Method for source-spoofed IP packet traceback

Multiplex communications – Diagnostic testing – Determination of communication parameters

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C370S389000, C370S419000

Reexamination Certificate

active

08059551

ABSTRACT:
Method for source-spoofed internet protocol packet traceback. This is an IP packet traceback technique for locating the origin of a malicious packet, even if the packet's IP source address is incorrect (spoofed). This is done by having routers lookup the source address in their routing tables, and mark the relevant entry.

REFERENCES:
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5623600 (1997-04-01), Ji et al.
patent: 5761531 (1998-06-01), Ohmura et al.
patent: 5765030 (1998-06-01), Nachenberg et al.
patent: 5826013 (1998-10-01), Nachenberg
patent: 5832208 (1998-11-01), Chen et al.
patent: 5959976 (1999-09-01), Kuo
patent: 6038233 (2000-03-01), Hamamoto et al.
patent: 6138254 (2000-10-01), Voshell
patent: 6154879 (2000-11-01), Pare, Jr. et al.
patent: 6223172 (2001-04-01), Hunter et al.
patent: 6266337 (2001-07-01), Marco
patent: 6279113 (2001-08-01), Vaidya
patent: 6311273 (2001-10-01), Helbig, Sr. et al.
patent: 6356859 (2002-03-01), Talbot et al.
patent: 6357008 (2002-03-01), Nachenberg
patent: 6389419 (2002-05-01), Wong et al.
patent: 6397259 (2002-05-01), Lincke et al.
patent: 6424650 (2002-07-01), Yang et al.
patent: 6430184 (2002-08-01), Robins et al.
patent: 6438612 (2002-08-01), Ylonen et al.
patent: 6519264 (2003-02-01), Carr et al.
patent: 6615261 (2003-09-01), Smørgrav
patent: 6662230 (2003-12-01), Eichstaedt et al.
patent: 6707915 (2004-03-01), Jobst et al.
patent: 6738814 (2004-05-01), Cox et al.
patent: 6741595 (2004-05-01), Maher, III et al.
patent: 6782503 (2004-08-01), Dawson
patent: 6804237 (2004-10-01), Luo et al.
patent: 6842861 (2005-01-01), Cox et al.
patent: 6870849 (2005-03-01), Callon et al.
patent: 6909205 (2005-06-01), Corcoran et al.
patent: 6947442 (2005-09-01), Sato et al.
patent: 6978223 (2005-12-01), Milliken
patent: 6981156 (2005-12-01), Stern
patent: 6981158 (2005-12-01), Sanchez et al.
patent: 7921462 (2011-04-01), Rooney et al.
patent: 2002/0001384 (2002-01-01), Buer et al.
patent: 2002/0071438 (2002-06-01), Singh
patent: 2003/0061502 (2003-03-01), Teblyashkin et al.
patent: 2003/0097439 (2003-05-01), Strayer et al.
patent: 2003/0110393 (2003-06-01), Brock et al.
patent: 2003/0145232 (2003-07-01), Poletto et al.
patent: 2003/0167402 (2003-09-01), Stolfo et al.
patent: 2003/0172289 (2003-09-01), Soppera
patent: 2004/0093521 (2004-05-01), Hamadeh et al.
patent: 2004/0103315 (2004-05-01), Cooper et al.
patent: 2004/0213272 (2004-10-01), Nishi et al.
patent: 2005/0014749 (2005-01-01), Chen et al.
patent: 2005/0021846 (2005-01-01), Tzeng et al.
patent: 2005/0058129 (2005-03-01), Jones et al.
patent: 2005/0074015 (2005-04-01), Chari et al.
patent: 2005/0132219 (2005-06-01), Robert
patent: 2006/0010389 (2006-01-01), Rooney et al.
patent: 2006/0137009 (2006-06-01), Chesla
patent: 2006/0251085 (2006-11-01), Kalkunte et al.
patent: 2008/0056278 (2008-03-01), Kadambi et al.
patent: WO 00/28420 (2000-05-01), None
Office Action issued in U.S. Appl. No. 09/881,145 on Aug. 16, 2007.
A Plan for Spam, http://www.paulgraham.com/spam.html (2002).
Braden, R., “Requirements for Internet Hosts—Application and Support,” Internet Engineering Task Force, (1989).
Crocker, D., “Standard for the Format of ARPA Internet Text Messages,” Department of Electrical Engineering, University of Delaware, Newark, DE, pp. 1-49, (1982).
Distributed Checksum Clearinghouse (DCC) http://www.rhyolite.com/antispam/dcc/dcc-tree/dcc.html (Aug. 26, 2002).
Freed, N., “MIME Parameter Value and Encoded Word Extensions: Character Sets, Languages, and Continuation,” The Internet Society, pp. 1-10 (1997).
Freed, N., “Multipurpose Internet Mail Extensions (MIME) Part Five: Conformance Criteria and Example,” Standards Track, (1996).
Freed, N., “Multipurpose Internet Mail Extensions (MIME) Part Four: Registration Procedures,” Best Current Practice, (1996).
Freed, N., “Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies,” Standards Track, (1996).
Freed, N., “Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types,” Standards Track, (1996).
Heberlein, T.“Worm Detection and Prevention: Concept, Approach, and Experience;” Net Squared, Inc.; http://www.attackcenter.com/information/whitepapers/wormdetect/: pp. 1-7, (2002).
Moore, K., “Multipurpose Internet Mail Extensions (MIME) Part Three: Message Header Extension for Non-ASCII Text,” Standards Track, (1996).
Savage et al., “Practical Network Support for IP Traceback,” Department of Computer Science and Engineering, University of Washington, (2000).
Schwartz et al., “Smart Packets: Applying Active Networks to Network Management,” ACM Transactions on Computer Systems, 18(1):67-88, (2000).
Skipper, Chad, “Polymorphism and IDS,” Symantec, (2001).
Staniford-Chen et al., “Holding Intruders Accountable on the Internet,” Department of Computer Science, University of California at Davis, Davis, CA, pp. 39-49, (1995).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for source-spoofed IP packet traceback does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for source-spoofed IP packet traceback, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for source-spoofed IP packet traceback will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4281044

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.