Methods and systems for mitigating attack traffic directed at a network element
    1.
    发明授权
    Methods and systems for mitigating attack traffic directed at a network element 有权
    用于减轻针对网络元件的攻击流量的方法和系统

    公开(公告)号:US09118707B2

    公开(公告)日:2015-08-25

    申请号:US13715651

    申请日:2012-12-14

    Abstract: An exemplary method includes an attack traffic mitigation system 1) identifying a range of ports left open by a firewall for a network element to receive network traffic provided by a computing device, 2) designating a subset of one or more ports included in the range of open ports as being included in a legitimate port range configured to receive legitimate network traffic provided by the computing device, and 3) directing the network element to drop network traffic provided by the computing device and received by each port included in the range of open ports that is not included in the legitimate port range. Corresponding methods and systems are also disclosed.

    Abstract translation: 一种示例性方法包括攻击流量缓解系统1)识别由防火墙为网络元件保持打开以接收由计算设备提供的网络流量的端口的范围,2)指定包括在以下范围内的一个或多个端口的子集: 打开端口被包括在被配置为接收由计算设备提供的合法网络流量的合法端口范围中;以及3)指示网络元件丢弃由计算设备提供并由包括在开放端口范围内的每个端口接收的网络流量 这不包括在合法的端口范围内。 还公开了相应的方法和系统。

    Methods and Systems for Mitigating Attack Traffic Directed at a Network Element
    3.
    发明申请
    Methods and Systems for Mitigating Attack Traffic Directed at a Network Element 有权
    减轻网络攻击流量的方法和系统

    公开(公告)号:US20140173722A1

    公开(公告)日:2014-06-19

    申请号:US13715651

    申请日:2012-12-14

    Abstract: An exemplary method includes an attack traffic mitigation system 1) identifying a range of ports left open by a firewall for a network element to receive network traffic provided by a computing device, 2) designating a subset of one or more ports included in the range of open ports as being included in a legitimate port range configured to receive legitimate network traffic provided by the computing device, and 3) directing the network element to drop network traffic provided by the computing device and received by each port included in the range of open ports that is not included in the legitimate port range. Corresponding methods and systems are also disclosed.

    Abstract translation: 一种示例性方法包括攻击流量缓解系统1)识别由防火墙为网络元件保持打开以接收由计算设备提供的网络流量的端口的范围,2)指定包括在以下范围内的一个或多个端口的子集: 打开端口被包括在被配置为接收由计算设备提供的合法网络流量的合法端口范围中;以及3)指示网络元件丢弃由计算设备提供并由包括在开放端口范围内的每个端口接收的网络流量 这不包括在合法的端口范围内。 还公开了相应的方法和系统。

Patent Agency Ranking