Methods, media and systems for responding to a denial of service attack
First Claim
Patent Images
1. A method for responding to a Denial of Service (DoS) attack, comprising:
- detecting the denial of service attack;
migrating one or more processes, that provide a service to a client, and that are running on a target server, from the target server to a migration server in response to the detecting of the denial of service attack by;
saving information regarding the one or more processes at the target server;
transferring the saved information to the migration server from the target server using an unpublicized link; and
restarting the one or more processes on the migration server using the saved information;
identifying users as not being sources of the denial of service attack by authenticating users that are authorized to use the service;
routing traffic generated by users identified as not being sources of the denial of service attack to the migration server; and
periodically changing an IP address associated with the unpublicized link.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, media and systems for responding to a Denial of Service (DoS) attack are provided. In some embodiments, a method includes detecting a DoS attack, migrating one or more processes that provide a service to an unaffected system; authenticating users that are authorized to use the service; and routing traffic generated by authenticated users to the unaffected system.
182 Citations
13 Claims
-
1. A method for responding to a Denial of Service (DoS) attack, comprising:
-
detecting the denial of service attack; migrating one or more processes, that provide a service to a client, and that are running on a target server, from the target server to a migration server in response to the detecting of the denial of service attack by; saving information regarding the one or more processes at the target server; transferring the saved information to the migration server from the target server using an unpublicized link; and restarting the one or more processes on the migration server using the saved information; identifying users as not being sources of the denial of service attack by authenticating users that are authorized to use the service; routing traffic generated by users identified as not being sources of the denial of service attack to the migration server; and periodically changing an IP address associated with the unpublicized link. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory computer-readable medium containing computer-executable instructions that, when executed by a processor, cause the processor to perform a method for responding to a DoS attack, comprising:
-
detecting the denial of service attack; migrating one or more processes, that provide a service to a client, and that are running on a target server, from the target server to a migration server in response to the detecting of the denial of service attack by; saving information regarding the one or more processes at the target server; transferring the saved information to the migration server from the target server using an unpublicized link; and restarting the one or more processes on the migration server using the saved information; identifying users as not being sources of the denial of service attack by authenticating users that are authorized to use the service; routing traffic generated by users identified as not being sources of the denial of service attack to the migration server; and periodically changing an IP address associated with the unpublicized link. - View Dependent Claims (7, 8, 9)
-
-
10. A system for responding to a DoS attack, comprising:
-
a migration system configured to migrate one or more processes, that provide a service to a client, and that are running on a target server from the target server to a migration server when the target server is affected by the denial of service attack, in response to the detecting of the denial of service attack by; saving information regarding the one or more processes at the target server; transferring the saved information to the migration server from the target server using an unpublicized link, wherein an IP address associated with the unpublicized link is periodically changed; and restarting the one or more processes on the migration server using the saved information; and an overlay network configured to identify users as not being sources of the denial of service attack by authenticating authorized users and route traffic from the users identified as not being sources of the denial of service attack to the migration server. - View Dependent Claims (11, 12, 13)
-
Specification