Methods, systems, and apparatus for mitigating network-based attacks
First Claim
Patent Images
1. A method of mitigating a replay attack, the method comprising:
- obtaining a first request associated with a transaction;
associating a request identifier of the first request with the transaction;
comparing a count of outstanding requests associated with a user to a throttling limit;
processing the first request if a request type and the request identifier of the first request corresponds to a current state of the transaction, the first request is an only request received having the request type and the request identifier of the first request, and the count of outstanding requests does not violate the throttling limit, the current state being one of a plurality of states for processing the transaction;
denying the first request if the request type of the first request does not correspond to the current state of the transaction, another received request has a same request type and a same request identifier of the first request, or the count of outstanding requests associated with the user violates the throttling limit;
obtaining an additional request associated with the transaction;
processing the additional request if a corresponding request identifier of the additional request matches the request identifier associated with the transaction; and
denying the additional request if the corresponding request identifier of the additional request does not match the request identifier associated with the transaction.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, computer program products, and articles of manufacture for mitigating a network-based attack are described. A first request associated with a transaction is obtained and a tracking identifier of the first request is associated with the transaction. A count of outstanding requests associated with a user is compared to a throttling limit. If the count of outstanding requests associated with the user is greater than the throttling limit, processing of the first request may be denied.
-
Citations
19 Claims
-
1. A method of mitigating a replay attack, the method comprising:
-
obtaining a first request associated with a transaction; associating a request identifier of the first request with the transaction; comparing a count of outstanding requests associated with a user to a throttling limit; processing the first request if a request type and the request identifier of the first request corresponds to a current state of the transaction, the first request is an only request received having the request type and the request identifier of the first request, and the count of outstanding requests does not violate the throttling limit, the current state being one of a plurality of states for processing the transaction; denying the first request if the request type of the first request does not correspond to the current state of the transaction, another received request has a same request type and a same request identifier of the first request, or the count of outstanding requests associated with the user violates the throttling limit; obtaining an additional request associated with the transaction; processing the additional request if a corresponding request identifier of the additional request matches the request identifier associated with the transaction; and denying the additional request if the corresponding request identifier of the additional request does not match the request identifier associated with the transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus for mitigating a replay attack, comprising:
-
a processor; and memory to store instructions that;
when executed by the processor;
cause the processor to perform operations comprising;obtaining a first request associated with a transaction; associating a request identifier of the first request with the transaction; comparing a count of outstanding requests associated with a user to a throttling limit; processing the first request if a request type and the request identifier of the first request corresponds to a current state of the transaction, the first request is an only request received having the request type and the request identifier of the first request; and
the count of outstanding requests does not violate the throttling limit, the current state being one of a plurality of states for processing the transaction;denying the first request if the request type of the first request does not correspond to the current state of the transaction, another received request has a same request type and a same request identifier of the first request, or the count of outstanding requests associated with the user violates the throttling limit; obtaining an additional request associated with the transaction; processing the additional request if a corresponding request identifier of the additional request matches the request identifier associated with the transaction; and denying the additional request if the corresponding request identifier of the additional request does not match the request identifier associated with the transaction. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory machine-readable storage medium comprising instructions that, when executed by one or more processors of a machine, cause the machine to perform operations comprising:
-
obtaining a first request associated with a transaction; associating a request identifier of the first request with the transaction; comparing a count of outstanding requests associated with a user to a throttling limit; processing the first request if a request type and the request identifier of the first request corresponds to a current state of the transaction, the first request is an only request received having the request type and the request identifier of the first request, and the count of outstanding requests does not violate the throttling limit, the current state being one of a plurality of states for processing the transaction; denying the first request if the request type of the first request does not correspond to the current state of the transaction, another received request has a same request type and a same request identifier of the first request, or the count of outstanding requests associated with the user violates the throttling limit; obtaining an additional request associated with the transaction; processing the additional request if a corresponding request identifier of the additional request matches the request identifier associated with the transaction; and denying the additional request if the corresponding request identifier of the additional request does not match the request identifier associated with the transaction. - View Dependent Claims (17, 18, 19)
-
Specification