Methods, systems, and computer program products for protecting against IP prefix hijacking
    21.
    发明授权
    Methods, systems, and computer program products for protecting against IP prefix hijacking 有权
    用于防止IP前缀劫持的方法,系统和计算机程序产品

    公开(公告)号:US08769662B2

    公开(公告)日:2014-07-01

    申请号:US13657350

    申请日:2012-10-22

    CPC classification number: H04L63/14 H04L63/00 H04L63/1466

    Abstract: A communication network is operated by identifying at least one potential hijack autonomous system (AS) that can be used to generate a corrupt routing path from a source AS to a destination AS. For each of the at least one potential hijack AS the following operations are performed: identifying at least one regional AS that is configured to adopt the corrupt routing path from the source AS to the destination AS and determining a reflector AS set such that, for each reflector AS in the set, a source AS to reflector AS routing path and a reflector AS to destination AS routing path do not comprise any of the at least one regional AS. A reflector AS is then identified that is common among the at least one reflector AS set responsive to performing the identifying and determining operations for each, of the at least one potential hijack AS.

    Abstract translation: 通过识别至少一个潜在的劫持自治系统(AS)来操作通信网络,该系统可用于生成从源AS到目的地AS的损坏的路由路径。 对于至少一个潜在劫机AS中的每一个,执行以下操作:识别被配置为采用从源AS到目的地AS的破坏路由路径的至少一个区域AS,并且确定反射器AS被设置为使得对于每个 反射器AS在组中,源AS到反射器AS路由路径和反射器AS到目的地AS路由路径不包括至少一个区域AS中的任何一个。 然后,识别在响应于对至少一个潜在的劫机AS中的每一个执行识别和确定操作的至少一个反射器AS中公共的反射器AS。

    CELLULAR CONNECTION SHARING
    27.
    发明申请
    CELLULAR CONNECTION SHARING 有权
    细胞连接共享

    公开(公告)号:US20150163840A1

    公开(公告)日:2015-06-11

    申请号:US14103471

    申请日:2013-12-11

    CPC classification number: H04W76/38 H04W8/005 H04W28/0289 H04W76/14 H04W88/04

    Abstract: Techniques for sharing a cellular network connection amongst multiple devices over a local area network are provided that reduce cellular network load during crowded events. In an aspect, a devices is configure to perform operations that include scanning an area for another device that has established a first wireless cellular connection with a cellular network device of a cellular network and that enables an indirect connection of the device to the cellular network device via a direct connection of the device to the other device via a local network device. The operations further include, in response to identifying the other device as a result of the scanning, sending a request to the other device to connect to the other device via the local network device and to receive the indirect connection to the cellular network device.

    Abstract translation: 提供了通过局域网在多个设备之间共享蜂窝网络连接的技术,其在拥挤的事件期间减少蜂窝网络负载。 在一方面,设备被配置为执行操作,其包括扫描与蜂窝网络的蜂窝网络设备建立第一无线蜂窝连接的另一设备的区域,并且能够将设备间接连接到蜂窝网络设备 通过本地网络设备将设备直接连接到另一设备。 响应于作为扫描的结果识别其他设备的操作还包括向另一设备发送请求以经由本地网络设备连接到另一设备并且接收到蜂窝网络设备的间接连接。

    Device and method for detecting and diagnosing correlated network anomalies
    28.
    发明授权
    Device and method for detecting and diagnosing correlated network anomalies 有权
    用于检测和诊断相关网络异常的装置和方法

    公开(公告)号:US08639988B2

    公开(公告)日:2014-01-28

    申请号:US13713196

    申请日:2012-12-13

    CPC classification number: G06F11/006 H04L41/0631

    Abstract: A device detects and diagnoses correlated anomalies of a network. The device includes an anomaly detection module receiving a first data stream including an event-series related to the network. The anomaly detection module executes at least one algorithm to detect a potential anomaly in the event-series. The device further includes a correlating module receiving a second data stream including other event-series related to the network. The correlating module determines whether the potential anomaly is false and determines whether the potential anomaly is a true anomaly.

    Abstract translation: 设备检测和诊断网络的相关异常。 所述设备包括异常检测模块,其接收包括与所述网络有关的事件序列的第一数据流。 异常检测模块执行至少一个算法来检测事件序列中的潜在异常。 所述设备还包括相关模块,其接收包括与所述网络相关的其他事件序列的第二数据流。 相关模块确定潜在的异常是否为假,并确定潜在的异常是否是真实的异常。

    Mitigating Low-Rate Denial-Of-Service Attacks in Packet-Switched Networks
    29.
    发明申请
    Mitigating Low-Rate Denial-Of-Service Attacks in Packet-Switched Networks 审中-公开
    减少分组交换网络中的低速率拒绝服务攻击

    公开(公告)号:US20130254886A1

    公开(公告)日:2013-09-26

    申请号:US13894140

    申请日:2013-05-14

    CPC classification number: G06F21/55 H04L63/1458

    Abstract: A method includes determining, at a network routing device, an average packet drop rate for a plurality of aggregations of packet flows. The method also determines a threshold packet drop rate based on the average packet drop rate, a current packet drop rate for a select aggregation of the plurality of aggregations, and whether at least one packet flow of the select aggregation is potentially subject to a denial-of-service attack based on a comparison of the current packet drop rate to the threshold packet drop rate.

    Abstract translation: 一种方法包括在网络路由设备处确定多个分组流聚合的平均分组丢弃率。 该方法还基于平均分组丢弃率,多个聚合中的选择聚合的当前分组丢弃率,以及选择聚合的至少一个分组流是否可能受到拒绝 - 基于当前分组丢弃率与阈值分组丢弃率的比较来实现服务攻击。

    Methods, Systems, and Computer Program Products for Protecting Against IP Prefix Hijacking
    30.
    发明申请
    Methods, Systems, and Computer Program Products for Protecting Against IP Prefix Hijacking 有权
    用于防止IP前缀劫持的方法,系统和计算机程序产品

    公开(公告)号:US20130074175A1

    公开(公告)日:2013-03-21

    申请号:US13657350

    申请日:2012-10-22

    CPC classification number: H04L63/14 H04L63/00 H04L63/1466

    Abstract: A communication network is operated by identifying at least one potential hijack autonomous system (AS) that can be used to generate a corrupt routing path from a source AS to a destination AS. For each of the at least one potential hijack AS the following operations are performed: identifying at least one regional AS that is configured to adopt the corrupt routing path from the source AS to the destination AS and determining a reflector AS set such that, for each reflector AS in the set, a source AS to reflector AS routing path and a reflector AS to destination AS routing path do not comprise any of the at least one regional AS. A reflector AS is then identified that is common among the at least one reflector AS set responsive to performing the identifying and determining operations for each, of the at least one potential hijack AS.

    Abstract translation: 通过识别至少一个潜在的劫持自治系统(AS)来操作通信网络,该系统可用于生成从源AS到目的地AS的损坏的路由路径。 对于至少一个潜在的劫机AS中的每一个,执行以下操作:识别被配置为采用从源AS到目的地AS的损坏路由路径的至少一个区域AS,并且确定反射器AS集合,使得对于每个 反射器AS在组中,源AS到反射器AS路由路径和反射器AS到目的地AS路由路径不包括至少一个区域AS中的任何一个。 然后,识别在响应于对至少一个潜在的劫机AS中的每一个执行识别和确定操作的至少一个反射器AS中公共的反射器AS。

Patent Agency Ranking