会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明授权
    • DOS attack mitigation using upstream router suggested remedies
    • DOS攻击缓解使用上游路由器建议的补救措施
    • US07254713B2
    • 2007-08-07
    • US10659341
    • 2003-09-11
    • Scott David D'Souza
    • Scott David D'Souza
    • G06F1/24
    • H04L63/1441H04L63/1458
    • Systems and methods of mitigating DOS attacks on a victim node in a computer based communication system are presented. According to the methods a node such as a router upstream from the victim analyzes traffic flow directed to the victim node and if a pattern indicating a possible attack is detected a notification to the effect is sent to the victim node. The victim can either ignore the notification or chose to suggest or request attack mitigation measures be implemented by the upstream router. Alternatively the upstream router can implement attack mitigation measures without waiting for input from the victim node.
    • 介绍了在基于计算机的通信系统中减轻受害者节点上DOS攻击的系统和方法。 根据方法,诸如来自受害者上游的路由器的节点分析指向受害节点的业务流,并且如果检测到指示可能的攻击的模式,则向该受害节点发送通知。 受害者可以忽略该通知,也可以选择建议或请求由上游路由器实施的攻击缓解措施。 或者,上游路由器可以在不等待受害节点的输入的情况下实现攻击缓解措施。
    • 8. 发明授权
    • Queuing methods for mitigation of packet spoofing
    • 用于缓解数据包欺骗的排队方法
    • US07464398B2
    • 2008-12-09
    • US10440233
    • 2003-05-19
    • Jean-Marc RobertScott David D'SouzaPaul Kierstead
    • Jean-Marc RobertScott David D'SouzaPaul Kierstead
    • G06F7/04G06F17/30H04L9/32H04L9/00
    • H04L63/1458H04L29/06H04L47/50H04L67/322H04L69/329
    • Systems and methods of mitigating attacks, such as Denial of Service (DoS) attacks, in a communications network are presented. Source addresses of packets received at network devices are monitored in relation to known reliable addresses stored in a decision engine. If the source address, as stored in a source table, is known as being legitimate the packets are placed in a high priority queue for transmission at the highest rate. Packets with an unknown address are placed in a lower priority queue, the source address stored in a different source table, and the packet is serviced at a lower rate. Packets that become known to be legitimate are moved from the unknown table to the table from which high priority queues are serviced. In this way, an attacker that employs spoofing techniques is prevented from overtaxing network resources.
    • 介绍了在通信网络中减轻攻击的系统和方法,如拒绝服务(DoS)攻击。 在网络设备接收的分组的源地址与存储在决策引擎中的已知可靠地址相关。 如果存储在源表中的源地址被认为是合法的,则将数据包放置在高优先级队列中,以便以最高速率进行传输。 具有未知地址的数据包放在较低优先级的队列中,源地址存储在不同的源表中,数据包以较低的速率进行服务。 已知为合法的数据包将从未知表移动到从中提供高优先级队列的表。 以这种方式,防止使用欺骗技术的攻击者超载网络资源。