SYSTEM FOR FINDING POTENTIAL ORIGINS OF SPOOFED INTERNET PROTOCOL ATTACK TRAFFIC
First Claim
1. A system for identifying a set of potential origins of Internet Protocol data packets on a network by a computer, said system comprising:
- a plurality of cooperating locations on said network, said cooperating locations providing accurate and reliable information as to whether an identified data packet did or did not pass through said cooperating locations at an identified point in time;
a plurality of non-cooperating locations on said network, said non-cooperating locations receiving and transmitting data packets yet providing no or false information as to whether an identified data packet did or did not pass through said cooperating locations at an identified point in time;
a link signature for each of said identified data packets, said link signature comprising a string of digits including a plurality of first predetermined values for each cooperating location through which said packet did pass and a plurality of second predetermined values for each cooperating location through which said packet did not pass;
a means for querying each of said cooperating locations as to whether an identified data packet did or did not pass through said cooperating locations at an identified point in time and calculating said link signatures; and
a table of origins, said table comprising identified destination locations, unions of all link signatures matching data packet information available for said identified data packet and origin locations consistent with said link signatures;
whereby, when a system user supplies a destination location and data packet information regarding an identified data packet, said system will identify the set of possible origins for said data packet.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention computes approximate origins of data packets transmitted over the Internet. Law enforcement agencies and network operators can use it to assign responsibility for observed Internet activities. The invention uses a small number of cooperative locations (incoming links on routers or switches) to provide link identification data: whether a packet or did or did not traverse that location. The system uses these cooperative places to generate the link signature of a data packet—which cooperative locations observed and did not observe the packet. Potential origin locations are divided into pre-computed blocks that have the same link signatures to given destination locations. The blocks are used to generate reverse routing data, potential source addresses for different link signatures. Variations of the invention store relevant link identification and reverse routing data to find the origins of past packets or to compute the origins of packets from partial information about packets of interest.
-
Citations
20 Claims
-
1. A system for identifying a set of potential origins of Internet Protocol data packets on a network by a computer, said system comprising:
-
a plurality of cooperating locations on said network, said cooperating locations providing accurate and reliable information as to whether an identified data packet did or did not pass through said cooperating locations at an identified point in time; a plurality of non-cooperating locations on said network, said non-cooperating locations receiving and transmitting data packets yet providing no or false information as to whether an identified data packet did or did not pass through said cooperating locations at an identified point in time; a link signature for each of said identified data packets, said link signature comprising a string of digits including a plurality of first predetermined values for each cooperating location through which said packet did pass and a plurality of second predetermined values for each cooperating location through which said packet did not pass; a means for querying each of said cooperating locations as to whether an identified data packet did or did not pass through said cooperating locations at an identified point in time and calculating said link signatures; and a table of origins, said table comprising identified destination locations, unions of all link signatures matching data packet information available for said identified data packet and origin locations consistent with said link signatures; whereby, when a system user supplies a destination location and data packet information regarding an identified data packet, said system will identify the set of possible origins for said data packet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for identifying a set of potential origins of Internet Protocol data packets on a network having cooperating locations and non-cooperating locations, by a computer said method comprising the steps of:
-
identifying a plurality of cooperating locations and non-cooperating locations in said network, said cooperating locations providing accurate and reliable information as to whether an identified data packet did or did not pass through each cooperating location at an identified point in time;
said non-cooperating locations receiving and transmitting data packets yet providing no or false information as to whether an identified data packet did or did not pass through each non-cooperating location at an identified point in time;creating a link signature for each of said identified data packets, said link signature comprising a string of digits including a plurality of first predetermined values for each cooperating location through which said packet did pass and a plurality of second predetermined values for each cooperating location through which said packet did not pass; querying each of said cooperating locations as to whether an identified data packet did or did not pass through said cooperating locations at an identified point in time calculating said link signatures from data collected from each of said cooperating locations; developing a table of origins, said table comprising identified destination locations, unions of all link signatures matching data packet information available for said identified data packets and origin locations consistent with said link signatures; allowing a system user to supply a destination location and data packet information regarding an identified data packet; and performing computations to identify said set of possible origins for said data packet. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification