×

Two-stage hash based logic for application layer distributed denial of service (DDoS) attack attribution

  • US 9,973,528 B2
  • Filed: 12/21/2015
  • Issued: 05/15/2018
  • Est. Priority Date: 12/21/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by a distributed denial of service (DDoS) detection module of a DDoS mitigation appliance within a network, information regarding a plurality of application layer attributes for which an attack status is to be monitored, wherein the plurality of application layer attributes comprise strings of characters and wherein the strings are variable-length and some of the strings have a potential for exceeding one hundred characters;

    determining the attack status for each of the plurality of monitored attributes by comparing, by the DDoS detection module, granular traffic rates directed to a first hash value of each of the plurality of monitored attributes to a plurality of corresponding adaptive thresholds, wherein the first hash value is calculated based on a first hash algorithm;

    when a granular traffic rate for the first hash value of a particular monitored attribute of the plurality of monitored attributes exceeds an adaptive threshold for the particular monitored attribute, the particular monitored attribute is determined to be an under-attack attribute;

    storing, by the DDoS monitor module, details regarding the under-attack attribute in a memory of the DDoS detection module;

    storing, by the DDoS monitor module, the first hash value of each of the plurality of monitored attributes in a first stage table in the memory;

    storing, by the DDoS monitor module, the details of the under-attack attribute in a second stage table in the memory after the under-attack attribute is determined;

    calculating, by the DDoS monitor module, a second hash value of the under-attack attribute based on a second hash algorithm;

    calculating, by the DDoS monitor module, a drop count for the second hash value of the under-attack attribute;

    when the drop count for the second hash value of the under-attack attribute does not exceed an adaptive threshold for the under-attack attribute, the under-attack attribute is determined to be a victim attribute;

    notifying, by the DDoS detection module, a host computer coupled to the DDoS detection module of the attack status and the details of the under-attack attribute; and

    responsive to identifying the under-attack attribute, causing, by the DDoS detection module, subsequently received packets having the under-attack attribute to be dropped for a pre-determined blocking period.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×