×

Detection of and responses to network attacks

  • US 9,258,319 B1
  • Filed: 06/28/2013
  • Issued: 02/09/2016
  • Est. Priority Date: 12/28/2010
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer-readable medium storing specific instructions that, when executed, cause at least one computing device to at least:

  • monitor data communications transmitted to a target class of first computing nodes,wherein the target class of first computing nodes comprises computing nodes that are allocated to users and have dropped data communications associated with a particular data transmission port that is blocked by the first computing nodes;

    in response to detecting a dropped data communication to a computing node in the target class associated with the particular data transmission port, determine whether the dropped data communication is a form of attack on a network to which the computing nodes are connected by tracking a number of attempted data communications from a source of the dropped data communication against computing nodes in the target class of first computing nodes and comparing the number against a threshold value;

    in response to determining that the network is under attack, implement new security measures for second computing nodes that are not part of the target class and allow for communications associated with the particular data transmission port to protect the second computing nodes against the attack on the network while the attack is ongoing, wherein the new security measures are implemented by generating a list of one or more internet protocol addresses associated with one or more sources of the dropped data communications and sending the list of one or more internet protocol addresses to at least one transmission manager for the second computing nodes, wherein the at least one transmission manager is configured to drop a communication from an internet protocol address and to the particular data transmission port contained on the list that is sent to one or more of the second computing nodes; and

    receive authorization from one or more users of the second computing nodes before making changes to access policies of the second computing nodes.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×