Unlock instant, AI-driven research and patent intelligence for your innovation.

Limiting efficacy of denial of service attack by increasing client resource demands

A denial-of-service attack, denial-of-service technology, applied in the direction of electrical digital data processing, transmission systems, instruments, etc., can solve problems such as unavailability, the target device cannot respond, and the response is slow.

Active Publication Date: 2019-04-12
JUMIPER NETWORKS INC
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A common method of attack involves saturating the target device with so many external communication requests that the target device cannot respond to legitimate communications, or responds so slowly that it is essentially unusable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Limiting efficacy of denial of service attack by increasing client resource demands
  • Limiting efficacy of denial of service attack by increasing client resource demands
  • Limiting efficacy of denial of service attack by increasing client resource demands

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The detailed description of the following example implementations refers to the accompanying drawings. The same reference numbers in different drawings may identify the same or similar elements.

[0012] An attacker such as a hacker may use a Denial of Service (DoS) attack such as a Distributed Denial of Service (DDoS) attack (e.g., a DoS attack from more than one client device) in an attempt to make a network device unavailable to the intended user of the network device , or to reduce the availability of network equipment to respond to requests from users. For example, an attacker could use a botnet to cause a large number of client devices to send requests to network devices. Network devices can be overwhelmed with requests, which can reduce the ability of the network device to respond to legitimate requests. DoS attacks utilizing botnets may be computationally inexpensive for client devices compared to network devices. For example, the client device may require le...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of the invention relate to the limiting efficacy of denial of the service attack by increasing client resource demands. A device may detect an attack. The device may receive, from a client device, a request for a resource. The device may determine, based on detecting the attack, a computationally expensive problem to be provided to the client device, where the computationally expensive problem requires a computation by the client device to solve the computationally expensive problem. The device may instruct the client device to provide a solution to the computationally expensive problem. The device may receive, from the client device, the solution to the computationally expensive problem. The device may selectively provide the client device with access to the resource basedon the solution.

Description

[0001] This application is a divisional application of an invention patent application with an application date of September 30, 2014, an application number of 201410521259.0, and an invention title of "Limiting the Effect of Denial of Service Attacks by Increasing Client Resource Requirements". Background technique [0002] A denial of service (DoS) attack is an attempt to make a target device, such as a server, router, or other network resource, unavailable to the target device's intended user. A Distributed Denial of Service (DDoS) attack is a DoS attack that uses a source device and / or location to attack a target device more than once. One common method of attack involves saturating the target device with so many external communication requests that the target device cannot respond to legitimate communications, or responds so slowly that it is essentially unusable. A DDoS attack can be implemented using a botnet, where an attacker uses virus code to infect a large number o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L47/80
CPCH04L63/1458H04L63/1425H04L63/1441H04L67/01G06F2221/2103H04L47/808H04L63/10H04L67/303H04L2463/141H04L2463/144
Inventor K·亚当斯D·J·奎因兰
Owner JUMIPER NETWORKS INC