[go: up one dir, main page]

GB2551423B - Methods for mitigating network attacks through client partitioning and devices thereof - Google Patents

Methods for mitigating network attacks through client partitioning and devices thereof Download PDF

Info

Publication number
GB2551423B
GB2551423B GB1705857.9A GB201705857A GB2551423B GB 2551423 B GB2551423 B GB 2551423B GB 201705857 A GB201705857 A GB 201705857A GB 2551423 B GB2551423 B GB 2551423B
Authority
GB
United Kingdom
Prior art keywords
methods
devices
network attacks
mitigating network
partitioning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
GB1705857.9A
Other versions
GB201705857D0 (en
GB2551423A (en
Inventor
Amdahl Saxon
Finkelshtein Peter
Zavodchik Maxim
Talmor Ron
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
F5 Inc
Original Assignee
F5 Networks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by F5 Networks Inc filed Critical F5 Networks Inc
Publication of GB201705857D0 publication Critical patent/GB201705857D0/en
Publication of GB2551423A publication Critical patent/GB2551423A/en
Application granted granted Critical
Publication of GB2551423B publication Critical patent/GB2551423B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer And Data Communications (AREA)
GB1705857.9A 2016-04-11 2017-04-11 Methods for mitigating network attacks through client partitioning and devices thereof Expired - Fee Related GB2551423B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US201662320967P 2016-04-11 2016-04-11

Publications (3)

Publication Number Publication Date
GB201705857D0 GB201705857D0 (en) 2017-05-24
GB2551423A GB2551423A (en) 2017-12-20
GB2551423B true GB2551423B (en) 2021-09-15

Family

ID=58744641

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1705857.9A Expired - Fee Related GB2551423B (en) 2016-04-11 2017-04-11 Methods for mitigating network attacks through client partitioning and devices thereof

Country Status (2)

Country Link
DE (1) DE102017107802A1 (en)
GB (1) GB2551423B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090172162A1 (en) * 2008-01-02 2009-07-02 Stephen Wood Method of throttling unwanted network traffic on a server
WO2017016454A1 (en) * 2015-07-24 2017-02-02 中兴通讯股份有限公司 Method and device for preventing ddos attack
US9705895B1 (en) * 2013-07-05 2017-07-11 Dcs7, Llc System and methods for classifying internet devices as hostile or benign

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090172162A1 (en) * 2008-01-02 2009-07-02 Stephen Wood Method of throttling unwanted network traffic on a server
US9705895B1 (en) * 2013-07-05 2017-07-11 Dcs7, Llc System and methods for classifying internet devices as hostile or benign
WO2017016454A1 (en) * 2015-07-24 2017-02-02 中兴通讯股份有限公司 Method and device for preventing ddos attack

Also Published As

Publication number Publication date
GB201705857D0 (en) 2017-05-24
GB2551423A (en) 2017-12-20
DE102017107802A1 (en) 2017-10-12

Similar Documents

Publication Publication Date Title
IL273632A (en) Methods for internet communication security
EP3379788A4 (en) Network attacks identifying method and device
EP3171572A4 (en) Network security protection method and device
EP3295348A4 (en) Method and device for defending against network attacks
EP3163947A4 (en) Method for barring network access for each application, and user equipment
SG10202107194WA (en) Methods, Apparatuses, and Client Devices For Processing Service Data
EP3214796A4 (en) Network secure communication method and communication device
IL235423A0 (en) Method and system for mitigating spear-phishing attacks
EP3105888A4 (en) Network security systems and methods
SG10202107770WA (en) Network authentication method and apparatus
EP3154294A4 (en) Private network selection method and device
EP3200393A4 (en) Method and device for virtual network function management
EP3257314A4 (en) Methods and devices for random access
EP3310113A4 (en) Random access method and equipment
EP3163833A4 (en) Virtual private network realization method and client device
GB201707178D0 (en) Methods and apparatuses for random-access
EP3119133A4 (en) Roaming network access method and apparatus
EP3113419A4 (en) Network accessing method and router
EP3232704A4 (en) Network perception based service policy configuration method and network device
EP3276890A4 (en) Preserving method and device for virtual network
EP3373517A4 (en) Configuration method and device for virtual network function
SG11202000243VA (en) Cross network authentication method and system
EP3149991A4 (en) Method and apparatus for generating policies for improving network system performance
EP3089435A4 (en) Service processing method and network device
EP3160092A4 (en) Method and device for network resource balancing

Legal Events

Date Code Title Description
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1248426

Country of ref document: HK

PCNP Patent ceased through non-payment of renewal fee

Effective date: 20240411