×

Efficiently isolating malicious data requests

  • US 9,137,325 B2
  • Filed: 02/11/2011
  • Issued: 09/15/2015
  • Est. Priority Date: 02/11/2011
  • Status: Active Grant
First Claim
Patent Images

1. At a computer system including at least one processor and a memory, in a computer networking environment including a plurality of computing systems, a computer-implemented method for using smart routing to limit service denials, the method comprising:

  • tracking, at a tracking module of a gateway node, a tally corresponding to each of a plurality tenants, each tally tracking a level of suspicion of the corresponding tenant'"'"'s use a plurality of server nodes serviced by the gateway node, including;

    each time that a server of the plurality of server nodes goes down, updating the corresponding tally for each tenant that was requesting data from said server node when said server node went down, including updating a particular tally for a particular tenant at least one time in connection with a server node going down; and

    each time that a server of the plurality of server nodes is determined to be overloaded, updating the corresponding tally for each tenant that was requesting data from said server node when said server node was determined to be overloaded, including updating the particular tally for the particular tenant at least one time in connection with a server node being overloaded;

    receiving, at a receiving module of the gateway node, one or more data requests from the particular tenant, the one or more data requests requesting data for an indicated service provided by the plurality of server nodes; and

    determining, at a route determining module of the gateway node, how to process the received one or more data requests from the particular tenant, including;

    based at least on the particular tally for the particular tenant being within a first range, determining that the particular tenant is on a malicious list, and blocking the one or more data requests;

    based at least on the particular tally for the particular tenant being within a second range, determining that the particular tenant is on a suspect list, and metering the one or more data requests; and

    based at least on the particular tally for the particular tenant being within a third range, determining that the particular tenant is on a good list, and permitting the one or more data requests with a lowest available level of restriction.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×