H04L2463/143

Detecting and preventing flooding attacks in a network environment

A method for processing network traffic data includes receiving a packet, and determining whether the packet is a previously dropped packet that is being retransmitted. A method for processing network traffic content includes receiving a plurality of headers, the plurality of headers having respective first field values, and determining whether the first field values of the respective headers form a first prescribed pattern. A method for processing network traffic content includes receiving a plurality of packets, and determining an existence of a flooding attack without tracking each of the plurality of packets with a SYN bit.

Network anomaly detection
09628500 · 2017-04-18 · ·

A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.

NETWORK ANOMALY DETECTION
20170099311 · 2017-04-06 ·

A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.

Malicious black hole node detection and circumvention

A method includes determining a number of drops of a plurality of messages sent to a first node of a plurality of nodes within a mesh network. Based at least in part on the number of drops of the plurality of messages exceeding a threshold number of drops for a time period, decrementing a first rating assigned to the first node to a second rating assigned to the first node. Based at least in part on the second rating being below a rating threshold, determining that the first node is a potentially malicious node. Based at least in part on a first distance to the first node being larger than a distance threshold, identifying that the first node is a malicious node. The method may further include ending communications with the first node.

Discriminating defense against DDoS attacks

Embodiments defend a node in a network, e.g., a server or website, against distributed denial of service (DDoS) attacks through use of a criterion of discrimination between messages that the defended network node considers important to receive, and all other messages addressed to the defended network node. The use of this new criterion upends the conventional approach to defense against DDoS attacks. Whereas the conventional defense methods attempt to identify attack packets in order to drop them, embodiments identify packets that comply with an indication of packets defined as important by the defending server, as determined by a verification performed using the criterion of discrimination, thus making sure the compliant packets are delivered to their destination, while providing functionality for all other packets (those not identified as compliant) to be dropped.