Determining the likelihood of traffic being legitimately received at a proxy server in a cloud-based proxy service
First Claim
1. A method in a first one of a plurality of proxy servers that are anycasted to a same IP address, the method comprising:
- receiving, at the first one of the plurality of proxy servers, a first packet that has a first source IP address, wherein the first packet is received at the first proxy server as a result of an anycast protocol implementation selecting that first proxy server as the closest out of the plurality of proxy servers in terms of routing protocol metric used to route traffic to the plurality of proxy servers, and wherein the first proxy server is in a different geographic location than other ones of the plurality of proxy servers;
determining, using a data structure that indicates a plurality of source IP addresses from which packets are not likely to be legitimately received at that first proxy server, whether the received first packet is likely to be legitimately received at the first proxy server, wherein the data structure is built based on historical analysis of source IP addresses of packets received at the plurality of proxy servers when there is not currently a denial of service (DoS) attack associated with the plurality of proxy servers that are anycasted, and wherein the received first packet is likely to be legitimately received at the first proxy server when a probability determined using the historical analysis is above a threshold value, the probability retrieved from a probability map; and
blocking the received first packet responsive to a determination that the received first packet is not likely to be legitimately received at the first proxy server, wherein determining using the data structure that the received first packet is not likely to be legitimately received at the first proxy server is an indication that a legitimate packet having that first source IP address should be received at a different one of the plurality of proxy servers.
0 Assignments
0 Petitions
Accused Products
Abstract
Message(s) are received from each one of multiple proxy servers, which are anycasted to the same IP address, that indicate source IP addresses of packets that are received that are directed to that same IP address. These proxy servers receive the packets as result of domain(s) resolving to that same IP address, and a particular one of the proxy servers receives the packets as a result of an anycast protocol implementation selecting that proxy server. Based on these message(s) from each of the proxy servers, a determination of the likelihood of a packet having a particular source IP address being legitimately received at each of the proxy servers is determined. A message is transmitted to each of the proxy servers that indicates which source IP addresses of packets are not likely to be legitimately received at that proxy server.
112 Citations
19 Claims
-
1. A method in a first one of a plurality of proxy servers that are anycasted to a same IP address, the method comprising:
-
receiving, at the first one of the plurality of proxy servers, a first packet that has a first source IP address, wherein the first packet is received at the first proxy server as a result of an anycast protocol implementation selecting that first proxy server as the closest out of the plurality of proxy servers in terms of routing protocol metric used to route traffic to the plurality of proxy servers, and wherein the first proxy server is in a different geographic location than other ones of the plurality of proxy servers; determining, using a data structure that indicates a plurality of source IP addresses from which packets are not likely to be legitimately received at that first proxy server, whether the received first packet is likely to be legitimately received at the first proxy server, wherein the data structure is built based on historical analysis of source IP addresses of packets received at the plurality of proxy servers when there is not currently a denial of service (DoS) attack associated with the plurality of proxy servers that are anycasted, and wherein the received first packet is likely to be legitimately received at the first proxy server when a probability determined using the historical analysis is above a threshold value, the probability retrieved from a probability map; and blocking the received first packet responsive to a determination that the received first packet is not likely to be legitimately received at the first proxy server, wherein determining using the data structure that the received first packet is not likely to be legitimately received at the first proxy server is an indication that a legitimate packet having that first source IP address should be received at a different one of the plurality of proxy servers. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus, comprising:
-
a plurality of proxy servers that are anycasted to a same destination IP address, wherein each of the plurality of proxy servers is configured to perform the following; receive packets at the same destination IP address, wherein this proxy server receives the packets at the same destination IP address as a result of an anycast protocol implementation selecting this one of the plurality of proxy servers as the closest in terms of routing protocol metric used to route traffic to the plurality of proxy servers; transmit one or more messages to a central server computer that indicate source IP addresses of the received packets; receive, from the central server computer, a message that indicates a plurality of source IP addresses of packets that are not likely to be legitimately received at that proxy server, wherein the packets are not likely to be legitimately received at that proxy server when a probability determined using a historical analysis of source IP addresses of packets received at the plurality of proxy servers when there is not currently a denial of service (DoS) attack associated with the plurality of proxy servers that are anycasted is below a threshold value, the probability retrieved from a probability map; install, based on the received message, one or more rules to rate limit packets that are received having a source IP address that is not likely to be legitimately received at that proxy server but rather should be received at a different one of the proxy servers; and rate limit packets, based on the one or more rules, that that are received having a source IP address that is not likely to be legitimately received at that proxy server but rather should be received at a different one of the proxy servers; and the central server computer coupled with the plurality of proxy servers, wherein the central server computer is configured to perform the following; receive, from each of the plurality of proxy servers, the one or more messages that indicate source IP addresses of the received packets; determine, based on the one or more messages received from the plurality of proxy servers, a likelihood of a packet having a particular source IP address being legitimately received at each of the proxy servers; and transmit, to each of the proxy servers, the message that indicates which source IP addresses of packets are not likely to be legitimately received at that proxy server. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium that provides instructions that, if executed by a processor of a first one of a plurality of proxy servers that are anycasted to a same IP address, will cause said processor to perform operations comprising:
-
receiving, at a first one of the plurality of proxy servers, a first packet that has a first source IP address, wherein the first packet is received at the first proxy server as a result of an anycast protocol implementation selecting that first proxy server as the closest out of the plurality of proxy servers in terms of routing protocol metric used to route traffic to the proxy servers, and wherein the first proxy server is in a different geographic location than other ones of the plurality of proxy servers; determining, using a data structure that indicates a plurality of source IP addresses from which packets are not likely to be legitimately received at that first proxy server, whether the received first packet is likely to be legitimately received at the first proxy server, wherein the data structure is built based on historical analysis of source IP addresses of packets received at the plurality of proxy servers when there is not currently a denial of service (DoS) attack associated with the plurality of proxy servers that are anycasted, and wherein the received first packet is likely to be legitimately received at the first proxy server when a probability determined using the historical analysis is above a threshold value, the probability retrieved from a probability map; and blocking the received first packet responsive to a determination that the received first packet is not likely to be legitimately received at the first proxy server, wherein determining using the data structure that the received first packet is not likely to be legitimately received at the first proxy server is an indication that a legitimate packet having that first source IP address should be received at a different one of the plurality of proxy servers. - View Dependent Claims (16, 17, 18, 19)
-
Specification