Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for controlling traffic on a communication network

A technology for controlling communications and networks, applied in transmission systems, digital transmission systems, data exchange networks, etc., and can solve problems such as communication loss

Inactive Publication Date: 2015-08-12
THE TRUSTEES OF COLUMBIA UNIV IN THE CITY OF NEW YORK
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In a drop attack, a device on the communication path between a legitimate sender and a legitimate receiver intentionally drops packets and data between the sender and receiver, resulting in loss of communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for controlling traffic on a communication network
  • Method and system for controlling traffic on a communication network
  • Method and system for controlling traffic on a communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] According to various embodiments, the present invention provides mechanisms for controlling traffic on a communication network. These mechanisms can be used in a variety of applications, such as preventing denial of service (DoS) attacks and other forms of unauthorized traffic.

[0019] In some embodiments, control of traffic on a communication network may be achieved by requiring permission to be granted by a receiver before a sender can send a data packet. In addition, monitoring of data packets and signaling messages can be performed to verify that only authorized data packets are communicating and non-authorized data packets are being dropped. Data packets (if any) that exceed their allowable levels may be dropped or rate limited (eg, to a small amount) in some embodiments.

[0020] In order to control and monitor the transmission of authorized data packets, signaling messages can be sent between various devices on the communication network. For example, the recei...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Mechanisms for controlling traffic on a communication network are described. The mechanisms can be implemented, for example, using signaling messages. For example, a receiver can send a permission message to allow the sender to send a given amount of data along a particular path. As another example, a sender can send a query message indicating a volume of data that has been sent since the sender received a permission message. Upon receiving the query message, a receiver (or another device such as a router, etc.) can detect an attack by comparing the volume of data in the query message with the volume of data that has been received by the receiver. Upon detecting an attack, the receiver can drop unauthorized packets or request the sender to use a security protocol (e.g., IPsec AH) when transmitting data packets and / or change the path of the data flow (e.g., using multi-homing).

Description

[0001] Cross References to Related Applications [0002] This application claims U.S. Provisional Patent Applications 61 / 078,291 filed July 3, 2008, 61 / 079,411 filed July 9, 2008, 61 / 110,344 filed October 31, 2008, and February 27, 2009 61 / 156,371, each of which is hereby incorporated by reference in its entirety. technical field [0003] The disclosed subject matter relates to methods and systems for controlling traffic on a communication network. Background technique [0004] Attacks on legitimate data flows over communication networks are an ongoing and evolving problem. Denial-of-service, spoofing and drop attacks are common problems. In a denial of service attack, an overwhelming number of fake traffic packets and an overwhelming number of service requests can be sent to a server to overload network resources. In a spoofing attack, an attacker pretends to be a legitimate sender and sends data that supplements or replaces a legitimate data stream, thereby compromising...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/801H04L45/24
CPCH04L63/1441H04L2463/143H04L63/1458H04L45/22H04L45/304H04L45/00H04L63/1416
Inventor 洪世基H·舒尔兹芮那
Owner THE TRUSTEES OF COLUMBIA UNIV IN THE CITY OF NEW YORK