Identifying source of malicious network messages
First Claim
1. A method for identifying source of malicious network messages, said method comprising steps implemented by a computer of:
- identifying a subset of a multiplicity of source networks, said subset including one or more source networks which have sent messages to one of a plurality of destination locations having a same Internet Protocol (IP) address, wherein identifying said subset comprises;
the computer determining for each of said multiplicity of source networks whether there are fewer intervening hops from said each source network to said one destination location than from said each source network to other of said plurality of destination locations;
responsive to a determination that there are fewer intervening hops for said each source network of said multiplicity of source networks, the computer identifying said each source network as included in said subset, andresponsive to determining there are not fewer intervening hops for said each source network of said multiplicity of source networks, the computer not identifying said each source network as included in said subset;
wherein one or more source networks are continuing to send messages to said one destination location, and further comprising a step of sequentially applying filters to block messages from respective source networks in said subset to determine which source network in said subset is sending said messages, wherein one of said source networks in said subset has sent said messages to said one destination location and said messages are malicious.
2 Assignments
0 Petitions
Accused Products
Abstract
System, method and program for identifying a subset of a multiplicity of source networks. The subset including one or more source networks which have sent messages to one of a plurality of destination locations having a same IP address. For each of the multiplicity of source networks, a determination is made whether there are fewer intervening hops from the source network to the one destination location than from the source network to other of the plurality of destination locations. If so, the source network is included in the subset. If not, the source network is not included in the subset. One application of the present invention is to identify a source of a denial of service attack. After the subset is identified, filters can be sequentially applied to block messages from respective source networks in the subset to determine which source network in the subset is sending the messages.
-
Citations
12 Claims
-
1. A method for identifying source of malicious network messages, said method comprising steps implemented by a computer of:
-
identifying a subset of a multiplicity of source networks, said subset including one or more source networks which have sent messages to one of a plurality of destination locations having a same Internet Protocol (IP) address, wherein identifying said subset comprises; the computer determining for each of said multiplicity of source networks whether there are fewer intervening hops from said each source network to said one destination location than from said each source network to other of said plurality of destination locations; responsive to a determination that there are fewer intervening hops for said each source network of said multiplicity of source networks, the computer identifying said each source network as included in said subset, and responsive to determining there are not fewer intervening hops for said each source network of said multiplicity of source networks, the computer not identifying said each source network as included in said subset; wherein one or more source networks are continuing to send messages to said one destination location, and further comprising a step of sequentially applying filters to block messages from respective source networks in said subset to determine which source network in said subset is sending said messages, wherein one of said source networks in said subset has sent said messages to said one destination location and said messages are malicious. - View Dependent Claims (2, 3, 4)
-
-
5. A system for identifying source of malicious network messages, said system comprising:
-
a CPU, a computer readable memory and a computer readable storage media; program instructions to identify a subset of a multiplicity of source networks, said subset including one or more source networks which have sent messages to one of a plurality of destination locations having a same Internet Protocol (IP) address, wherein said program instructions to identify said subset comprises; first program instructions to determine for each of said multiplicity of source networks whether there are fewer intervening hops from said each source network to said one destination location than from said each source network to other of said plurality of destination locations; and second program instructions, responsive to a determination that there are fewer intervening hops from said each source network to said one destination location than from said each source network to other of said plurality of destination locations, to identify said each source network as included in said subset, and responsive to a determination that there are not fewer intervening hops from said each source network to said one destination location than from said each source network to other of said plurality of destination locations, for not identifying said each source network as included in said subset; wherein one or more source networks are continuing to send messages to said one destination location, and further comprising program instructions to sequentially apply filters to block messages from respective source networks in said subset to determine which source network in said subset is sending said messages, wherein one of said source networks in said subset has sent said messages to said one destination location and said messages are malicious; and
whereinall of the program instructions are stored on the computer readable storage media for execution by the CPU via the computer readable memory. - View Dependent Claims (6, 7, 8)
-
-
9. A computer program product for source of malicious network messages, said computer program product comprising:
-
a non-transitory computer readable storage medium; program instructions to identify a subset of a multiplicity of source networks, said subset including one or more source networks which have sent messages to one of a plurality of destination locations having a same Internet Protocol (IP) address, wherein said program instructions to identify said subset comprises; first program instructions to determine for each of said multiplicity of source networks whether there are fewer intervening hops from said each source network to said one destination location than from said each source network to other of said plurality of destination locations; and second program instructions, responsive to a determination that there are fewer intervening hops from said each source network to said one destination location than from said each source network to other of said plurality of destination locations, to identify said each source network as included in said subset, and responsive to a determination that there are not fewer intervening hops from said each source network to said one destination location than from said each source network to other of said plurality of destination locations, to not identify said each source network as included in said subset; wherein one or more source networks are continuing to send messages to said one destination location, and further comprising program instructions to sequentially apply filters to block messages from respective source networks in said subset to determine which source network in said subset is sending said messages, wherein one of said source networks in said subset has sent said messages to said one destination location and said messages are malicious; and
whereinall of said program instructions are stored on said non-transitory computer readable storage medium. - View Dependent Claims (10, 11, 12)
wherein said fourth program instructions are stored on said medium.
-
Specification