×

Detection of and responses to network attacks

  • US 8,499,348 B1
  • Filed: 12/28/2010
  • Issued: 07/30/2013
  • Est. Priority Date: 12/28/2010
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer-readable medium embodying a program executable in a computing device, the program comprising:

  • code that monitors data communications transmitted to a target class of first computing nodes;

    code that, in response to detecting a non-legitimate data communication to a computing node in the target class, determines whether the non-legitimate data communication is a form of attack on a network to which the computing nodes are connected by tracking a number of attempted data communications from a source of the non-legitimate data communication against computing nodes in the target class of computing nodes and comparing the number against a threshold value,wherein membership of the target class of first computing nodes is made up of computing nodes that are not currently allocated to users within a data center and have been previously allocated to users, the data center further comprising second computing nodes connected to the network, wherein the second computing nodes are not part of the target class;

    code that, in response to determining that the network is under attack, implementing new security measures for the second computing nodes that are not part of the target class to protect the second computing nodes against the attack on the network while the attack is ongoing; and

    code that receives authorization from a user of a particular second computing node before making changes to access policies of the particular second computing node as part of the new security measures.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×