Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2008-05-13
2008-05-13
Smithers, Matthew (Department: 2137)
Information security
Monitoring or scanning of software or data including attack...
Reexamination Certificate
active
07373663
ABSTRACT:
A mechanism for detecting denial of service attacks in a digital communications system is described. A probabilistically determined portion of input packets of a connection are processed using a hash function to determine whether the packets belong to the flow initiated by a TCP SYN packet. The hash function includes a secret key for additional security. The result of the hash function is added to a value which is dependent on the sequence number of a packet being processed.
REFERENCES:
patent: 5542089 (1996-07-01), Lindsay et al.
patent: 5958053 (1999-09-01), Denker
patent: 6321338 (2001-11-01), Porras et al.
patent: 2002/0032880 (2002-03-01), Poletto et al.
patent: 2003/0002533 (2003-01-01), Rajwan
patent: 2003/0135625 (2003-07-01), Fontes et al.
patent: 2003/0200441 (2003-10-01), Jeffries et al.
patent: 1 154 610 (2001-11-01), None
Snoeren et al., “Hash-Based IP Traceback,” ACM SIGCOMM 2001, pp. 7-11.
Duffield et al., “Properties and Prediction of Flow Statistics from Sampled Packet Streams,” AT&T Labs-Research, (c)2002 ACM, pp. 159-170.
“Detecting SYN flooding attacks”, Haining Wang et al., 2002 IEEE.
“Analysis of a denial of service attack on TCP”, Christoph L. Schuba et al., 1997 IEEE.
Alcatel Canada Inc.
Khoshnoodi Nadia
Smithers Matthew
LandOfFree
Secret hashing for TCP SYN/FIN correspondence does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secret hashing for TCP SYN/FIN correspondence, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secret hashing for TCP SYN/FIN correspondence will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2774245