SCALABLE DDoS PROTECTION OF SSL-ENCRYPTED SERVICES
First Claim
1. A system for mitigating network attacks within encrypted network traffic, the system comprising:
- a protected network comprising a plurality of devices;
one or more attack mitigation devices communicatively coupled to the protected network and to a cloud platform, wherein the one or more attack mitigation devices are configured and operable to decrypt the encrypted network traffic received from the cloud platform and destined to the protected network to form a plurality of decrypted network packets, analyze the plurality of decrypted network packets to detect one or more attacks, generate, in response to detecting the one or more attacks, one or more attack signatures corresponding to the one or more detected attacks and send the generated one or more attack signatures to one or more attack mitigation services; and
the one or more attack mitigation services provided in the cloud platform, wherein the one or more attack mitigation services are configured and operable to block encrypted network traffic matching the one or more attack signatures from reaching the protected network.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for mitigating network attacks within encrypted network traffic is provided. The system includes a protected network including a plurality of devices. The system further includes attack mitigation devices communicatively coupled to the protected network and to a cloud platform. The attack mitigation devices are configured and operable to decrypt the encrypted traffic received from the cloud platform and destined to the protected network to form a plurality of decrypted network packets and analyze the plurality of decrypted network to detect attacks. The attack mitigation devices are further configured to generate, in response to detecting the attacks, attack signatures corresponding to the detected attacks and configured to send the generated attack signatures to attack mitigation services provided in the cloud platform. The attack mitigation services are configured and operable to drop encrypted network traffic matching the attack signatures received from the attack mitigation devices.
-
Citations
20 Claims
-
1. A system for mitigating network attacks within encrypted network traffic, the system comprising:
-
a protected network comprising a plurality of devices; one or more attack mitigation devices communicatively coupled to the protected network and to a cloud platform, wherein the one or more attack mitigation devices are configured and operable to decrypt the encrypted network traffic received from the cloud platform and destined to the protected network to form a plurality of decrypted network packets, analyze the plurality of decrypted network packets to detect one or more attacks, generate, in response to detecting the one or more attacks, one or more attack signatures corresponding to the one or more detected attacks and send the generated one or more attack signatures to one or more attack mitigation services; and the one or more attack mitigation services provided in the cloud platform, wherein the one or more attack mitigation services are configured and operable to block encrypted network traffic matching the one or more attack signatures from reaching the protected network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An attack mitigation device communicatively coupled to a protected network and to a cloud platform, the attack mitigation device comprising logic integrated with and/or executable by a processor, the logic being adapted to:
-
decrypt encrypted network traffic received from the cloud platform and destined to the protected network to form a plurality of decrypted network packets; analyze the plurality of decrypted network packets to detect one or more attacks; generate, in response to detecting the one or more attacks, one or more attack signatures corresponding to the one or more detected attacks; and send the generated one or more attack signatures to one or more attack mitigation services in the cloud platform. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification