Electrical computers and digital processing systems: multicomput – Computer-to-computer data routing
Reexamination Certificate
2011-03-29
2011-03-29
Burgess, Barbara N (Department: 2457)
Electrical computers and digital processing systems: multicomput
Computer-to-computer data routing
C709S223000, C709S224000
Reexamination Certificate
active
07917649
ABSTRACT:
A technique for monitoring source addresses through statistical clustering of packets is disclosed. In one particular exemplary embodiment, the technique may be realized by a method for monitoring source addresses through statistical clustering of packets. The method may comprise identifying at least part of a source address of a packet. The method may also comprise searching at least one recorded source address based on the at least part of the source address, the at least one recorded source address being organized into at least one cluster. The method may further comprise routing the packet if the at least part of the source address falls within one of the at least one cluster and the one of the at least one cluster contains at least a predetermined number of source addresses.
REFERENCES:
patent: 5920278 (1999-07-01), Tyler et al.
patent: 6473425 (2002-10-01), Bellaton et al.
patent: 6484125 (2002-11-01), Huang et al.
patent: 6829651 (2004-12-01), Bass et al.
patent: 2002/0032773 (2002-03-01), Jiang
patent: 2003/0058859 (2003-03-01), Wu et al.
patent: 2003/0145232 (2003-07-01), Poletto et al.
patent: 2004/0054925 (2004-03-01), Etheridge et al.
patent: 2004/0193943 (2004-09-01), Angelino et al.
Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson, “Practical Network Support for IP Traceback,” SIGCOMM'00, Stockholm, Sweden.
Cheng Jin, Haining Wang and Kang G. Shin, “Hop-Count Filtering: An Effective Defense Agaiast Spoofed DDoS Traffic,” Proceedings of the 10thACM conference on computer and communication security, pp. 30-41.
T. Peng, C. Leckie and K. Ramamohanarao, “Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring,” The University of Melbourne—Dept. of Electrical and Electronic Engineering Technical Report, Nov. 2002.
T. Peng, C. Leckie and K. Ramamohanarao, “Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs,” 8thAustralasian Conference on Information Security and Privacy, Wollongong, Australia, Jul. 2003.
Sven Dietrich, “Scalpel, Gauze, and Decompilers Dissecting Denial of Service (DDoS),” ;Iogin: The Magazine of Usenix & Sage, Nov. 2000, vol. 25, No. 7, pp. 52-55.
J. Li, J. Mirkovic, M. Wang, P. Reiher, and L. Zhang, “SAVE: Source Address Validity Enforcement Protocol,” INFOCOM 2002.
D. Fasulo, “An Analysis of Recent Work on Clustering Algorithms,” University of Washington—Department of Computer Science & Engineering Technical Report # 01-03-02, Apr. 26, 1999.
Al Reuben, “Re: Average and median IP packet size over the Internet?” found at http://www.cctec.com/maillists
anog/historical/9804/msg00547.html.
Burgess Barbara N
Hunton & Williams LLP
Nortel Networks Limited
LandOfFree
Technique for monitoring source addresses through... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Technique for monitoring source addresses through..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Technique for monitoring source addresses through... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2773554