$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method for blocking denial of service and address spoofing attacks on a private network 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
  • G06F-011/30
출원번호 US-0040898 (1998-03-18)
발명자 / 주소
  • Cox, Dennis
  • McClanahan, Kip
출원인 / 주소
  • Cisco Technology, Inc.
대리인 / 주소
    Baker Botts L.L.P.
인용정보 피인용 횟수 : 92  인용 특허 : 24

초록

A method is provided for blocking attacks on a private network (12). The method is implemented by a routing device (10) interconnecting the private network (12) to a public network (14). The method includes analyzing an incoming data packet from the public network (14). The incoming data packet is t

대표청구항

1. A method for blocking an attack on a private network implemented by a routing device interconnecting the private network to a public network, comprising: receiving a request to establish a communication connection between an endpoint of a public network and an endpoint of a private network;

이 특허에 인용된 특허 (24)

  1. Vu Hung T. (Ottawa CAX), Apparatus and method for providing a secure gateway for communication and data exchanges between networks.
  2. Denker John Stewart, Communications protocol with improved security.
  3. Zhao Yan, Concurrent user access control in stateless network computing service system.
  4. Kirby Alan J. ; Nadkarni Ashok P., Controlling passage of packets or messages via a virtual connection or flow.
  5. Hecht Matthew S. (Potomac MD) Johri Abhai (Gaithersburg MD) Wei Tsung T. (Gaithersburg MD) Steves Douglas H. (Austin TX), Distributed security auditing subsystem for an operating system.
  6. Shrader Theodore Jack London, Filter rule validation and administration for firewalls.
  7. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Firewall system for protecting network elements connected to a public network.
  8. Frazier Howard M. ; Muller Shimon, Full duplex flow control for ethernet networks.
  9. MacDoran Peter F. ; Mathews Michael B. ; Ziel Fred A. ; Gold Kenn L. ; Anderson Steven M. ; Coffey Mark A. ; Denning Dorothy E., Method and apparatus for authenticating the location of remote users of networked computing systems.
  10. Klaus Christopher W., Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication sy.
  11. Watson Colin (Issaquah WA) Herron Andrew M. (Issaquah WA), Method and apparatus for supporting multiple, simultaneous services over multiple, simultaneous connections between a cl.
  12. Malkin Gary ; Kossack Nancy ; Raison Paul ; Tran Thuan ; Wong Ellis L., Method and apparatus for transparently providing mobile network functionality.
  13. Nessett Danny M. ; Sherer William Paul, Multilayer firewall system.
  14. Lippmann Wouter J. H. M. (Eindhoven NLX) Kessels Jozef L. W. (Eindhoven NLX) Eggenhuisen Huibert H. (Eindhoven NLX) Dijkstra Hendrik (Eindhoven NLX), Multiprocessor system comprising a plurality of data processors which are interconnected by a communication network.
  15. Friedman Aharon ; Levy Ben Zion, Network security device which performs MAC address translation without affecting the IP address.
  16. Conklin David Allen ; Harrison John Reed, Network surveillance system.
  17. Alsberg Peter (Urbana IL), Protector system for computer access and use.
  18. Collins Cynthia B. (Basking Ridge NJ) Lynch Francis T. (Budd Lake NJ) Mueller Kay L. (Rumson NJ), Secure dial access to computer systems.
  19. Stein Michael Victor ; Wenker Paul Richard, Security and report generation system for networked multimedia workstations.
  20. Kenner Brian ; Karush Arnold, System and method for optimized storage and retrieval of data on a distributed computer network.
  21. Haigh J. Thomas ; Jensen Andrew W., System and method for securing compiled program code.
  22. Morisaki Tetsuya (Kawasaki JPX), System and method of detecting unauthorized use of identifiers.
  23. Templin Fred L. ; Gupta Ajay ; Skinner Gregory D. ; Tynan Dermot Matthew,IEX, Transparent and secure network gateway.
  24. Shrader Theodore Jack London, Web-based administration of IP tunneling on internet firewalls.

이 특허를 인용한 특허 (92)

  1. Cantrell,Craig; Willebeek LeMair,Marc; Cox,Dennis; McHale,John; Smith,Brian; Kolbly,Donovan, Active network defense system and method.
  2. Cantrell,Craig; Willebeek Lemair,Marc; Cox,Dennis; McHale,John; Smith,Brian; Kolbly,Donovan, Active network defense system and method.
  3. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  4. Poletto, Massimiliano Antonio; Ratin, Andrew; Gorelik, Andrew, Aggregator for connection based anomaly detection.
  5. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  6. Lingafelt,C. Steven; McConnell,Daniel Edward; Noel, Jr.,Francis E.; Sannipoli,Charles J., Apparatus and method for using a network processor to guard against a "denial-of-service" attack on a server or server cluster.
  7. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Frederic; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Apparatus for compact internetworked wireless integrated network sensors (WINS).
  8. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Apparatus for compact internetworked wireless integrated network sensors (WINS).
  9. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Apparatus for internetworked wireless integrated network sensors (WINS).
  10. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep; Merrill, William M., Apparatus for internetworked wireless integrated network sensors (WINS).
  11. Kaashoek,Marinus Frans; Kohler, Jr.,Edward W.; Poletto,Massimiliano Antonio, Architecture to thwart denial of service attacks.
  12. Poletto,Massimiliano Antonio; Vlachos,Dimitri Stratton, Architecture to thwart denial of service attacks.
  13. Rijsman, Bruno, Automatic filtering to prevent network attacks.
  14. Filsfils, Clarence; Previdi, Stefano B.; Scudder, John Galen; Ward, David D., Automatic protection of an SP infrastructure against exterior traffic.
  15. Meenan,Patrick; Damick,Jeffrey Joseph, Classifying devices using a local proxy server.
  16. Rodriguez Val,Richard; Watson, Jr.,Richard A., Client device identification when communicating through a network address translator device.
  17. Rodriguez Val,Richard; Watson, Jr.,Richard A., Client device identification when communicating through a network address translator device.
  18. Rodriguez-Val, Richard; Watson, Jr., Richard A., Client device identification when communicating through a network address translator device.
  19. Poletto, Massimiliano Antonio; Kohler, Jr., Edward W.; Ratin, Andrew; Gorelik, Andrew, Connection based anomaly detection.
  20. Kaashoek,Marinus Frans; Kohler, Jr.,Edward W.; Poletto,Massimiliano Antonio; Morris,Robert T., Coordinated thwarting of denial of service attacks.
  21. Jacoby, Brian; Wright, Christopher J., Deep packet scan hacker identification.
  22. Jacoby, Brian; Wright, Christopher J., Deep packet scan hacker identification.
  23. Jacoby, Brian; Wright, Christopher J., Deep packet scan hacker identification.
  24. Poletto, Massimiliano Antonio; Ratin, Andrew; Gorelik, Andrew, Denial of service attacks characterization.
  25. Singh, Sumeet; Varghese, George; Estan, Cristi; Savage, Stefan, Detecting public network attacks using signatures and fast content analysis.
  26. Singh, Sumeet; Varghese, George; Estan, Cristi; Savage, Stefan, Detecting public network attacks using signatures and fast content analysis.
  27. Himberger, Kevin; Jeffries, Clark D., Determining blocking measures for processing communication traffic anomalies.
  28. Mackie, Scott, Dynamically inserting filters into forwarding paths of a network device.
  29. Weber,Daniel; Gopalan,Prem; Poletto,Massimiliano Antonio, Event detection/anomaly correlation heuristics.
  30. O'Connor, Donald C., Facilitating protection of a maintenance entity group.
  31. Stacy,John Kenneth; Garner,Trevor; Hughes,Martin W.; Lee,William R., Hardware filtering support for denial-of-service attacks.
  32. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  33. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  34. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  35. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  36. Meenan,Patrick; Sengpiehl,Donald P.; Thornberg,Rich, Local proxy server for establishing device controls.
  37. Singh, Sumeet; Varghese, George; Ayres, Michael; Semanko, Michael; Eghbali, Bashir; Newhouse, Travis G, Method and apparatus for content classification.
  38. Futamura, Kenichi, Method and apparatus for detecting scans in real-time.
  39. Futamura, Kenichi, Method and apparatus for detecting scans in real-time.
  40. Foschiano, Marco E.; Chen, Justin Qizhong; Kenghe, Ambarish Chintamani, Method and apparatus for inter-layer binding inspection.
  41. Foschiano,Marco E.; Chen,Justin Qizhong; Kenghe,Ambarish Chintamani, Method and apparatus for inter-layer binding inspection to prevent spoofing.
  42. Duffield, Nicholas; Van Der Merwe, Jacobus; Sekar, Vyas; Spatscheck, Oliver, Method and apparatus for large-scale automated distributed denial of service attack detection.
  43. Taylor, George Macrae; Atkins, Paul; Lightbody, Katriona; Hannah, Mark; Aitken, Paul; Johnson, Andrew, Method and apparatus for monitoring network traffic.
  44. Huston, III, Lawrence Bruce; Richardson, Matthew; Campbell, Aaron, Method and apparatus for probabilistic matching to authenticate hosts during distributed denial of service attack.
  45. Schuba, Christoph L.; Guttman, Erik, Method and apparatus for using client puzzles to protect against denial-of-service attacks.
  46. Ramachandran,Viyyokaran R.; Choudhary,Manoj; Madhusudhana,Honnuduke S., Method and system for filtering spoofed packets in a network.
  47. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Frederic; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Method for internetworked hybrid wireless integrated network sensors (WINS).
  48. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Method for internetworked hybrid wireless integrated network sensors (WINS).
  49. Milliken, Walter, Method for source-spoofed IP packet traceback.
  50. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Newberg, Fredric; Pottie, Gregory J., Method for vehicle internetworks.
  51. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Newberg, Fredric; Pottie, Gregory J., Method for vehicle internetworks.
  52. Hong, Se Gi; Schulzrinne, Henning, Methods and systems for controlling traffic on a communication network.
  53. Alam, Bilal; Courage, Michael, Methods and systems for preventing socket flooding during denial of service attacks.
  54. Alam,Bilal; Courage,Michael, Methods and systems for preventing socket flooding during denial of service attacks.
  55. Nieuwenhuis, Taco, Mobile network security system.
  56. Poletto,Massimiliano Antonio; Kohler, Jr.,Edward W., Monitoring network traffic denial of service attacks.
  57. Simon, Daniel R.; Agarwal, Sharad; Maltz, David A., Network accountability among autonomous systems.
  58. Simon, Daniel R.; Agarwal, Sharad; Maltz, David A., Network accountability among autonomous systems.
  59. Simon, Daniel R.; Agarwal, Sharad; Maltz, David A., Network accountability among autonomous systems.
  60. Carter, Stephen R.; Krishnamurthy, Ravishankar; Veeravadivel, Duraisamy, Network application layer routing.
  61. Carter, Stephen R.; Krishnamurthy, Ravishankar; Veeravadivel, Duraisamy, Network application layer routing.
  62. Willebeek LeMair,Marc; Cantrell,Craig; Cox,Dennis; McHale,John; Smith,Brian, Network security system integration.
  63. Porras, Phillip Andrew; Valdes, Alfonso De Jesus, Network surveillance.
  64. Boulanger, Alan; Himberger, Kevin; Jeffries, Clark D.; Ziraldo, John, Operating a communication network through use of blocking measures for responding to communication traffic anomalies.
  65. Stone, Robert J.; Sibley, Matthew J., Overlay network for tracking denial-of-service floods in unreliable datagram delivery networks.
  66. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  67. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  68. Goldstone,Jonathan S, Prevention of bandwidth congestion in a denial of service or other internet-based attack.
  69. Uskela, Sami; Jokinen, Hannu, Prevention of spoofing in telecommunications system.
  70. Uskela,Sami; Jokinen,Hannu, Prevention of spoofing in telecommunications systems.
  71. Carter,Stephen R.; Burch,Lloyd Leon; Ebrahimi,Hashem Mohammad; McClain,Carolyn B., Privileged network routing.
  72. Halasz,Sylvia; Tewani,Kamlesh T.; Tarjan,David, Protection against flooding of a server.
  73. Eisendrath,Benjamin; Spannbauer,Bradley; Smith, Jr.,Stanley O., Regulating concurrent logins associated with a single account.
  74. Toomey, Christopher, Restricting the volume of outbound electronic messages originated by a single entity.
  75. Lapidous, Eugene, Secure communications with internet-enabled devices.
  76. Lapidous, Eugene; Arsitov, Artem, Secure communications with internet-enabled devices.
  77. Lapidous, Eugene; Arsitov, Artem, Secure communications with internet-enabled devices.
  78. Wright, Christopher J.; Hufford, Patrick; Rolon, Terry; Robertson, Jonathan K.; Stehnach, Thomas; Jalan, Rajkumar, Securing an access provider.
  79. Wright, Christopher J.; Hufford, Patrick; Rolon, Terry; Robertson, Jonathan K.; Stehnach, Thomas; Jalan, Rajkumar, Securing an access provider.
  80. Wright, Christopher J.; Hufford, Patrick; Rolon, Terry; Robertson, Jonathan K.; Stehnach, Thomas; Jalan, Rajkumar, Securing an access provider.
  81. Barrett, Joseph G.; Wright, Christopher J.; Blake, Victor R.; Stehnach, Thomas; Jalan, Rajkumar, Securing an accessible computer system.
  82. Barrett, Joseph G.; Wright, Christopher J.; Blake, Victor R.; Stehnach, Thomas; Jalan, Rajkumar, Securing an accessible computer system.
  83. Poletto, Massimiliano Antonio, Stackable aggregation for connection based anomaly detection.
  84. Gil, Thomer Michael; Poletto, Massimiliano Antonio; Kohler, Jr., Edward W., Statistics collection for network traffic.
  85. Watson,Robert N. M.; Kindred,Darrell; Lewis,Ed; Niebuhr,Brian; Gudmundsson,Olafur, System and method for negotiating multi-path connections through boundary controllers in a networked computing environment.
  86. Gutzmann, Kurt M., System and methods for classifying internet devices as hostile or benign.
  87. Gutzmann, Kurt, Systems and methods for classification of internet devices as hostile or benign.
  88. Stavrou, Angelos; Keromytis, Angelos D., Systems and methods for inhibiting attacks with a network.
  89. Barrett, Joseph G.; Muehl, Mark J.; Palino, Todd M., Throttling electronic communications from one or more senders.
  90. Chen,Benjie; Poletto,Massimiliano Antonio, Thwarting connection-based denial of service attacks.
  91. Kohler, Jr., Edward W.; Poletto, Massimiliano Antonio, Thwarting source address spoofing-based denial of service attacks.
  92. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of network access to an application.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로