H04L2463/141

Automated distributed denial of service attack detection and prevention
11405418 · 2022-08-02 · ·

A DDOS attack preventer implements an unconventional way of detecting and preventing DDOS attacks. The attack preventer receives and analyzes requests from a particular IP address or device. The attack preventer will track various characteristics of each request (e.g., characteristics of the data in the requests, characteristics of the input used to generate the requests, and characteristics of the device used to generate the requests). The attack preventer will analyze these characteristics to determine whether the requests are human-generated or machine-generated. If the requests are human-generated, the attack preventer services the requests. If the requests are machine-generated, the attack preventer rejects the requests.

Application programming interface platform management using machine learning

A method includes monitoring and logging a plurality of transactions between one or more clients and an application programming interface gateway, and analyzing data corresponding to the plurality of transactions using one or more machine learning techniques. The method further includes determining, based on the analyzing, one or more issues corresponding to one or more application programming interfaces associated with the application programming interface gateway and resulting from one or more of the plurality of transactions. In the method, one or more corrective actions are performed to address the one or more issues.

COMPUTATIONAL PUZZLES AGAINST DOS ATTACKS
20220116418 · 2022-04-14 · ·

A method for transmitting data in a computer network is provided, which comprises, at a first node of the network: receiving a computing puzzle from a puzzle server node of the network distinct from the first node; determining a solution to the puzzle for transmitting a message to a second node of the network distinct from the puzzle server node; and transmitting data to the second node, wherein the transmitted data comprises a message and the determined solution to the puzzle.

Systems and methods for mitigating and/or preventing distributed denial-of-service attacks
11277439 · 2022-03-15 · ·

Systems and methods are described that mitigate and/or prevent distributed denial-of-service (DDOS) attacks. In one implementation, a gateway include one or more processors that obtain network data from one or more entities associated with the gateway, provide the network data to a server, and obtain a set of entity identifiers from the server. The set of entity identifiers may be generated based on at least the network data. The one or more processors may further filter communications based on the set of entity identifiers.

Methods and system for securing a SDN controller from denial of service attack

A Method and a system for securing a SDN controller from denial of service attack are provided. A SDN controller receives, from a networking device, data packets pertaining to a flow in Packet_IN messages, if the flow does not match flow entries in a first flow table of the networking device. A table miss flow entry pertaining to the flow is created in a second flow table of the networking device for sending the Packet_IN. The SDN controller installs a flood prevention flow entry in the second flow table to enable the networking device to drop subsequent data packets pertaining to the flow until the SDN controller installs, in the first flow table, a flow entry matching the flow. The flood prevention flow entry is deleted from the second flow table after the installation of the flow entry matching the flow.

Process for Abuse Mitigation

Method of limiting offending messages communicated over a network, such as but not limited to messages associated with Spam and DoS attacks. The message limiting optionally including limiting bandwidth or other communication capabilities associated with an entity communicating or facilitating communication of the messages.

Defending against domain name system based attacks
11271963 · 2022-03-08 · ·

In some examples, a Domain Name System (DNS) server receives, over a network, DNS queries containing domain names, extracts a common domain name shared by the domain names, determines whether a measure of an amount of data relating to the DNS queries containing the common domain name exceeds a threshold, and in response to determining that the measure of the amount of data relating to the DNS queries containing the common domain name exceeds the threshold, trigger a countermeasure action to address a threat associated with the DNS queries.

Decoupling of IP address bindings and use in a distributed cloud computing network

An authoritative domain name system (DNS) server receives a DNS query for an address record for a hostname. The DNS server selects an IP address from multiple IP addresses to include in an answer to the DNS query, where each IP address is capable of being selected to be included in the answer regardless of the hostname being queried, where multiple servers of a distributed cloud computing network are capable of receiving traffic at each IP address, and where none of the IP addresses identify a particular server of the distributed cloud computing network. The authoritative DNS server transmits an answer to the DNS query that includes the selected IP address. Sometime after, one of the servers of the distributed cloud computing network receives a request for content that is addressed to the selected IP address and processes the request.

SECURITY TECHNIQUES FOR 5G AND NEXT GENERATION RADIO ACCESS NETWORKS

Malicious attacks by certain devices against a radio access network (RAN) can be detected and mitigated, while allowing communication of priority messages. A security management component (SMC) can determine whether a malicious attack against the RAN is occurring based on a defined baseline that indicates whether a malicious attack is occurring. The defined baseline is determined based on respective characteristics associated with respective devices that are determined based on analysis of information relating to the devices. In response to determining there is a malicious attack, SMC determines whether to block connections of devices to the RAN based on respective priority levels associated with respective messages being communicated by the devices. SMC blocks connections of devices communicating messages associated with priority levels that do not satisfy a defined threshold priority level, while managing communication connections to allow messages satisfying the defined threshold priority level to be communicated via the RAN.

SECURE TRAFFIC OPTIMIZATION IN AN EDGE NETWORK
20210314357 · 2021-10-07 ·

A client application establishes a connection between the client application and an origin server over one or more networks. The application generates a request to establish a secure session with the origin server over the connection. The request includes information, in a header of the request, that flags traffic sent during the secure session to a network of the one or more networks as subject to one or more optimizations performed by the network. Subsequent to establishing the secure session, the application encrypts the traffic in accordance with the secure session and sends the traffic to the origin server over the connection, subject to the one or more optimizations. The infrastructure service applies the one or more optimizations to the traffic as it passes through the edge network to the origin server.