×

Managing a DDoS attack

  • US 9,633,202 B2
  • Filed: 04/01/2013
  • Issued: 04/25/2017
  • Est. Priority Date: 09/14/2004
  • Status: Active Grant
First Claim
Patent Images

1. A computer program product for managing a distributed denial of service attack in a multiprocessor environment, the computer program product comprising:

  • one or more non-transitory computer-readable storage devices and program instructions stored on at least one of the one or more computer-readable storage devices, the program instructions comprising;

    program instructions to determine(a) a first upper threshold for a normal number of outbound network packets from the multiprocessor environment to multiple destination addresses on a network,(b) a second upper threshold for a normal ratio of the outbound network packets from the multiprocessor environment to the multiple destination addresses, and(c) a third upper threshold for a normal ratio of outbound network packets from the multiprocessor environment to a single port at a single destination address compared to outbound network packets from the multiprocessor environment to the multiple destination addresses;

    program instructions to;

    monitor the number of outgoing packets from the multiprocessor environment with respect to the multiple destination addresses, andbased on the monitoring of the outgoing packets from the multiprocessor environment, detect that the first upper threshold and the second upper threshold are exceeded in the multiprocessor environment, andinitiate monitoring of a specific port and protocol at the single destination address, the specific port being monitored to detect a high proportion of packets sent to the specific port, and the protocol being monitored to detect a consistent use of the protocol for all packets at the specific port;

    program instructions to,based on the initiated monitoring of the specific port and protocol, detect that the third upper threshold is exceeded for the outbound network packets being sent to the specific port being monitored and detect a consistent use of the protocol for all packets at the specific port, andinitiate monitoring of the outgoing traffic to detect a high proportion of timeouts compared to baseline values of timeouts coming from a portion of a subnet address space of said network in order to determine that an apparent distributed denial of service attack is in progress;

    program instructions to,based on detecting a high proportion of timeouts compared to said baseline values coming from said portion of a subnet address space of said network,start blocking measures to mitigate the apparent distributed denial of service attack; and

    program instructions to notify an administrator of the multiprocessor environment of the apparent distributed denial of service attack.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×