The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Oct. 20, 2015

Filed:

Feb. 16, 2012
Applicants:

Surya Pappu, Milpitas, CA (US);

Sanjay Oza, Cupertino, CA (US);

Inventors:

Surya Pappu, Milpitas, CA (US);

Sanjay Oza, Cupertino, CA (US);

Assignee:

Sable Networks, Inc., Santa Clara, CA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 11/00 (2006.01); G06F 12/14 (2006.01); G06F 12/16 (2006.01); G08B 23/00 (2006.01); H04L 29/06 (2006.01); H04L 12/26 (2006.01); H04L 12/851 (2013.01); H04L 12/891 (2013.01); H04L 12/927 (2013.01); G06F 9/00 (2006.01); G06F 15/16 (2006.01); G06F 17/00 (2006.01);
U.S. Cl.
CPC ...
H04L 63/1458 (2013.01); H04L 43/026 (2013.01); H04L 47/2441 (2013.01); H04L 47/2483 (2013.01); H04L 47/41 (2013.01); H04L 47/80 (2013.01); H04L 63/1408 (2013.01); H04L 63/1416 (2013.01); H04L 63/1425 (2013.01); H04L 69/22 (2013.01);
Abstract

Methods and systems for detecting and mitigating high-rate Distributed Denial of Service (DDoS) attacks are herein described. The present invention contemplates a variety of improved techniques for using a flow-based statistical collection mechanism to monitor and detect deviations in server usage data. The method further includes combining multiple anomaly algorithms in a unique way to improve the accuracy of identifying a high-rate DDoS attack. The DDoS solution includes a two-phase approach of detection and mitigation, both of which operate on a local- and a global-basis. Moreover, the anomaly algorithms can be modified or extrapolated to obtain the traffic deviation parameters and therefore, the attack probabilities.


Find Patent Forward Citations

Loading…