×

System for finding potential origins of spoofed internet protocol attack traffic

  • US 8,806,634 B2
  • Filed: 01/27/2012
  • Issued: 08/12/2014
  • Est. Priority Date: 04/05/2005
  • Status: Active Grant
First Claim
Patent Images

1. A system for identifying a set of potential origins of Internet Protocol data packets on a network by a computer, said system comprising:

  • a plurality of cooperating locations on said network, said cooperating locations providing accurate and reliable information as to whether an identified data packet did or did not pass through said cooperating locations at an identified point in time;

    a plurality of non-cooperating locations on said network, said non-cooperating locations receiving and transmitting data packets yet providing no or false information as to whether said identified data packet did or did not pass through said non-cooperating locations at said identified point in time;

    a means for querying each of said cooperating locations as to whether said identified data packet did or did not pass through said cooperating locations at said identified point in time;

    a response from each of said cooperating locations;

    each response being a first predetermined value if said identified data packet did pass through said cooperating locations at said identified point in time;

    each response being a second predetermined value if said identified data packet did not pass through said cooperating locations at said identified point in time;

    said first predetermined value being different from said second predetermined value;

    a link signature for each of said identified data packets;

    said link signature comprising a string of digits including a plurality of said first predetermined values and a plurality of said second predetermined values;

    a table of origins, said table of origins comprising identified destination locations, unions of all link signatures matching data packet information available for said identified data packet and origin locations consistent with said link signatures;

    a sub-system for dividing said locations into blocks, where such blocks comprise said cooperating locations that have identical link signatures for routing the identified data packet to any location from another identified block at said identified point in time; and

    a reverse routing table, said table reverse routing table comprising link signatures identifying at least one valid routing between selected locations in each destination/source pair of blocks in said network for said identified point in time; and

    a means for said system to identify the set of possible origins for an identified data packet when a system user supplies a destination location and data packet information for said identified data packet.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×