Architecture to thwart denial of service attacks
First Claim
1. A method of thwarting denial of service attacks on a victim data center coupled to a network comprises:
- monitoring network traffic through monitors disposed at a plurality of points in the network; and
communicating data from the monitors, over a hardened, redundant network, to a central controller.
21 Assignments
0 Petitions
Accused Products
Abstract
A system architecture for thwarting denial of service attacks on a victim data center is described. The system includes a first plurality of monitors that monitor network traffic flow through the network. The first plurality of monitors is disposed at a second plurality of points in the network. The system includes a central controller that receives data from the plurality of monitors, over a hardened, redundant network. The central controller analyzes network traffic statistics to identify malicious network traffic. In some embodiments of the system, a gateway device is disposed to pass network packets between the network and the victim site. The gateway is disposed to protect the victim site, and is coupled to the control center by the redundant hardened network.
-
Citations
28 Claims
-
1. A method of thwarting denial of service attacks on a victim data center coupled to a network comprises:
-
monitoring network traffic through monitors disposed at a plurality of points in the network; and
communicating data from the monitors, over a hardened, redundant network, to a central controller. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 14, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
12. A distributed system to thwarting denial of service attacks comprises:
a plurality of monitors dispersed throughout a network, the monitors collecting statistical data for performance of intelligent traffic analysis and filtering to identify malicious traffic and to eliminate the malicious traffic to thwart the denial of service attack.
-
15. A system for thwarting denial of service attacks on a victim data center coupled to a network comprises:
-
a first plurality of monitors that monitor network traffic flow through the network, the first plurality of monitors disposed at a second plurality of points in the network; and
a central controller that receives data from the plurality of monitors, over a hardened, redundant network, the central controller analyzing network traffic statistics to identify malicious network traffic.
-
-
28. A distributed system to thwart denial of service attacks comprises:
a plurality of gateways dispersed throughout a network, near data centers that might be sources of an attack, the gateways collecting statistical data for performance of intelligent traffic analysis and filtering identify malicious traffic at the source of an attack to eliminate the malicious traffic and thwart the denial of service attack.
Specification