AU2001288687A1 - Monitoring network traffic denial of service attacks - Google Patents
Monitoring network traffic denial of service attacksInfo
- Publication number
- AU2001288687A1 AU2001288687A1 AU2001288687A AU8868701A AU2001288687A1 AU 2001288687 A1 AU2001288687 A1 AU 2001288687A1 AU 2001288687 A AU2001288687 A AU 2001288687A AU 8868701 A AU8868701 A AU 8868701A AU 2001288687 A1 AU2001288687 A1 AU 2001288687A1
- Authority
- AU
- Australia
- Prior art keywords
- network traffic
- monitoring network
- service attacks
- denial
- traffic denial
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000012544 monitoring process Methods 0.000 title 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/02—Capturing of monitoring data
- H04L43/022—Capturing of monitoring data by sampling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/02—Capturing of monitoring data
- H04L43/026—Capturing of monitoring data using flow identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/10—Active monitoring, e.g. heartbeat, ping or trace-route
- H04L43/106—Active monitoring, e.g. heartbeat, ping or trace-route using time related information in packets, e.g. by adding timestamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US23075900P | 2000-09-07 | 2000-09-07 | |
| US60230759 | 2000-09-07 | ||
| US09/931,558 US7124440B2 (en) | 2000-09-07 | 2001-08-16 | Monitoring network traffic denial of service attacks |
| US09931558 | 2001-08-16 | ||
| PCT/US2001/027402 WO2002021302A1 (en) | 2000-09-07 | 2001-09-04 | Monitoring network traffic denial of service attacks |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| AU2001288687A1 true AU2001288687A1 (en) | 2002-03-22 |
Family
ID=26924534
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU2001288687A Abandoned AU2001288687A1 (en) | 2000-09-07 | 2001-09-04 | Monitoring network traffic denial of service attacks |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US7124440B2 (en) |
| AU (1) | AU2001288687A1 (en) |
| WO (1) | WO2002021302A1 (en) |
Families Citing this family (86)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6321338B1 (en) | 1998-11-09 | 2001-11-20 | Sri International | Network surveillance |
| EP1149339A1 (en) | 1998-12-09 | 2001-10-31 | Network Ice Corporation | A method and apparatus for providing network and computer system security |
| US7346929B1 (en) * | 1999-07-29 | 2008-03-18 | International Business Machines Corporation | Method and apparatus for auditing network security |
| US8006243B2 (en) * | 1999-12-07 | 2011-08-23 | International Business Machines Corporation | Method and apparatus for remote installation of network drivers and software |
| US7574740B1 (en) | 2000-04-28 | 2009-08-11 | International Business Machines Corporation | Method and system for intrusion detection in a computer network |
| WO2001084285A2 (en) * | 2000-04-28 | 2001-11-08 | Internet Security Systems, Inc. | Method and system for managing computer security information |
| US7921459B2 (en) | 2000-04-28 | 2011-04-05 | International Business Machines Corporation | System and method for managing security events on a network |
| US7162649B1 (en) | 2000-06-30 | 2007-01-09 | Internet Security Systems, Inc. | Method and apparatus for network assessment and authentication |
| US7917393B2 (en) * | 2000-09-01 | 2011-03-29 | Sri International, Inc. | Probabilistic alert correlation |
| US7702806B2 (en) * | 2000-09-07 | 2010-04-20 | Riverbed Technology, Inc. | Statistics collection for network traffic |
| US7043759B2 (en) * | 2000-09-07 | 2006-05-09 | Mazu Networks, Inc. | Architecture to thwart denial of service attacks |
| US7178166B1 (en) | 2000-09-19 | 2007-02-13 | Internet Security Systems, Inc. | Vulnerability assessment and authentication of a computer by a local scanner |
| US9027121B2 (en) | 2000-10-10 | 2015-05-05 | International Business Machines Corporation | Method and system for creating a record for one or more computer security incidents |
| US7146305B2 (en) * | 2000-10-24 | 2006-12-05 | Vcis, Inc. | Analytical virtual machine |
| US7970886B1 (en) * | 2000-11-02 | 2011-06-28 | Arbor Networks, Inc. | Detecting and preventing undesirable network traffic from being sourced out of a network domain |
| US7130466B2 (en) * | 2000-12-21 | 2006-10-31 | Cobion Ag | System and method for compiling images from a database and comparing the compiled images with known images |
| WO2002062049A2 (en) * | 2001-01-31 | 2002-08-08 | Timothy David Dodd | Method and system for calculating risk in association with a security audit of a computer network |
| US7237264B1 (en) | 2001-06-04 | 2007-06-26 | Internet Security Systems, Inc. | System and method for preventing network misuse |
| EP1267545B1 (en) * | 2001-06-14 | 2008-08-20 | International Business Machines Corporation | Intrusion detection in data processing system |
| US7657419B2 (en) * | 2001-06-19 | 2010-02-02 | International Business Machines Corporation | Analytical virtual machine |
| US7464410B1 (en) * | 2001-08-30 | 2008-12-09 | At&T Corp. | Protection against flooding of a server |
| US8087083B1 (en) * | 2002-01-04 | 2011-12-27 | Verizon Laboratories Inc. | Systems and methods for detecting a network sniffer |
| US7673137B2 (en) | 2002-01-04 | 2010-03-02 | International Business Machines Corporation | System and method for the managed security control of processes on a computer system |
| US7213264B2 (en) * | 2002-01-31 | 2007-05-01 | Mazu Networks, Inc. | Architecture to thwart denial of service attacks |
| US7370360B2 (en) * | 2002-05-13 | 2008-05-06 | International Business Machines Corporation | Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine |
| US7373663B2 (en) * | 2002-05-31 | 2008-05-13 | Alcatel Canada Inc. | Secret hashing for TCP SYN/FIN correspondence |
| US7886365B2 (en) * | 2002-06-11 | 2011-02-08 | Panasonic Corporation | Content-log analyzing system and data-communication controlling device |
| US7017186B2 (en) | 2002-07-30 | 2006-03-21 | Steelcloud, Inc. | Intrusion detection system using self-organizing clusters |
| US7412722B1 (en) * | 2002-08-08 | 2008-08-12 | Verizon Laboratories Inc. | Detection of softswitch attacks |
| US8504879B2 (en) | 2002-11-04 | 2013-08-06 | Riverbed Technology, Inc. | Connection based anomaly detection |
| US7363656B2 (en) | 2002-11-04 | 2008-04-22 | Mazu Networks, Inc. | Event detection/anomaly correlation heuristics |
| US7650638B1 (en) * | 2002-12-02 | 2010-01-19 | Arcsight, Inc. | Network security monitoring system employing bi-directional communication |
| US7913303B1 (en) | 2003-01-21 | 2011-03-22 | International Business Machines Corporation | Method and system for dynamically protecting a computer system from attack |
| US20040148520A1 (en) * | 2003-01-29 | 2004-07-29 | Rajesh Talpade | Mitigating denial of service attacks |
| WO2004070547A2 (en) * | 2003-02-03 | 2004-08-19 | Captus Networks Corp. | Method and device for monitoring data traffic and preventing unauthorized access to a network |
| US20040157557A1 (en) * | 2003-02-07 | 2004-08-12 | Lockheed Martin Corporation | System for a dynamic ad-hoc wireless network |
| US8161145B2 (en) * | 2003-02-27 | 2012-04-17 | International Business Machines Corporation | Method for managing of denial of service attacks using bandwidth allocation technology |
| US7237267B2 (en) * | 2003-10-16 | 2007-06-26 | Cisco Technology, Inc. | Policy-based network security management |
| US7657938B2 (en) * | 2003-10-28 | 2010-02-02 | International Business Machines Corporation | Method and system for protecting computer networks by altering unwanted network data traffic |
| US7929534B2 (en) | 2004-06-28 | 2011-04-19 | Riverbed Technology, Inc. | Flow logging for connection-based anomaly detection |
| US20060037077A1 (en) * | 2004-08-16 | 2006-02-16 | Cisco Technology, Inc. | Network intrusion detection system having application inspection and anomaly detection characteristics |
| US7453803B1 (en) * | 2004-11-30 | 2008-11-18 | Sprint Communications Company L.P. | Congestion control for packet communications |
| US20060130140A1 (en) * | 2004-12-14 | 2006-06-15 | International Business Machines Corporation | System and method for protecting a server against denial of service attacks |
| US8320242B2 (en) * | 2004-12-24 | 2012-11-27 | Net Optics, Inc. | Active response communications network tap |
| US7760859B2 (en) * | 2005-03-07 | 2010-07-20 | Net Optics, Inc. | Intelligent communications network tap port aggregator |
| US8855143B1 (en) * | 2005-04-21 | 2014-10-07 | Joseph Acampora | Bandwidth saving system and method for communicating self describing messages over a network |
| US7636305B1 (en) | 2005-06-17 | 2009-12-22 | Cisco Technology, Inc. | Method and apparatus for monitoring network traffic |
| US7599301B2 (en) * | 2005-07-01 | 2009-10-06 | Net Optics, Inc. | Communications network tap with heartbeat monitor |
| WO2007035655A2 (en) * | 2005-09-16 | 2007-03-29 | The Trustees Of Columbia University In The City Of New York | Using overlay networks to counter denial-of-service attacks |
| US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
| US8266696B2 (en) * | 2005-11-14 | 2012-09-11 | Cisco Technology, Inc. | Techniques for network protection based on subscriber-aware application proxies |
| US7756034B2 (en) * | 2005-11-29 | 2010-07-13 | Cisco Technology, Inc. | System and method for handling network overload |
| US7760639B2 (en) * | 2005-11-29 | 2010-07-20 | Cisco Technology, Inc. | System and method for handling network overload |
| WO2007064422A2 (en) * | 2005-11-29 | 2007-06-07 | Cisco Technology, Inc. | System and method for handling network overload |
| WO2007070711A2 (en) * | 2005-12-15 | 2007-06-21 | Malloy Patrick J | Interactive network monitoring and analysis |
| US7610622B2 (en) * | 2006-02-06 | 2009-10-27 | Cisco Technology, Inc. | Supporting options in a communication session using a TCP cookie |
| US7895657B2 (en) * | 2006-05-05 | 2011-02-22 | Broadcom Corporation | Switching network employing virus detection |
| US7948977B2 (en) * | 2006-05-05 | 2011-05-24 | Broadcom Corporation | Packet routing with payload analysis, encapsulation and service module vectoring |
| US7596137B2 (en) * | 2006-05-05 | 2009-09-29 | Broadcom Corporation | Packet routing and vectoring based on payload comparison with spatially related templates |
| US20070258469A1 (en) * | 2006-05-05 | 2007-11-08 | Broadcom Corporation, A California Corporation | Switching network employing adware quarantine techniques |
| US7751397B2 (en) * | 2006-05-05 | 2010-07-06 | Broadcom Corporation | Switching network employing a user challenge mechanism to counter denial of service attacks |
| US20070258468A1 (en) * | 2006-05-05 | 2007-11-08 | Broadcom Corporation, A California Corporation | Intermediate network node supporting packet analysis of encrypted payload |
| US20070258437A1 (en) * | 2006-05-05 | 2007-11-08 | Broadcom Corporation, A California Corporation | Switching network employing server quarantine functionality |
| US9083712B2 (en) * | 2007-04-04 | 2015-07-14 | Sri International | Method and apparatus for generating highly predictive blacklists |
| US7903576B2 (en) * | 2007-08-07 | 2011-03-08 | Net Optics, Inc. | Methods and arrangement for utilization rate display |
| US8094576B2 (en) | 2007-08-07 | 2012-01-10 | Net Optic, Inc. | Integrated switch tap arrangement with visual display arrangement and methods thereof |
| US7898984B2 (en) * | 2007-08-07 | 2011-03-01 | Net Optics, Inc. | Enhanced communication network tap port aggregator arrangement and methods thereof |
| US8059799B1 (en) * | 2007-08-16 | 2011-11-15 | Sprint Communications Company L.P. | Algorithm to make optimal use of network resources during a mass calling event |
| US7773529B2 (en) | 2007-12-27 | 2010-08-10 | Net Optic, Inc. | Director device and methods thereof |
| EP2294734A1 (en) * | 2008-07-03 | 2011-03-16 | The Trustees of Columbia University in the City of New York | Methods and systems for controlling traffic on a communication network |
| US20100256823A1 (en) * | 2009-04-04 | 2010-10-07 | Cisco Technology, Inc. | Mechanism for On-Demand Environmental Services Based on Network Activity |
| KR100942456B1 (en) * | 2009-07-23 | 2010-02-12 | 주식회사 안철수연구소 | Method for detecting and protecting ddos attack by using cloud computing and server thereof |
| US9019863B2 (en) * | 2010-02-26 | 2015-04-28 | Net Optics, Inc. | Ibypass high density device and methods thereof |
| US8737197B2 (en) | 2010-02-26 | 2014-05-27 | Net Optic, Inc. | Sequential heartbeat packet arrangement and methods thereof |
| US9813448B2 (en) | 2010-02-26 | 2017-11-07 | Ixia | Secured network arrangement and methods thereof |
| EP2540048B1 (en) | 2010-02-28 | 2019-07-17 | Keysight Technologies Singapore (Sales) Pte. Ltd. | Gigabits zero-delay tap and methods thereof |
| US8755293B2 (en) | 2010-02-28 | 2014-06-17 | Net Optics, Inc. | Time machine device and methods thereof |
| US9749261B2 (en) | 2010-02-28 | 2017-08-29 | Ixia | Arrangements and methods for minimizing delay in high-speed taps |
| US8356096B2 (en) * | 2010-05-28 | 2013-01-15 | Verizon Patent And Licensing Inc. | Apparatuses, method and system for network performance metric statistics from traffic link data, identifying, violating network elements associated with threshold violation using visual cue |
| US8225131B2 (en) * | 2010-06-17 | 2012-07-17 | Microsoft Corporation | Monitoring service endpoints |
| US9507847B2 (en) | 2013-09-27 | 2016-11-29 | International Business Machines Corporation | Automatic log sensor tuning |
| US9591018B1 (en) * | 2014-11-20 | 2017-03-07 | Amazon Technologies, Inc. | Aggregation of network traffic source behavior data across network-based endpoints |
| US10924510B2 (en) * | 2015-12-17 | 2021-02-16 | Praesideo B.V. | Method and system for a distributed early attack warning platform (DEAWP) |
| US9998213B2 (en) | 2016-07-29 | 2018-06-12 | Keysight Technologies Singapore (Holdings) Pte. Ltd. | Network tap with battery-assisted and programmable failover |
| US11050783B2 (en) | 2018-01-31 | 2021-06-29 | International Business Machines Corporation | System and method for detecting client participation in malware activity |
| CN111355603A (en) * | 2018-12-20 | 2020-06-30 | 福建雷盾信息安全有限公司 | Computer flow analysis method |
Family Cites Families (40)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4575842A (en) * | 1984-05-14 | 1986-03-11 | The United States Of America As Represented By The Secretary Of The Air Force | Survivable local area network |
| US5231593A (en) * | 1991-01-11 | 1993-07-27 | Hewlett-Packard Company | Maintaining historical lan traffic statistics |
| GB9405406D0 (en) * | 1994-03-18 | 1994-05-04 | Netcomm Ltd | Atm cell switch |
| EP0876722B1 (en) * | 1996-01-12 | 2002-04-03 | International Business Machines Corporation | Secure anonymous information exchange in a network |
| US6034945A (en) * | 1996-05-15 | 2000-03-07 | Cisco Technology, Inc. | Method and apparatus for per traffic flow buffer management |
| US6108782A (en) * | 1996-12-13 | 2000-08-22 | 3Com Corporation | Distributed remote monitoring (dRMON) for networks |
| US6167027A (en) * | 1997-09-09 | 2000-12-26 | Cisco Technology, Inc. | Flow control technique for X.25 traffic in a high speed packet switching network |
| US6061341A (en) * | 1997-12-16 | 2000-05-09 | Telefonaktiebolaget Lm Ericsson (Publ) | Use of transmission control protocol proxy within packet data service transmissions in a mobile network |
| US6088804A (en) * | 1998-01-12 | 2000-07-11 | Motorola, Inc. | Adaptive system and method for responding to computer network security attacks |
| US6442694B1 (en) * | 1998-02-27 | 2002-08-27 | Massachusetts Institute Of Technology | Fault isolation for communication networks for isolating the source of faults comprising attacks, failures, and other network propagating errors |
| US6279113B1 (en) * | 1998-03-16 | 2001-08-21 | Internet Tools, Inc. | Dynamic signature inspection-based network intrusion detection |
| US6738814B1 (en) * | 1998-03-18 | 2004-05-18 | Cisco Technology, Inc. | Method for blocking denial of service and address spoofing attacks on a private network |
| US6725378B1 (en) * | 1998-04-15 | 2004-04-20 | Purdue Research Foundation | Network protection for denial of service attacks |
| US6321263B1 (en) * | 1998-05-11 | 2001-11-20 | International Business Machines Corporation | Client-based application availability |
| US6370116B1 (en) * | 1998-05-26 | 2002-04-09 | Alcatel Canada Inc. | Tolerant CIR monitoring and policing |
| US6304262B1 (en) * | 1998-07-21 | 2001-10-16 | Raytheon Company | Information security analysis system |
| US6807667B1 (en) * | 1998-09-21 | 2004-10-19 | Microsoft Corporation | Method and system of an application program interface for abstracting network traffic control components to application programs |
| US6308214B1 (en) * | 1998-09-23 | 2001-10-23 | Inktomi Corporation | Self-tuning dataflow I/O core |
| US6321338B1 (en) * | 1998-11-09 | 2001-11-20 | Sri International | Network surveillance |
| US6499107B1 (en) * | 1998-12-29 | 2002-12-24 | Cisco Technology, Inc. | Method and system for adaptive network security using intelligent packet analysis |
| US6301668B1 (en) * | 1998-12-29 | 2001-10-09 | Cisco Technology, Inc. | Method and system for adaptive network security using network vulnerability assessment |
| US6487666B1 (en) * | 1999-01-15 | 2002-11-26 | Cisco Technology, Inc. | Intrusion detection signature analysis using regular expressions and logical operators |
| US6381649B1 (en) * | 1999-02-05 | 2002-04-30 | Pluris, Inc. | Data flow monitoring at a network node using periodically incremented counters for comparison to predetermined data flow thresholds |
| US6678827B1 (en) * | 1999-05-06 | 2004-01-13 | Watchguard Technologies, Inc. | Managing multiple network security devices from a manager device |
| US6597661B1 (en) * | 1999-08-25 | 2003-07-22 | Watchguard Technologies, Inc. | Network packet classification |
| US6665684B2 (en) * | 1999-09-27 | 2003-12-16 | Oracle International Corporation | Partition pruning with composite partitioning |
| US6662230B1 (en) * | 1999-10-20 | 2003-12-09 | International Business Machines Corporation | System and method for dynamically limiting robot access to server data |
| US6894972B1 (en) * | 1999-11-12 | 2005-05-17 | Inmon Corporation | Intelligent collaboration across network system |
| US6389448B1 (en) * | 1999-12-06 | 2002-05-14 | Warp Solutions, Inc. | System and method for load balancing |
| US6597957B1 (en) * | 1999-12-20 | 2003-07-22 | Cisco Technology, Inc. | System and method for consolidating and sorting event data |
| US6775657B1 (en) * | 1999-12-22 | 2004-08-10 | Cisco Technology, Inc. | Multilayered intrusion detection system and method |
| US6816910B1 (en) * | 2000-02-17 | 2004-11-09 | Netzentry, Inc. | Method and apparatus for limiting network connection resources |
| US7039641B2 (en) * | 2000-02-24 | 2006-05-02 | Lucent Technologies Inc. | Modular packet classification |
| US6789203B1 (en) * | 2000-06-26 | 2004-09-07 | Sun Microsystems, Inc. | Method and apparatus for preventing a denial of service (DOS) attack by selectively throttling TCP/IP requests |
| US6353385B1 (en) * | 2000-08-25 | 2002-03-05 | Hyperon Incorporated | Method and system for interfacing an intrusion detection system to a central alarm system |
| US7398317B2 (en) * | 2000-09-07 | 2008-07-08 | Mazu Networks, Inc. | Thwarting connection-based denial of service attacks |
| US7278159B2 (en) * | 2000-09-07 | 2007-10-02 | Mazu Networks, Inc. | Coordinated thwarting of denial of service attacks |
| US7836498B2 (en) * | 2000-09-07 | 2010-11-16 | Riverbed Technology, Inc. | Device to protect victim sites during denial of service attacks |
| US7702806B2 (en) * | 2000-09-07 | 2010-04-20 | Riverbed Technology, Inc. | Statistics collection for network traffic |
| US6691213B1 (en) * | 2001-02-28 | 2004-02-10 | Western Digital Ventures, Inc. | Computer system and method for accessing a protected partition of a disk drive that lies beyond a limited address range of a host computer's BIOS |
-
2001
- 2001-08-16 US US09/931,558 patent/US7124440B2/en not_active Expired - Lifetime
- 2001-09-04 AU AU2001288687A patent/AU2001288687A1/en not_active Abandoned
- 2001-09-04 WO PCT/US2001/027402 patent/WO2002021302A1/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| US7124440B2 (en) | 2006-10-17 |
| US20020032880A1 (en) | 2002-03-14 |
| WO2002021302A1 (en) | 2002-03-14 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2001288687A1 (en) | Monitoring network traffic denial of service attacks | |
| AU2001268540A1 (en) | Method for preventing denial of service attacks | |
| AU2001292566A1 (en) | Coordinated thwarting of denial of service attacks | |
| AU2001253534A1 (en) | Method and system for overcoming denial of service attacks | |
| AU2002248119A1 (en) | Multi-bearer access to an ip network | |
| AU2001288684A1 (en) | Architecture to thwart denial of service attacks | |
| AU2001252067A1 (en) | Method and system for protection against denial of service attacks | |
| AU2002309985A1 (en) | Traffic congestion management | |
| AU2002357275A1 (en) | Camouflage of network traffic to resist attack | |
| AU2002241225A1 (en) | Method and system for communicating voice over ip access networks | |
| AU2000263691A1 (en) | Network communications system | |
| AU2002341893A1 (en) | Fault signalling in optical communications networks | |
| AU5330400A (en) | Message routing communications networks | |
| AU2001245900A1 (en) | Systems and methods for analyzing network traffic | |
| AU2001271171A1 (en) | Call routing method for 3g.ip networks | |
| AU2002211242A1 (en) | Systems and methods that protect networks and devices against denial of service attacks | |
| AU2002339349A1 (en) | Distributed transmission of traffic flows in communication networks | |
| AU2003284790A1 (en) | Network traffic statistics method of ip device | |
| AU7294000A (en) | Triggering of intelligent network service | |
| AU2001269774A1 (en) | Establishing network security using internet protocol security policies | |
| AU2002337587A1 (en) | Protecting network traffic against spoofed domain name system (dns) messages | |
| AU2002241190A1 (en) | Management of wap gateway through snmp | |
| AU4401400A (en) | Telecommunications network congestion | |
| GB2376392B (en) | Legal interception of IP traffic | |
| WO2003055164A8 (en) | Network layer protocol |