Method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic
First Claim
1. A method for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic, the method comprising:
- collecting statistics at a plurality of measurement points located within forwarding infrastructure of the computer network; and
analyzing the statistics to reconstruct the path taken by the undesirable network traffic through the network from the source of the traffic.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic is provided. The method includes collecting statistics at a plurality of measurement points located within forwarding infrastructure of the computer network. The method also includes analyzing the statistics to reconstruct the path taken by the undesirable network traffic through the network from the source of the traffic. The method and system use a combination of well-known misuse signatures of network resources in combination with modeling of normal network service behavior to identify bandwidth anomalies.
133 Citations
20 Claims
-
1. A method for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic, the method comprising:
-
collecting statistics at a plurality of measurement points located within forwarding infrastructure of the computer network; and
analyzing the statistics to reconstruct the path taken by the undesirable network traffic through the network from the source of the traffic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 17)
-
-
9. A system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic, the system comprising:
-
collectors for collecting statistics at a plurality of measurement points located within forwarding infrastructure of the computer network; and
at least one controller in communication with the collectors for analyzing the statistics to reconstruct the path taken by the undesirable network traffic through the network from the source of the traffic. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 18, 19, 20)
-
Specification