-service based prioritized access control
    8.
    发明授权
    System and method for location, time-of-day, and quality-of-service based prioritized access control 有权
    用于定位,时间和基于服务质量的优先级访问控制的系统和方法

    公开(公告)号:US08254257B2

    公开(公告)日:2012-08-28

    申请号:US12636198

    申请日:2009-12-11

    摘要: A priority server for a provider network includes a traffic volume detection module, a traffic analyzer module, and a rules module. The traffic volume detection module receives operational information from the provider network and determines that a host is experiencing a flash event based upon the operational information. The traffic analyzer module determines that the flash event is not a distributed denial of service attack on the host. When it is determined that the flash event is not a distributed denial of service attack, the rules module provides a priority rule to an access router that is coupled to the host. The priority rule is based upon a characteristic of packets routed in the provider network that are associated with the flash event, and the characteristic is determined not solely by information included in the packets.

    摘要翻译: 提供商网络的优先服务器包括流量检测模块,流量分析器模块和规则模块。 流量检测模块从提供商网络接收操作信息,并且基于操作信息确定主机正在经历闪存事件。 流量分析器模块确定闪存事件不是主机上的分布式拒绝服务攻击。 当确定闪存事件不是分布式拒绝服务攻击时,规则模块向耦合到主机的接入路由器提供优先级规则。 优先权规则基于在提供商网络中路由在与闪存事件相关联的分组的特征,并且该特性不仅由包括在分组中的信息确定。

    METHODS, DEVICES, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR EDGE DRIVEN COMMUNICATIONS NETWORK SECURITY MONITORING
    9.
    发明申请
    METHODS, DEVICES, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR EDGE DRIVEN COMMUNICATIONS NETWORK SECURITY MONITORING 有权
    方法,设备,系统和计算机程序产品,用于边缘驱动通信网络安全监控

    公开(公告)号:US20110131650A1

    公开(公告)日:2011-06-02

    申请号:US12627733

    申请日:2009-11-30

    IPC分类号: G06F21/00

    CPC分类号: H04L63/0209 H04L63/1416

    摘要: An edge monitoring approach can be utilized to detect an attack which includes a plurality of relatively low bandwidth attacks, which are aggregated at a victim sub-network. The aggregated low bandwidth attacks can generate a relatively high bandwidth attack including un-solicited data traffic directed to the victim' so that the aggregated attack becomes more detectable at an edge monitor circuit located proximate to the victim. Related systems, devices, and computer program products are also disclosed.

    摘要翻译: 可以利用边缘监控方法来检测包括多个相对低带宽的攻击的攻击,这些攻击在受害子网络处被聚合。 聚合的低带宽攻击可以产生相对较高的带宽攻击,包括针对受害者的非请求数据流量,使得聚合攻击在位于受害者附近的边缘监视器电路更可检测。 还公开了相关系统,设备和计算机程序产品。