Protection against network-initiated attacks

A network interface card, Internet protocol technology, applied in the field of protection from network-initiated attacks, which can solve problems such as unavailability, high computing resources, processor overload, etc.

Pending Publication Date: 2022-03-01
INTEL CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Handling signaling storms requires high computing resources, which can cause the processor to become overloaded and unavailable for other work

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection against network-initiated attacks
  • Protection against network-initiated attacks
  • Protection against network-initiated attacks

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0120] Example 1 includes a method that includes changing an operating frequency of a peripheral device interface between a network interface card and a processor based on detecting a traffic violation.

example 2

[0121] Example 2 includes any of the examples and includes detecting a traffic violation based on detecting IP packet fragmentation, wherein altering a frequency of operation of a peripheral device interface between the network interface card and the processor based on detecting the traffic violation includes The operating frequency of the peripheral device interface between the network interface card and the processor is reduced.

example 3

[0122] Example 3 includes any examples where IP packet fragmentation includes one or more of the following: IP packet fragmentation that is an incomplete packet, IP packet fragmentation that is too small, IP packet fragmentation that results in excess packets, or a full IP packet fragmentation buffer .

[0123] Example 4 includes any examples wherein detecting a traffic violation based on detecting IP packet fragmentation includes detecting a traffic violation based on detecting IP packet fragmentation at one or more of: a network appliance, a network interface card, a non-core, a system agent, operating system, application, or computing platform.

[0124] Example 5 includes any examples wherein the peripheral device interface includes one or more of: system agent, uncore, bus, peripheral component interconnect express (PCIe) interface, and cache.

[0125] Example 6 includes any examples where the peripheral device interface is part of a system on chip (SoC), and the SoC incl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The title of the invention is protection against network-initiated attacks. Examples described herein relate to a computing system that changes an operating frequency of a peripheral device interface between a network interface card and a processor based on detecting a traffic violation. In some examples, the frequency of operation of a peripheral device interface is reduced based on detecting a traffic violation. In some examples, the IP packet fragments may include one or more of the following: IP packet fragments that are incomplete packets, too small IP packet fragments, IP packet fragments that result in excessive packets, or a full IP packet fragmentation buffer. In some examples, detecting traffic violations is based on detecting IP packet fragments at one or more of the following locations: a network appliance, a network interface card, a non-core, a system agent, an operating system, an application, or a computing platform. In some examples, a peripheral device interface includes one or more of the following: a system agent, a non-core, a bus, a device interface, and a cache. In some examples, the peripheral device interface is part of a system on chip (SoC), and the SoC further includes one or more of the following: a core, a system agent, or a non-core.

Description

Background technique [0001] Network functions (NFs) and virtual network functions (VNFs) that perform high-speed data plane and signaling processing can flood the network with traffic, causing VNFs to become overloaded and virtualized applications to become congested and unresponsive. Sources of network flooding may include signaling storms generated in the network. Handling signaling storms requires high computing resources, which can cause processors to become overloaded and unavailable for other work. Some sources of network flooding can include malicious network attack vectors, including denial of service (DoS) attacks utilizing fragmentation attacks and buffer-based attacks, as well as distributed versions of these types of attacks (e.g., distributed denial of service (DDoS) ). Contents of the invention [0002] This application discloses a group of technical solutions, as follows: [0003] Technical scheme 1. A method, comprising: [0004] An operating frequency of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40
CPCH04L63/1441H04L63/1458H04L63/1408H04L63/1416H04L63/0236H04L67/02H04L67/10H04L67/563H04L67/564G06F21/55H04L63/1425H04L69/166
Inventor A·米斯拉J·J·布朗尼C·麦克纳马拉
Owner INTEL CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products