×

Protecting networks from cyber attacks and overloading

  • US 9,094,445 B2
  • Filed: 03/15/2013
  • Issued: 07/28/2015
  • Est. Priority Date: 03/15/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • at each packet-filtering device of a plurality of packet-filtering devices interfacing a plurality of different autonomous system networks;

    receiving, via a communication interface of the packet-filtering device, a plurality of packets;

    responsive to a determination, by at least one processor of the packet-filtering device, that a network-overload condition impacting effective transmission capacity at a peering point interfacing two of the plurality of different autonomous system networks has occurred, applying, by the packet-filtering device and to at least some of the plurality of packets, a first group of packet-filtering rules stored in a memory of the packet-filtering device, the first group of packet-filtering rules comprising at least one five-tuple indicating a first set of packets that should be allowed to continue via the peering point toward their respective destinations, wherein applying the first group of packet-filtering rules comprises allowing at least a first portion of the plurality of packets, comprising packets that fall within the first set of packets, to continue via the peering point toward their respective destinations;

    responsive to a determination, by the at least one processor, that the network-overload condition has been mitigated to a first degree, applying, by the packet-filtering device and to at least some of the plurality of packets, a second group of packet-filtering rules stored in the memory, the second group of packet-filtering rules comprising at least one five-tuple indicating a second set of packets that should be allowed to continue via the peering point toward their respective destinations, wherein applying the second group of packet-filtering rules comprises allowing at least a second portion of the plurality of packets, comprising packets that fall within the second set of packets, to continue via the peering point toward their respective destinations; and

    responsive to a determination, by the at least one processor, that the network-overload condition has been mitigated to a second degree, applying, by the packet-filtering device and to at least some of the plurality of packets, a third group of packet-filtering rules stored in the memory, the third group of packet-filtering rules comprising at least one five-tuple indicating a third set of packets that should be allowed to continue via the peering point toward their respective destinations, wherein applying the third group of packet-filtering rules comprises allowing at least a third portion of the plurality of packets, comprising packets that fall within the third set of packets, to continue via the peering point toward their respective destinations, the second group of packet-filtering rules being less restrictive than the first group of packet-filtering rules, the third group of packet-filtering rules being less restrictive than the second group of packet-filtering rules, the second portion of the plurality of packets comprising more packets than the first portion of the plurality of packets, the third portion of the plurality of packets comprising more packets than the second portion of the plurality of packets, and the second degree comprising a greater degree of mitigation of the network-overload condition than the first degree.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×