Electrical computers and digital processing systems: multicomput – Computer-to-computer session/connection establishing – Network resources access controlling
Reexamination Certificate
2011-08-09
2011-08-09
Bates, Kevin (Department: 2442)
Electrical computers and digital processing systems: multicomput
Computer-to-computer session/connection establishing
Network resources access controlling
Reexamination Certificate
active
07996544
ABSTRACT:
The invention detects a denial of service attack at a node by monitoring the number of discarded packets in relationship to the number of inbound packets. When an attack is detected, relevant inbound packet information is collected during the attack to help characterize the attack and at least to pinpoint the source of the last hop to the attacked node.
REFERENCES:
patent: 6480892 (2002-11-01), Levay et al.
patent: 6513133 (2003-01-01), Campbell
patent: 6757255 (2004-06-01), Aoki et al.
patent: 6847613 (2005-01-01), Mimura et al.
patent: 6904529 (2005-06-01), Swander
patent: 7194538 (2007-03-01), Rabe et al.
patent: 2002/0083331 (2002-06-01), Krumel
patent: 2003/0037141 (2003-02-01), Milo et al.
patent: 2003/0043740 (2003-03-01), March et al.
patent: 2005/0125195 (2005-06-01), Brendel
Farrow, R. “Network Defense”, PC Magazine, Jul. 1999.
Allot Communications, “Protecting Networks From DOS Attacks and Malicious Traffic”, http:\\www.allot.com/html/solutions—enterprise—dos—attacks.shtm, pp. 1-9.
Golomshtok, A. “Troubleshooting Solaris (Tm) Network Performance”, System Adminnistration, v11 n 11 Nov. 2002.
Elnozahy, E. et al “Hop Integrity in Computer Networks”, Research Disclosure N450, Article 150, p. 1794, Oct. 2001.
Capshaw, S. Minimizing the Effects of DOS Attacks, Juniper Networks, Inc., Nov. 2001.
Bruton, D. et al. “Intrusion Event Filtering and Generic Attack Signatures” IBM Patent Application, U.S. Appl. No. 10/058,689, filed Jan. 28, 2002.
Bruton, D. et al. “Integrated Intrusion Detection Services”, IBM Patent Application, U.S. Appl. No. 10/058,870, filed Jan. 28, 2002.
Attwood, K. et al. “Technique of Defending Against Network Connection Flooding Attacks”, IBM Patent Application, U.S. Appl. No. 09/502,478, filed Feb. 11, 2000.
West Coast Publishing, “Attack Mitigator”, ISSN 1352-407, Secure Comput. (Int.Ed.) (UK) Aug. 2002, p. 244.
Jakubik Patricia Ann
LiVecchi Patrick Michael
Overby, Jr. Linwood Hugh
Bates Kevin
Cuenot, Forsythe & Kim LLC
International Business Machines - Corporation
Macilwinen John M
LandOfFree
Technique of detecting denial of service attacks does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Technique of detecting denial of service attacks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Technique of detecting denial of service attacks will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2657269