| Hao Wala Naman Mali Malta Tai Mult Uit Di Atti

| Hao Wala Naman Mali Malta Tai Mult Uit Di Atti

|HAO WALA NAMAN MALIUS009807092B1 MALTA TAI MULT UIT DI ATTI (12 ) United States Patent (10 ) Patent No. : US 9 ,807 ,092 B1 Gutzmann (45 ) Date of Patent: * Oct . 31, 2017 ( 54 ) SYSTEMS AND METHODS FOR 6 ,789 ,203 B1 9 /2004 Belissent 6 , 944, 663 B2 9 /2005 Schuba et al. CLASSIFICATION OF INTERNET DEVICES 7 ,600 , 255 B1 . 10 / 2009 Baugher AS HOSTILE OR BENIGN 7 , 853 , 533 B2 12 / 2010 Eisen 8 , 112 ,483 B12 / 2012 Emigh et al . (71 ) Applicant : DCS7, LLC, Nashville , TN (US ) 8 , 151 , 327 B2 4 / 2012 Eisen 8 , 321 ,955 B2 11/ 2012 Feng et al. 2002/ 0143914 A1 10 / 2002 Cihula (72 ) Inventor : Kurt Gutzmann, Leesburg , VA (US ) 2002 /0163926 A1 11/ 2002 Moharram (73 ) Assignee : DCS7, LLC , Nashville , TN (US ) (Continued ) ( * ) Notice : Subject to any disclaimer , the term of this OTHER PUBLICATIONS patent is extended or adjusted under 35 U . S . C . 154 ( b ) by 0 days . Buscher, “ Tracking DDOS Attacks: Insights into the business of disrupting the Web ” , NATO Cyber Defense Center of Excellence This patent is subject to a terminal dis CYCON dated Jun . 2012 . claimer . ( Continued ) (21 ) Appl . No .: 15 / 157, 356 Primary Examiner — John B King ( 22) Filed : May 17 , 2016 Assistant Examiner — Arya Golriz ( 74 ) Attorney , Agent , or Firm — Bass , Berry & Sims Related U . S . Application Data PLC (63 ) Continuation -in -part of application No . 14 / 323 , 826 , filed on Jul. 3 , 2014 . (57 ) ABSTRACT (60 ) Provisional application No . 61 / 957 ,497 , filed on Jul. A dynamic access pricing and active countermeasure system 5 , 2013 . and method for detecting and protecting against automated (51 ) Int. Cl. Internet attackers that incapacitates or disables the attackers . H04L 29 /06 ( 2006 .01 ) The dynamic access pricing and active countermeasure ( 52 ) U . S . CI. generally includes 1 ) the provision of a device fingerprint by CPC . .. H04L 63 / 0876 ( 2013 .01 ) ; H04L 63/ 10 a device at the start of an iteration of the client- puzzle ( 2013 .01 ) ; H04L 63 / 1458 ( 2013 .01 ) ; H04L challenge- response protocol; 2 ) a dynamic access pricing policy associated with a transaction identifier ; 3 ) the deter 63 /20 (2013 .01 ) mination of the puzzle difficulty level based on the interac ( 58 ) Field of Classification Search tion history of the device fingerprint solely with respect to CPC . .. HO4L 63 /08 ; HO4L 63 / 0876 ; G06F 21/ 36 the dynamic access pricing policy ; 4 ) the binding of the See application file for complete search history . device fingerprint to the client puzzle challenge ; the gen eration of transaction authorization codes that the device ( 56 ) References Cited presents to a protected application , system , interface or U . S . PATENT DOCUMENTS device . 6 ,088 , 804 A 7 / 2000 Hill et al. 6 ,738 ,814 B1 5 / 2004 Cox et al . 33 Claims, 36 Drawing Sheets HIP Buf Audi 80 " Con App Store AB - Root 10AL DR At HE ART ladim HT | Code dar _FEET AB Badal DO EMTE LIST 41 FAHOW-0 US 9 , 807 ,092 B1 Page 2 ( 56 ) References Cited V . Laurens et al. , “ Requirements for Client Puzzles to Defeat the Denial of Service and Distributed Denial of Service Attacks ” , The U . S . PATENT DOCUMENTS International Arab Journal of Information Technology , vol . 3 , No. 4 , Oct . 2006 . 2003 / 0093509 A1 * 5 / 2003 Li . .. .. .. .. GO6F 11 /0727 Y . Xie et al. , “ Monitoring the Application - Layer DDos Attacks for 709 /223 2009 /0113559 Al 4 / 2009 Schneider Popular Websites , ” IEEE / ACM Transactions Networking , vol. 17 , 2009 / 0192853 A1 7 / 2009 Drake et al . No . 1 , Feb . 2009. 2010 /0031315 A1 2 / 2010 Feng et al. H . Beitollahi et al ., “ Tackling Application -layer DDOS Attacks ” , 2010 / 0180333 A1 * 7 / 2010 Bono . H04L 12 / 585 Procedia Computer Science ; SciVerse ScienceDirect, dated 2012. 726 / 13 H . Beitollahi et al. , “ Analyzing well -known countermeasures 2011/ 0218860 A1 9 / 2011 Barber against distributed denial of service attacks ” , Computer Communi 2011/ 0231913 AL 9 / 2011 Feng et al . cations, dated 2012 . 2012 /0189194 AL 7 / 2012 Srivastava Y . Chen et al ., " A Novel DDOS Attack Defending Framework with 2012 /0323700 Al 12 / 2012 Aleksandrovich et al. Minimized Bilateral Damages” . Dept . of Electrical & Computer 2013 /0055374 A12 / 2013 Kustarz et al . Engineering , SUNY — Binghamton , Binghampton NY 13902 ; Dept. 2013 /0312097 A1 11/ 2013 Turnbull of Computer Science & Software Engineering , Auburn University , Auburn , AL 36849 , dated 2010 . OTHER PUBLICATIONS P . Djalaliev , “ Mitigating Botnet - Based DDOS Attacks Against Web International Telecommunications Union ( ITU ) , IT Recom Servers ” , Submitted to the Graduate Faculty of the Dietrich School mendationX .200 , “ Data Networks and Open System Communica of Arts and Sciences - University of Pittsburgh , dated 2013 . tions -Open Systems Interconnection -Model and Notation , Basic E . Kaiser , “ Addressing Automated Adversaries of Network Appli Reference Model, ” Jul. 1994 . cations” , Submitted to the Dissertation Committee — Portland State Internet Engineering Task Force ( IETF ), Request for Comments University , dated 2010 . 2616 , “ Hypertext Transfer Protocol -HTTP / 1 , 1 " , Jun . 1999 . S . Khor , et al. “ DaaS : DDoS Mitigation as - a -service ” , IEEE /IPSJ J . Mirkovic , et al ., Internet Denial of Service : Attack and defense International Symposium on Applications and the Internet, dated Mechanisms, Prentice -Hall , 2008 . 2011 . J . Crowcroft et al. , “ Lazy Zusan : Dumb waiting as proof of work , ” P . Vu , “ Defending Against Distributed Denial of Service Attacks University of Cambridge Technical Report No. 703 , Nov . 2007 . Using a Cloud Based Architecture ” , Thesis — The University of J . Rangasamy, et al . “ An integrate approach to cryptographic Houston , Clear Lake , Dated Dec . 2012 . mitigation of denial- of - service attacks” , Proceedings of the 6th B . Waters et al. , “ New Client Puzzle Outsourcing Techniques for ACM Symposium on Information , Computer and Communications DoS Resistance ” , Princeton University , Princeton , NJ; RSA Labo Security ( ASIACCS ) 2011 . ratories , Bedford , MA, Oct . 25 -29 , 2004 . Kurt Gutzmann , “ Role - Based Access Control in HTTP Environ S . Zargar et al. , “ A Survey of Defense Mechanisms Aganist Dis ment” , IEEE Journal of Internet Computing , Jan . 2001 . tributed Denial of Service (DDoS ) Flooding Attacks” , IEEE , 2013 . M . Abliz et al. , “ A Guided Tour Puzzle for Denial of Service K . Gutzmann , “ System and Methods for Classifying Internet Prevention ” , Proceedings of the Annual Computer Security Appli Devices as Hostile or Benign ” , filed Jul. 3 , 2014 , U . S . Appl. No . cations Conference , 2009 . 14 / 323 , 826 . P . Mittal et al ., " Towards Deployable DDoS Defense for Web Application ” , Arxiv preprint arXiv : 1110 - 1060 , Oct . 5 , 2011 . * cited by examiner atent Oct . 31 , 2017 Sheet 1 of 36 US 9 ,807 , 092 B1 101 Hostile Devices Benign Devices Load Balancer Black /White List Filter Load Balancer Black /White List Filter - - - - - - Classifier 1 Classifier N Classifier .. - - Device Fingerprints for - Black List & White List Content Server 1 Content Server. Content Server N m 104 Prutat Management Server Parameters Memcache ] Fingerprints for Black List & White List 105 Subscription Management 1-1-1List /Fingerprint Publisher Device Fingerprints for Black List & White List 106 Service Subscriber Connection Fingerprint 107 08 DWUST ????? Figure 1 atent Oct . 31 , 2017 Sheet 2 of 36 US 9 ,807 , 092 B1 Hostile Devices Benign Devices Load Balancer Black /White List Filter . Classification Filter Classification Filter Classification Filter Protoco Parameters Memcached Content Server N Content Server 1 Content Server. Device Fingerprints for Black List & White List Management Server Fingerprints for Blacklist & White List TAYYYY 205 Subscription List/ Fingerprint Management Publisher LH1-0Singerprint - Figure 2 U . S . Patent Oct. 31, 2017 Sheet 3 of 36 US 9 , 807 ,092 B1 HTTP Clientor BOT Customer FrontEnd Processor IFF Service MemCached Store Fingerprint Publishing Service Scheduler Event HandeRequest for Data Start - no cookies , no white list, no blacklist i. e. Device Fingerprings Process Query for Whitelist, blank slate Unikate Black and White List and Blacklist, and Fingerprints Filter Data White /Black Lists 305 Send Request HTTP GET POST + headers HTTP Request Get the Request Cookies 1306 Calculate the SS FingerPrint Device Fingerprint Look forPOW _ FINGERPRINT Black White cookie (prior JS computation ) Lists 302 Redirect Ignored POW FINGERPRINT is present Scheduler Event Execute Time Job To Copy Cache to DB POW FINGERPRINT IS Cache Data on WHITE _ LIST Cache Data (Fingerprints . WL , BL ) (Fingerprints .WL , BL ) Figure 3A U . S . Patent Oct. 31, 2017 Sheet 4 of 36 US 9 ,807 , 092 B1 HTTP Client or BOT Customer Front End Processor iFF Service MemCached Store Fingerprint Publishing Service DDDDDD DDD 309 Forward Request to Pool Member , Normal processing Cache Data Fingerprints , WL, BL ) Device Fingerprints { 3 and 310 White /Black Lists Compute SS Finger Print (HEADERS + P ) memCache Increment Request Counter for 010-11Cache Data SS _ Fingerprint (Fingerprints ,WL , BL ) 302 Redirect ignored Count > Black List Threshold ? Place device an focal Black List & transmit device details to publishing service Black Lested Device particulars Accept New Blacklisted Device 314 Store Device particukars in SS FINGERPRINT Database YES On BLACK kst ? 319 . Figure 3B U . S . Patent Oct. 31, 2017 Sheet 5 of 36 US 9 ,807 , 092 B1 HTTP Client or BOT Customer

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    58 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us