×

Identifying targets of network attacks

  • US 10,097,566 B1
  • Filed: 07/31/2015
  • Issued: 10/09/2018
  • Est. Priority Date: 07/31/2015
  • Status: Active Grant
First Claim
Patent Images

1. A content delivery system comprising:

  • a point of presence (“

    POP”

    ) comprising a plurality of computing devices, the point of presence configured to retrieve content requests and transmit, in response to the content requests, a plurality of sets of content;

    a domain name system (“

    DNS”

    ) server comprising one or more processors configured with specific computer-executable instructions to retrieve requests for network addresses of individual sets of content from the plurality of sets of content, and to respond to the requests for network addresses with a plurality of network addresses identifying computing devices from the point of presence at which the individual sets of content may be accessed; and

    one or more computing devices implementing a target lookup service, the one or more computing devices configured with specific computer-executable instructions to;

    detect a network attack on the content delivery system, the network attack directed to a plurality of attacked network addresses, wherein each attacked network address of plurality of attacked network addresses is associated with at least two of the plurality of sets of content on the content delivery system;

    generate a mapping between the individual sets of content and corresponding combinations of network addresses on the content delivery system at which the individual sets of content may be accessed, the corresponding combinations of network addresses determined based at least in part on identifiers of the individual sets of content;

    compare the plurality of attacked network addresses to the generated mapping to identify a first set of content from the plurality of sets of content that is associated with each attacked network address of the plurality of attacked network addresses; and

    identify the first set of content as a target of the network attack.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×