AU2001290612A1 - Device to protect victim sites during denial of service attacks - Google Patents
Device to protect victim sites during denial of service attacksInfo
- Publication number
- AU2001290612A1 AU2001290612A1 AU2001290612A AU9061201A AU2001290612A1 AU 2001290612 A1 AU2001290612 A1 AU 2001290612A1 AU 2001290612 A AU2001290612 A AU 2001290612A AU 9061201 A AU9061201 A AU 9061201A AU 2001290612 A1 AU2001290612 A1 AU 2001290612A1
- Authority
- AU
- Australia
- Prior art keywords
- service attacks
- sites during
- denial
- protect victim
- protect
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/02—Capturing of monitoring data
- H04L43/026—Capturing of monitoring data using flow identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US23075900P | 2000-09-07 | 2000-09-07 | |
| US60230759 | 2000-09-07 | ||
| US09931344 | 2001-08-16 | ||
| US09/931,344 US7836498B2 (en) | 2000-09-07 | 2001-08-16 | Device to protect victim sites during denial of service attacks |
| PCT/US2001/027413 WO2002021771A1 (en) | 2000-09-07 | 2001-09-04 | Device to protect victim sites during denial of service attacks |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| AU2001290612A1 true AU2001290612A1 (en) | 2002-03-22 |
Family
ID=26924532
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU2001290612A Abandoned AU2001290612A1 (en) | 2000-09-07 | 2001-09-04 | Device to protect victim sites during denial of service attacks |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US7836498B2 (en) |
| AU (1) | AU2001290612A1 (en) |
| WO (1) | WO2002021771A1 (en) |
Families Citing this family (65)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7702806B2 (en) * | 2000-09-07 | 2010-04-20 | Riverbed Technology, Inc. | Statistics collection for network traffic |
| US7743134B2 (en) * | 2000-09-07 | 2010-06-22 | Riverbed Technology, Inc. | Thwarting source address spoofing-based denial of service attacks |
| US7398317B2 (en) * | 2000-09-07 | 2008-07-08 | Mazu Networks, Inc. | Thwarting connection-based denial of service attacks |
| US7124440B2 (en) * | 2000-09-07 | 2006-10-17 | Mazu Networks, Inc. | Monitoring network traffic denial of service attacks |
| US7278159B2 (en) * | 2000-09-07 | 2007-10-02 | Mazu Networks, Inc. | Coordinated thwarting of denial of service attacks |
| US7043759B2 (en) * | 2000-09-07 | 2006-05-09 | Mazu Networks, Inc. | Architecture to thwart denial of service attacks |
| US7251692B1 (en) * | 2000-09-28 | 2007-07-31 | Lucent Technologies Inc. | Process to thwart denial of service attacks on the internet |
| JP3819364B2 (en) * | 2001-04-27 | 2006-09-06 | 株式会社エヌ・ティ・ティ・データ | Packet tracking system |
| US6993790B2 (en) * | 2001-08-30 | 2006-01-31 | International Business Machines Corporation | Host-based systematic attack detection tool |
| US7464410B1 (en) * | 2001-08-30 | 2008-12-09 | At&T Corp. | Protection against flooding of a server |
| US7213264B2 (en) | 2002-01-31 | 2007-05-01 | Mazu Networks, Inc. | Architecture to thwart denial of service attacks |
| US7743415B2 (en) * | 2002-01-31 | 2010-06-22 | Riverbed Technology, Inc. | Denial of service attacks characterization |
| US7114182B2 (en) * | 2002-05-31 | 2006-09-26 | Alcatel Canada Inc. | Statistical methods for detecting TCP SYN flood attacks |
| US7886365B2 (en) | 2002-06-11 | 2011-02-08 | Panasonic Corporation | Content-log analyzing system and data-communication controlling device |
| US20050033989A1 (en) * | 2002-11-04 | 2005-02-10 | Poletto Massimiliano Antonio | Detection of scanning attacks |
| US7827272B2 (en) * | 2002-11-04 | 2010-11-02 | Riverbed Technology, Inc. | Connection table for intrusion detection |
| US7461404B2 (en) * | 2002-11-04 | 2008-12-02 | Mazu Networks, Inc. | Detection of unauthorized access in a network |
| US8191136B2 (en) * | 2002-11-04 | 2012-05-29 | Riverbed Technology, Inc. | Connection based denial of service detection |
| US8504879B2 (en) * | 2002-11-04 | 2013-08-06 | Riverbed Technology, Inc. | Connection based anomaly detection |
| US7363656B2 (en) * | 2002-11-04 | 2008-04-22 | Mazu Networks, Inc. | Event detection/anomaly correlation heuristics |
| US7716737B2 (en) * | 2002-11-04 | 2010-05-11 | Riverbed Technology, Inc. | Connection based detection of scanning attacks |
| US8479057B2 (en) * | 2002-11-04 | 2013-07-02 | Riverbed Technology, Inc. | Aggregator for connection based anomaly detection |
| US7774839B2 (en) * | 2002-11-04 | 2010-08-10 | Riverbed Technology, Inc. | Feedback mechanism to minimize false assertions of a network intrusion |
| US8161145B2 (en) * | 2003-02-27 | 2012-04-17 | International Business Machines Corporation | Method for managing of denial of service attacks using bandwidth allocation technology |
| US8024795B2 (en) | 2003-05-09 | 2011-09-20 | Q1 Labs, Inc. | Network intelligence system |
| US9106479B1 (en) | 2003-07-10 | 2015-08-11 | F5 Networks, Inc. | System and method for managing network communications |
| US7929534B2 (en) * | 2004-06-28 | 2011-04-19 | Riverbed Technology, Inc. | Flow logging for connection-based anomaly detection |
| US20060059558A1 (en) * | 2004-09-15 | 2006-03-16 | John Selep | Proactive containment of network security attacks |
| US7760653B2 (en) * | 2004-10-26 | 2010-07-20 | Riverbed Technology, Inc. | Stackable aggregation for connection based anomaly detection |
| WO2006103337A1 (en) * | 2005-03-31 | 2006-10-05 | France Telecom | Method for monitoring a table of adaptive flows and directing a flood attack of a wideband packet data transmission network and corresponding analyzing equipment |
| US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
| JP4512196B2 (en) * | 2005-10-20 | 2010-07-28 | アラクサラネットワークス株式会社 | Abnormal traffic detection method and packet relay apparatus |
| DE102005050584B4 (en) * | 2005-10-21 | 2009-04-30 | Lucas Will | Method for determining unwanted access to a data packet |
| US8266696B2 (en) * | 2005-11-14 | 2012-09-11 | Cisco Technology, Inc. | Techniques for network protection based on subscriber-aware application proxies |
| US9083712B2 (en) * | 2007-04-04 | 2015-07-14 | Sri International | Method and apparatus for generating highly predictive blacklists |
| US8341739B2 (en) * | 2007-05-24 | 2012-12-25 | Foundry Networks, Llc | Managing network security |
| KR100977365B1 (en) * | 2007-12-20 | 2010-08-20 | 삼성에스디에스 주식회사 | Mobile device having self defense function against virus and network attack and self defense method using same |
| US8914878B2 (en) | 2009-04-29 | 2014-12-16 | Juniper Networks, Inc. | Detecting malicious network software agents |
| US8789173B2 (en) | 2009-09-03 | 2014-07-22 | Juniper Networks, Inc. | Protecting against distributed network flood attacks |
| US20110072515A1 (en) * | 2009-09-22 | 2011-03-24 | Electronics And Telecommunications Research Institute | Method and apparatus for collaboratively protecting against distributed denial of service attack |
| US8966622B2 (en) * | 2010-12-29 | 2015-02-24 | Amazon Technologies, Inc. | Techniques for protecting against denial of service attacks near the source |
| JP5845964B2 (en) * | 2012-02-22 | 2016-01-20 | 富士ゼロックス株式会社 | Communication apparatus and program |
| US8938804B2 (en) * | 2012-07-12 | 2015-01-20 | Telcordia Technologies, Inc. | System and method for creating BGP route-based network traffic profiles to detect spoofed traffic |
| EP2871795A1 (en) * | 2013-11-06 | 2015-05-13 | MyOmega System Technologies GmbH | Method and controller for controlling at least one load |
| US9774611B1 (en) * | 2014-03-11 | 2017-09-26 | Amazon Technologies, Inc. | Dynamically deploying a network traffic filter |
| US10693742B2 (en) | 2014-04-15 | 2020-06-23 | Splunk Inc. | Inline visualizations of metrics related to captured network data |
| US10462004B2 (en) | 2014-04-15 | 2019-10-29 | Splunk Inc. | Visualizations of statistics associated with captured network data |
| US10700950B2 (en) | 2014-04-15 | 2020-06-30 | Splunk Inc. | Adjusting network data storage based on event stream statistics |
| US10523521B2 (en) | 2014-04-15 | 2019-12-31 | Splunk Inc. | Managing ephemeral event streams generated from captured network data |
| US9838512B2 (en) | 2014-10-30 | 2017-12-05 | Splunk Inc. | Protocol-based capture of network data using remote capture agents |
| US10366101B2 (en) | 2014-04-15 | 2019-07-30 | Splunk Inc. | Bidirectional linking of ephemeral event streams to creators of the ephemeral event streams |
| US9923767B2 (en) | 2014-04-15 | 2018-03-20 | Splunk Inc. | Dynamic configuration of remote capture agents for network data capture |
| US12028208B1 (en) | 2014-05-09 | 2024-07-02 | Splunk Inc. | Selective event stream data storage based on network traffic volume |
| US10360196B2 (en) | 2014-04-15 | 2019-07-23 | Splunk Inc. | Grouping and managing event streams generated from captured network data |
| US11086897B2 (en) | 2014-04-15 | 2021-08-10 | Splunk Inc. | Linking event streams across applications of a data intake and query system |
| US9762443B2 (en) | 2014-04-15 | 2017-09-12 | Splunk Inc. | Transformation of network data at remote capture agents |
| US10127273B2 (en) | 2014-04-15 | 2018-11-13 | Splunk Inc. | Distributed processing of network data using remote capture agents |
| US11281643B2 (en) | 2014-04-15 | 2022-03-22 | Splunk Inc. | Generating event streams including aggregated values from monitored network data |
| US9596253B2 (en) | 2014-10-30 | 2017-03-14 | Splunk Inc. | Capture triggers for capturing network data |
| US10334085B2 (en) | 2015-01-29 | 2019-06-25 | Splunk Inc. | Facilitating custom content extraction from network packets |
| US10771479B2 (en) | 2016-09-26 | 2020-09-08 | Splunk Inc. | Configuring modular alert actions and reporting action performance information |
| US10193855B2 (en) | 2017-05-30 | 2019-01-29 | Paypal, Inc. | Determining source address information for network packets |
| US10601849B2 (en) * | 2017-08-24 | 2020-03-24 | Level 3 Communications, Llc | Low-complexity detection of potential network anomalies using intermediate-stage processing |
| US10735459B2 (en) | 2017-11-02 | 2020-08-04 | International Business Machines Corporation | Service overload attack protection based on selective packet transmission |
| CN115242438B (en) * | 2022-06-15 | 2023-09-01 | 国家计算机网络与信息安全管理中心 | Potential victim group positioning method based on heterogeneous information network |
Family Cites Families (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5623601A (en) * | 1994-11-18 | 1997-04-22 | Milkway Networks Corporation | Apparatus and method for providing a secure gateway for communication and data exchanges between networks |
| JPH11508753A (en) | 1996-04-24 | 1999-07-27 | ノーザン・テレコム・リミテッド | Internet Protocol Filter |
| US5787253A (en) | 1996-05-28 | 1998-07-28 | The Ag Group | Apparatus and method of analyzing internet activity |
| US6012152A (en) * | 1996-11-27 | 2000-01-04 | Telefonaktiebolaget Lm Ericsson (Publ) | Software fault management system |
| US5968176A (en) | 1997-05-29 | 1999-10-19 | 3Com Corporation | Multilayer firewall system |
| US6272537B1 (en) * | 1997-11-17 | 2001-08-07 | Fujitsu Limited | Method for building element manager for a computer network element using a visual element manager builder process |
| US6253321B1 (en) * | 1998-06-19 | 2001-06-26 | Ssh Communications Security Ltd. | Method and arrangement for implementing IPSEC policy management using filter code |
| US6856676B1 (en) * | 1998-10-15 | 2005-02-15 | Alcatel | System and method of controlling and managing voice and data services in a telecommunications network |
| US6321338B1 (en) * | 1998-11-09 | 2001-11-20 | Sri International | Network surveillance |
| US6678250B1 (en) * | 1999-02-19 | 2004-01-13 | 3Com Corporation | Method and system for monitoring and management of the performance of real-time networks |
| US6735702B1 (en) * | 1999-08-31 | 2004-05-11 | Intel Corporation | Method and system for diagnosing network intrusion |
| US6990591B1 (en) * | 1999-11-18 | 2006-01-24 | Secureworks, Inc. | Method and system for remotely configuring and monitoring a communication device |
| US6606744B1 (en) * | 1999-11-22 | 2003-08-12 | Accenture, Llp | Providing collaborative installation management in a network-based supply chain environment |
| US6880086B2 (en) * | 2000-05-20 | 2005-04-12 | Ciena Corporation | Signatures for facilitating hot upgrades of modular software components |
| US6947445B1 (en) * | 2000-06-09 | 2005-09-20 | Hughes Electronics Corporation | Available bandwidth control mechanism |
| US7120931B1 (en) * | 2000-08-31 | 2006-10-10 | Cisco Technology, Inc. | System and method for generating filters based on analyzed flow data |
| US7178166B1 (en) * | 2000-09-19 | 2007-02-13 | Internet Security Systems, Inc. | Vulnerability assessment and authentication of a computer by a local scanner |
| US7046680B1 (en) * | 2000-11-28 | 2006-05-16 | Mci, Inc. | Network access system including a programmable access device having distributed service control |
-
2001
- 2001-08-16 US US09/931,344 patent/US7836498B2/en active Active
- 2001-09-04 AU AU2001290612A patent/AU2001290612A1/en not_active Abandoned
- 2001-09-04 WO PCT/US2001/027413 patent/WO2002021771A1/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| WO2002021771A1 (en) | 2002-03-14 |
| US7836498B2 (en) | 2010-11-16 |
| US20020031134A1 (en) | 2002-03-14 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2001290612A1 (en) | Device to protect victim sites during denial of service attacks | |
| AU2001288684A1 (en) | Architecture to thwart denial of service attacks | |
| AU2001292566A1 (en) | Coordinated thwarting of denial of service attacks | |
| AU2001252067A1 (en) | Method and system for protection against denial of service attacks | |
| AU2001292569A1 (en) | Thwarting source address spoofing-based denial of service attacks | |
| AU2002230957A1 (en) | Ear protection device | |
| AU2003225533A1 (en) | Architecture to thwart denial of service attacks | |
| AU2001253534A1 (en) | Method and system for overcoming denial of service attacks | |
| AU2001288687A1 (en) | Monitoring network traffic denial of service attacks | |
| AU3844199A (en) | An embolic protection device | |
| EP1251528A3 (en) | Surge protection device | |
| GB2366693B (en) | Software virus protection | |
| AU2841200A (en) | Bandwidth protection for voice over ip | |
| AU2001250004A1 (en) | Electrical injury protection system using radio frequency transmission | |
| AU2001241574A1 (en) | Telephone privacy protection system | |
| AU3877900A (en) | Compositions and methods for preventing and treating sexual dysfunctions | |
| AU2002211242A1 (en) | Systems and methods that protect networks and devices against denial of service attacks | |
| AU2002236475A1 (en) | Embolic protection devices | |
| SG101456A1 (en) | Esd protection network used for soi technology | |
| GB2379834B (en) | Protection of devices | |
| AU2002245381A1 (en) | Eye protection device | |
| AU2838600A (en) | Impact protection device | |
| AU4634000A (en) | Overvoltage protection | |
| AU2002217274A1 (en) | Overvoltage protection circuit | |
| AU2002337587A1 (en) | Protecting network traffic against spoofed domain name system (dns) messages |