The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Feb. 28, 2023

Filed:

May. 11, 2018
Applicant:

British Telecommunications Public Limited Company, London, GB;

Inventors:

Simon Beddus, London, GB;

Claudia Cristina, London, GB;

Fadi El-Moussa, London, GB;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/40 (2022.01); G06F 9/455 (2018.01); G06F 11/30 (2006.01); G06F 11/34 (2006.01); G06Q 10/0631 (2023.01);
U.S. Cl.
CPC ...
H04L 63/1416 (2013.01); G06F 9/45558 (2013.01); G06F 11/302 (2013.01); G06F 11/3495 (2013.01); G06F 2009/45587 (2013.01); G06Q 10/06315 (2013.01);
Abstract

A web server operating in a container has resource and network limits applied to add an extra layer of security to the web server. If a monitor detects that the container's resource usage is approaching one or more of these limits, which may be indicative of a DDoS attack, (step) or identifies traffic sources exhibiting suspicious behaviour, such as frequently repeated requests from the same address, or from a related set of addresses, a restrictor function caps the resources allowed by the original Webserver container to allow it to recover from buffer overflow and protect servers running in other containers from overwhelming any shared resources. A duplicator function starts up replica containers with the same resource limits to take overflow traffic, and a load balancing function then directs incoming traffic to these overflow containers etc. Traffic from suspicious sources is directed by the load balancer to one or more specially-configured attack-assessment container(s) where a 'dummy' web server operates. The behaviour of these sources is analysed by a behaviour monitoring function over some time to determine if they are legitimate or malicious, which can control a firewall to block addresses identified as generating malicious traffic.


Find Patent Forward Citations

Loading…