SECURING AN ACCESSIBLE COMPUTER SYSTEM
First Claim
1. A method for securing an accessible computer system, the method comprising:
- monitoring, at a switch that performs load balancing for access provider systems, for access requests by an access requestor to the access provider systems;
based on the monitoring, determining, by the switch, whether a cumulative number of access requests, received from the access requestor during a first period of time and handled by more than one of the access provider systems, exceeds a threshold number; and
denying, at the switch, access by the access requestor to the access provider systems in response to a determination that the cumulative number of connection transactions exceeds the threshold number.
5 Assignments
0 Petitions
Accused Products
Abstract
To secure an accessible computer system, the computer system is monitored for connection transactions. An access requestor is denied access to the computer system when the access requestor initiates a number of connection transactions that exceed a configurable threshold number during a first configurable period of time. The monitoring may include detecting connection transactions initiated by the access requestor, counting the number of connection transactions initiated by the access requestor during the first configurable period of time, and comparing the number of connection transactions initiated by the access requestor during the first configurable period of time to the configurable threshold number.
-
Citations
20 Claims
-
1. A method for securing an accessible computer system, the method comprising:
-
monitoring, at a switch that performs load balancing for access provider systems, for access requests by an access requestor to the access provider systems; based on the monitoring, determining, by the switch, whether a cumulative number of access requests, received from the access requestor during a first period of time and handled by more than one of the access provider systems, exceeds a threshold number; and denying, at the switch, access by the access requestor to the access provider systems in response to a determination that the cumulative number of connection transactions exceeds the threshold number. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A switch comprising:
-
a processor; and a memory encoded with machine readable instructions that, when executed by the processor, operate to cause the processor to perform operations comprising; performing load balancing for access provider systems; monitoring for access requests by an access requestor to the access provider systems; based on the monitoring, determining whether a cumulative number of access requests, received from the access requestor during a first period of time and handled by more than one of the access provider systems, exceeds a threshold number; and denying, at the switch, access by the access requestor to the access provider systems in response to a determination that the cumulative number of connection transactions exceeds the threshold number. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification