×

Detecting and deterring network attacks

  • US 10,819,727 B2
  • Filed: 10/15/2018
  • Issued: 10/27/2020
  • Est. Priority Date: 10/15/2018
  • Status: Active Grant
First Claim
Patent Images

1. A system to detect a network attack, comprising:

  • a first device, comprising;

    a first processor;

    a first non-transitory computer-readable medium to store a plurality of modules comprising instructions executable by the first processor;

    a first time input in communication with a high-precision time source;

    a first time stamping module in communication with the first time input to associate a first time stamp with each of a first plurality of data packets, the first time stamp corresponding to a time that each data packet is transmitted by the first device according to the high-precision time source; and

    a network interface to transmit the first plurality of data packets through a data network;

    a second device, comprising;

    a second processor;

    a second non-transitory computer-readable medium to store a plurality of modules comprising instructions executable by the second processor;

    a second time input in communication with the high-precision time source;

    a second time stamping module in communication with the second time input to associate a second time stamp with each of the first plurality of data packets, the second time stamp corresponding to a time that each data packet is received by the second device according to the high-precision time source;

    a time of flight subsystem module to;

    determine a time of flight for each of the first plurality of data packets based on the first time stamp and the second time stamp; and

    determine whether the time of flight for each of the first plurality of data packets is consistent with at least one valid time of flight; and

    a protective action subsystem module to implement a protective action based on a determination that the time of flight of at least one of the first plurality of data packets is inconsistent with the at least one valid time of flight;

    wherein the protective action comprises detecting that the first time input is compromised based on the determination that the time of flight of at least one of the first plurality of data packets is inconsistent with the at least one valid time of flight and selectively rerouting at least one of the first plurality of data packets.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×