Methods, media and systems for responding to a denial of service attack
First Claim
Patent Images
1. A method for responding to a Denial of Service (DoS) attack, comprising:
- detecting the denial of service attack;
migrating one or more processes that provide a service to an unaffected system;
authenticating users that are authorized to use the service; and
routing traffic generated by authenticated users to the unaffected system.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, media and systems for responding to a Denial of Service (DoS) attack are provided. In some embodiments, a method includes detecting a DoS attack, migrating one or more processes that provide a service to an unaffected system; authenticating users that are authorized to use the service; and routing traffic generated by authenticated users to the unaffected system.
-
Citations
20 Claims
-
1. A method for responding to a Denial of Service (DoS) attack, comprising:
-
detecting the denial of service attack;
migrating one or more processes that provide a service to an unaffected system;
authenticating users that are authorized to use the service; and
routing traffic generated by authenticated users to the unaffected system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-readable medium containing computer-executable instructions that, when executed by a processor, cause the processor to perform a method for responding to a DoS attack, comprising:
-
detecting the denial of service attack;
migrating one or more processes that provide a service to an unaffected system;
authenticating users that are authorized to use the service; and
routing traffic generated by authenticated users to the unaffected system. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system for responding to a DoS attack, comprising:
-
a migration system configured to migrate one or more processes that provide a service from a first digital processing device to a second digital processing device when the first digital processing device is affected by the denial of service attack; and
an overlay network configured to authenticate authorized users and route traffic from the authorized users to the second digital processing device. - View Dependent Claims (17, 18, 19, 20)
-
Specification