Systems and methods for detecting and preventing flooding attacks in a network environment
First Claim
1. A method for processing network traffic data, comprising:
- receiving a packet; and
determining whether the packet is a previously dropped packet that is being retransmitted.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for processing network traffic data includes receiving a packet, and determining whether the packet is a previously dropped packet that is being retransmitted. A method for processing network traffic content includes receiving a plurality of headers, the plurality of headers having respective first field values, and determining whether the first field values of the respective headers form a first prescribed pattern. A method for processing network traffic content includes receiving a plurality of packets, and determining an existence of a flooding attack without tracking each of the plurality of packets with a SYN bit.
-
Citations
36 Claims
-
1. A method for processing network traffic data, comprising:
-
receiving a packet; and
determining whether the packet is a previously dropped packet that is being retransmitted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for processing network traffic data, comprising:
-
means for receiving a packet; and
means for determining whether the packet is a previously dropped packet that is being retransmitted.
-
-
15. A computer product includes a computer-readable medium, the computer-readable medium having a set of stored instructions, an execution of which causes a process to be performed, the process comprising:
-
receiving a packet; and
determining whether the packet is a previously dropped packet that is being retransmitted.
-
-
16. A method for processing network traffic content, comprising:
-
receiving a plurality of headers, the plurality of headers having respective first field values; and
determining whether the first field values of the respective headers form a first prescribed pattern. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A system for processing network traffic content, comprising:
-
means for receiving a plurality of headers, the plurality of headers having respective first field values; and
means for determining whether the first field values of the respective headers form a first prescribed pattern.
-
-
31. A computer product includes a computer-readable medium, the computer-readable medium having a set of stored instructions, an execution of which causes a process to be performed, the process comprising:
-
receiving a plurality of headers, the plurality of headers having respective first field values; and
determining whether the first field values of the respective headers form a first prescribed pattern.
-
-
32. A method for processing network traffic content, comprising:
-
receiving a plurality of packets; and
determining an existence of a flooding attack without tracking each of the plurality of packets. - View Dependent Claims (33, 34)
-
-
35. A system for processing network traffic content, comprising:
-
means for receiving a plurality of packets; and
means for determining an existence of a flooding attack without tracking each of the plurality of packets.
-
-
36. A computer product includes a computer-readable medium, the computer-readable medium having a set of stored instructions, an execution of which causes a process to be performed, the process comprising:
-
receiving a plurality of packets; and
determining an existence of a flooding attack without tracking each of the plurality of packets.
-
Specification