Unified monitoring and detection of intrusion attacks in an electronic system
First Claim
1. A method for detecting denial of service attacks on a resource in an electronic system, wherein access to the resource is based on payments in electronic security value units, comprising:
- detecting patterns of payments for the resource over a plurality of users in electronic security value units;
comparing the patterns of payments to predetermined patterns of payment; and
indicating a denial of service attack based upon the comparison of the patterns of payments to the predetermined patterns of payment.
2 Assignments
0 Petitions
Accused Products
Abstract
An inventive monitor monitors accesses to a resource in an electronic system, such that access to the resource is based on payments in electronic security value units. The monitor detects patterns of payments for the resource in electronic security value units, and compares the patterns of payments to predetermined patterns of payment. In addition, the monitor determines a difference in the compared patterns of payments to the predetermined patterns of payment, such that when the difference is greater than a predetermined threshold difference, an attack is indicated.
-
Citations
11 Claims
-
1. A method for detecting denial of service attacks on a resource in an electronic system, wherein access to the resource is based on payments in electronic security value units, comprising:
-
detecting patterns of payments for the resource over a plurality of users in electronic security value units; comparing the patterns of payments to predetermined patterns of payment; and indicating a denial of service attack based upon the comparison of the patterns of payments to the predetermined patterns of payment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification