System, method and apparatus that employ virtual private networks to resist IP QoS denial of service attacks
First Claim
1. A system comprising:
- a Differentiated Services (Diffserv)-enabled Internet Protocol (IP) Virtual Private Network (VPN) network, including at least a first boundary router;
an IP public network, including at least a second boundary router;
a plurality of Customer Local Area Networks (LANs), the LANs each including one or more hosts that function as a transmitter and/or receiver of packets communicated over one or both of the Diffserv-enabled VPN network and IP public network;
a plurality of access networks, each access network coupled, via a Customer Premise Equipment (CPE) edge router and a physical access link, to a respective LAN;
wherein the access network has a first logical connection to the at least first boundary router in the Diffserv-enabled VPN network and a separate, second logical connection to the at least second boundary router in the IP public network to prevent denial of service attacks on the physical access link originating from sources outside the VPN, the CPE edge router routing only packets with IP address prefixes belonging to the IP VPN via the Diffserv-enabled IP VPN network and routing all other traffic via the IP public network.
5 Assignments
0 Petitions
Accused Products
Abstract
An approach provides a communication network that supports one or more network-based Virtual Private Networks (VPNs) to resist Denial of Service (DoS) attacks. A first boundary router is configured to provide a Virtual Private Network (VPN) that supports quality of service levels, and interfaces an access network via a Customer Premise Equipment (CPE) edge router and a physical access link. A second boundary router is coupled to a public network. The access network connects to the first boundary router, and wherein the first boundary router and the second boundary router are connected by a separate logical connection to prevent denial of service attacks on the physical access link originating from sources outside the VPN.
78 Citations
18 Claims
-
1. A system comprising:
-
a Differentiated Services (Diffserv)-enabled Internet Protocol (IP) Virtual Private Network (VPN) network, including at least a first boundary router; an IP public network, including at least a second boundary router; a plurality of Customer Local Area Networks (LANs), the LANs each including one or more hosts that function as a transmitter and/or receiver of packets communicated over one or both of the Diffserv-enabled VPN network and IP public network; a plurality of access networks, each access network coupled, via a Customer Premise Equipment (CPE) edge router and a physical access link, to a respective LAN; wherein the access network has a first logical connection to the at least first boundary router in the Diffserv-enabled VPN network and a separate, second logical connection to the at least second boundary router in the IP public network to prevent denial of service attacks on the physical access link originating from sources outside the VPN, the CPE edge router routing only packets with IP address prefixes belonging to the IP VPN via the Diffserv-enabled IP VPN network and routing all other traffic via the IP public network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
interfacing a virtual private network (VPN) to a respective access network via a Customer Premise Equipment (CPE) edge router and a physical access link; connecting each of the access networks to at least one first boundary router within the VPN; and connecting the at least one first boundary router to at least one second boundary router within a public network by a logical connection, the logical connection being separate from the physical access link, such that denial of service attacks on the physical access link originating from sources outside the VPN can be prevented, wherein the CPE edge router routes only packets with IP address prefixes belonging to the VPN via a Diffserv-enabled IP VPN network and routes all other traffic via the public network. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification