Systems and methods for detecting and preventing flooding attacks in a network environment
First Claim
Patent Images
1. A method for processing network traffic data, comprising:
- receiving a packet to initiate a new session associated with an Internet Protocol (IP) address;
when the packet is not a previously dropped packet being retransmitted, dropping the packet;
when the packet is a previously dropped packet being retransmitted and when a number N of concurrent sessions for active concurrent sessions associated with the IP address is less than a concurrent session threshold T1, passing the packet toward an intended recipient;
when the packet is a previously dropped packet being retransmitted and when the number N of concurrent sessions for active concurrent sessions associated with the IP address is greater than a concurrent session threshold T1;
determining a rate R at which the number of sessions N are received within a time period t including a session of the received packet, where R=N÷
t;
when the session rate threshold R is less than the prescribed session rate threshold T2 (R<
T2), passing the packet toward the intended recipient; and
classifying the packet as possibly associated with a flooding attack when the session rate threshold R is greater than or equal to the prescribed session rate threshold T2 (R>
T2) and performing a preventative action with regard to the packet.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for processing network traffic data includes receiving a packet, and determining whether the packet is a previously dropped packet that is being retransmitted. A method for processing network traffic content includes receiving a plurality of headers, the plurality of headers having respective first field values, and determining whether the first field values of the respective headers form a first prescribed pattern. A method for processing network traffic content includes receiving a plurality of packets, and determining an existence of a flooding attack without tracking each of the plurality of packets with a SYN bit.
-
Citations
20 Claims
-
1. A method for processing network traffic data, comprising:
-
receiving a packet to initiate a new session associated with an Internet Protocol (IP) address; when the packet is not a previously dropped packet being retransmitted, dropping the packet; when the packet is a previously dropped packet being retransmitted and when a number N of concurrent sessions for active concurrent sessions associated with the IP address is less than a concurrent session threshold T1, passing the packet toward an intended recipient; when the packet is a previously dropped packet being retransmitted and when the number N of concurrent sessions for active concurrent sessions associated with the IP address is greater than a concurrent session threshold T1; determining a rate R at which the number of sessions N are received within a time period t including a session of the received packet, where R=N÷
t;when the session rate threshold R is less than the prescribed session rate threshold T2 (R<
T2), passing the packet toward the intended recipient; andclassifying the packet as possibly associated with a flooding attack when the session rate threshold R is greater than or equal to the prescribed session rate threshold T2 (R>
T2) and performing a preventative action with regard to the packet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory device-readable storage medium including a set of instructions stored thereon which when executed by a processor of a network switching device cause the network switching device to perform data processing activities comprising:
-
receiving a packet to initiate a new session associated with an Internet Protocol (IP) address; when the packet is not a previously dropped packet being retransmitted, dropping the packet; when the packet is a previously dropped packet being retransmitted and when a number N of concurrent sessions for active concurrent sessions associated with the IP address is less than a concurrent session threshold T1, passing the packet toward an intended recipient; when the packet is a previously dropped packet being retransmitted and when the number N of concurrent sessions for active concurrent sessions associated with the IP address is greater than a concurrent session threshold T1; determining a rate R at which the number of sessions N are received within a time period t including a session of the received packet, where R=N÷
t;when the session rate threshold R is less than the prescribed session rate threshold T2 (R<
T2), passing the packet toward the intended recipient; andclassifying the packet as possibly associated with a flooding attack when the session rate threshold R is greater than or equal to the prescribed session rate threshold T2 (R>
T2) and performing a preventative action with regard to the packet. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A network switching device, comprising:
-
a processor; a communication interface for communicating over a network; a memory device including instructions stored thereon which when executed by the processor, cause the device to perform data processing activities comprising; receiving a packet to initiate a new session associated with an Internet Protocol (IP) address; when the packet is not a previously dropped packet being retransmitted, dropping the packet; when the packet is a previously dropped packet being retransmitted and when a number N of concurrent sessions for active concurrent sessions associated with the IP address is less than a concurrent session threshold T1, passing the packet toward an intended recipient; when the packet is a previously dropped packet being retransmitted and when the number N of concurrent sessions for active concurrent sessions associated with the IP address is greater than a concurrent session threshold T1; determining a rate R at which the number of sessions N are received within a time period t including a session of the received packet, where R=N÷
t;when the session rate threshold R is less than the prescribed session rate threshold T2 (R<
T2), passing the packet toward the intended recipient; andclassifying the packet as possibly associated with a flooding attack when the session rate threshold R is greater than or equal to the prescribed session rate threshold T2 (R>
T2) and performing a preventative action with regard to the packet. - View Dependent Claims (18, 19, 20)
-
Specification