The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Apr. 10, 2018

Filed:

Aug. 18, 2015
Applicant:

International Business Machines Corporation, Armonk, NY (US);

Inventors:

Russell L. Holden, Boxborough, MA (US);

John Douglas Curtis, Milford, MA (US);

Peter Otto Mierswa, Sterling, MA (US);

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
G06F 13/00 (2006.01); H04L 29/06 (2006.01); G06F 17/30 (2006.01); G06F 9/50 (2006.01);
U.S. Cl.
CPC ...
H04L 63/1458 (2013.01); G06F 9/505 (2013.01); G06F 17/30153 (2013.01); H04L 63/1416 (2013.01); H04L 63/1425 (2013.01); H04L 2463/141 (2013.01);
Abstract

Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by providing a mechanism by which characterization of 'legitimate' behavior is defined for accessor classes, preferably along with actions to be taken in the event an accessor exceeds those limits. A set of accessor 'usage profiles' are generated. Typically, a profile comprises information, such as a “request time window,” one or more “constraints,” and one or more “actions.” A request time window defines a time period over which request usage is accumulated and over which constraints are applied. A constraint may be of various types (e.g., number of transactions, defined resource usage limits, etc.) to be applied for the usage monitoring An action defines how the system will respond if a particular constraint is triggered. By applying the constraints to accessor requests, over-utilization of compute resources is enabled.


Find Patent Forward Citations

Loading…