DISTRIBUTED DENIAL OF SERVICE CONGESTION RECOVERY USING SPLIT HORIZON DNS
First Claim
Patent Images
1. A method for congestion recovery during a denial of service attack, comprising:
- creating a split horizon zone on a server, wherein the split horizon zone comprises a fictitious zone mapped to a fictitious address;
receiving and investigating a plurality of requests from a plurality of clients;
designating a malicious client from the plurality of clients based on investigating the plurality of requests, wherein the malicious client is associated with a client address;
assigning the client address to the fictitious zone; and
routing network traffic from the malicious client to the fictitious address.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for congestion recovery during a denial of service attack involves creating a split horizon zone on a server, where the split horizon zone includes a fictitious zone mapped to a fictitious address, receiving and investigating requests from clients, designating a malicious client based on investigating the requests, where the malicious client is associated with a client address, assigning the client address to the fictitious zone, and routing network traffic from the malicious client to the fictitious address.
21 Citations
20 Claims
-
1. A method for congestion recovery during a denial of service attack, comprising:
-
creating a split horizon zone on a server, wherein the split horizon zone comprises a fictitious zone mapped to a fictitious address; receiving and investigating a plurality of requests from a plurality of clients; designating a malicious client from the plurality of clients based on investigating the plurality of requests, wherein the malicious client is associated with a client address; assigning the client address to the fictitious zone; and routing network traffic from the malicious client to the fictitious address. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for denial of service attack congestion recovery, comprising:
-
a plurality of clients with a processor comprising functionality to execute software instructions for sending a plurality of requests, wherein the plurality of requests comprise requests for a plurality of Internet Protocol (IP) addresses; a domain name system (DNS) server communicatively coupled to the plurality of clients and configured for; creating a split horizon zone, wherein the split horizon zone comprises a fictitious zone mapped to a fictitious address, receiving and investigating a plurality of requests from the plurality of clients, designating a malicious client from the plurality of clients based on investigating the plurality of requests, wherein the malicious client is associated with a client address, assigning the client address to the fictitious zone, routing network traffic from the malicious client to the fictitious address; and an intrusion detection system (IDS) communicatively coupled to the plurality of clients and the DNS server. - View Dependent Claims (11)
-
-
12. A computer readable medium storing instructions for congestion recovery during a denial of service attack, the instructions comprising functionality to:
-
create a split horizon zone on a server, wherein the split horizon zone comprises a fictitious zone mapped to a fictitious address; receive and investigate a plurality of requests from a plurality of clients; designate a malicious client from the plurality of clients based on investigating the plurality of requests; assign the address of the malicious client to the fictitious zone; and route network traffic from the malicious client to the fictitious address. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification