Patents Assigned to Arbor Networks, Inc.
  • Patent number: 11973773
    Abstract: Determining malicious activity in a monitored network using clustering algorithmic techniques in which a source of known malicious network entities and known legitimate network entities associated with network traffic flow are provided. A dataset is generated consisting of a plurality of known malicious network entities and a plurality of known legitimate network entities. Network related attributes are identified associated with each of the plurality of malicious network entities and the plurality of legitimate network entities contained in the generated dataset. A predetermined number (X) of clusters is generated based upon the plurality of malicious (bad) and legitimate (good) network entities. A generated cluster is tagged with a bad, good or an unknown tag. If a generated cluster is determined assigned a bad tag, it is then stored it in a database and assigned a clusterID for future use in machine learning techniques for detecting network attacks upon the monitored network.
    Type: Grant
    Filed: July 13, 2020
    Date of Patent: April 30, 2024
    Assignee: ARBOR NETWORKS, INC.
    Inventors: Prateek R. Paranjpe, Amol B. Patil, Bhargav M. Pendse
  • Publication number: 20240137302
    Abstract: A computer implemented method and system for simulating the effect of one or more flow specification rules upon archived network flow data. Archived network flow data is retrieved from a database that was exported from a network device. One or more flow specification rules are applied to the archived network flow data, wherein the one or more flow specification rules are configured to perform one or more flow specification actions on the archived network flow data. Determined are one or more flow actions affected on the archived network flow data by the applied one or more flow specification rules. Indication/notification of the determined one or more flow actions are provided.
    Type: Application
    Filed: October 19, 2022
    Publication date: April 25, 2024
    Applicant: Arbor Networks, Inc.
    Inventors: Michael Ratanatharathorn, Kyle Oswald, Anthony Powell, Joel Harrison
  • Patent number: 11916876
    Abstract: A method includes selecting one or more green addresses, each being a different IP address from a block of IP addresses, associating the green addresses with the IP address of the server, and receiving a packet from a client directed to an IP address of the block of IP addresses. It is determined whether the destination address matches the one or more green addresses or is a yellow address. When determined that the destination address matches the one or more green addresses, the packet is sent to the IP address associated with the matching green address, bypassing any DPI. Otherwise, the packet is sent to a scrubber to analyze the packet using DPI and handle the packet or perform a redirection of the client. The redirection causes subsequent requests from the client to be sent to the IP address associated with the green address, bypassing any DPI.
    Type: Grant
    Filed: June 1, 2023
    Date of Patent: February 27, 2024
    Assignee: Arbor Networks, Inc.
    Inventor: Brian St. Pierre
  • Patent number: 11888867
    Abstract: A method of monitoring a network is provided. The method includes receiving a packet of network traffic, determining a source IP address of the packet, consulting a database of source IP addresses, each source IP address having an associated probability of threat indicator (PTI) that indicates a probability of threat posed by the source IP address. The packet's source IP address' PTI is assigned to the packet as the packet's PTI, and one or more inspection checks are selected to be performed on the packet, wherein the selection of the inspection checks is a function of the packet's source IP address PTI. The method further includes performing the selected inspection checks, assigning treatment of the packet based on a result of the inspection checks performed, and adjusting the packet's source IP address' PTI or the packet's PTI based on the result of the one or more inspection checks performed.
    Type: Grant
    Filed: December 9, 2020
    Date of Patent: January 30, 2024
    Assignee: ARBOR NETWORKS, INC.
    Inventor: Brian St. Pierre
  • Patent number: 11876775
    Abstract: Matching an internet service with an IP host address to attribute network traffic to the internet service by mapping one or more server names to an internet service by a network device by detecting a DNS Response to a DNS Query. Inspect the DNS Response to determine an association of a service consumer's IP address with an internet service's server IP address relating to a certain internet service to maintain an array of indexed entries having an association of the service consumer's IP address with an internet service's server IP address relating to a certain internet service for a certain length of time using a probabilistic data structure for the indexed entries.
    Type: Grant
    Filed: August 29, 2022
    Date of Patent: January 16, 2024
    Assignee: ARBOR NETWORKS, INC.
    Inventors: Matthew Bregger, Andrew Lee Adams
  • Patent number: 11876808
    Abstract: A method, system, and computer-implemented method to manage threats to a protected network having a plurality of internal production systems is provided. The method includes monitoring network traffic from the plurality of internal production systems of a protected network for domain names. For each internal production system, a first collection of each unique domain name that is output by the internal production system is determined over the course of a long time interval. For each internal production system, a second collection of each unique domain name that is output by the internal production system is determined over the course of a short time interval. Domain names in the first and second collections associated with the plurality of internal production systems are compared to determine suspicious domain names that meet a predetermined condition. A request is output to treat the suspicious the suspicious domain names as being suspicious.
    Type: Grant
    Filed: February 13, 2020
    Date of Patent: January 16, 2024
    Assignee: ARBOR NETWORKS, INC.
    Inventor: Bhargav Pendse
  • Publication number: 20230396648
    Abstract: A computer system and process for mitigating a Distributed Denial of Service (DDoS) attack by analyzing and correlating inbound and outbound packet information relative to the one or more protected computer networks for detecting novel DDoS Reflection/Amplification attack vectors. Created are separate data repositories that respectively store information relating to captured inbound and outbound packets flowing to and from the protected computer networks. Stored in each respective inbound and outbound data repository are identified inbound destination ports respectively associated with the captured inbound and outbound packets such that each identified inbound destination port number is associated with 1) a packet count relating to the inbound and outbound packets; and 2) a packet byte length count relating to each of the inbound and outbound packets.
    Type: Application
    Filed: June 1, 2022
    Publication date: December 7, 2023
    Applicant: Arbor Networks, Inc.
    Inventors: Brian St. Pierre, Steinthor Bjarnason
  • Publication number: 20230388341
    Abstract: A computer-implemented method and system for managing and configuring flow specification (FlowSpec) messages for a customer network by a controller device coupled to the customer network. Network traffic is monitored by the controller device flowing through the customer network detect a network attack in the customer network. The controller device enables a network user to configure a Flowspec message responsive to the detected network attack. The controller device preferably enables the network user to either 1) manually configure a FlowSpec message or 2) configure a Flowspec message utilizing one or more pre-existing FlowSpec rulesets preferably defined for that customer network.
    Type: Application
    Filed: May 24, 2022
    Publication date: November 30, 2023
    Applicant: Arbor Networks, Inc.
    Inventors: Chris Thiele, Ryan O'Reilly, William Martin Northway, JR.
  • Publication number: 20230370455
    Abstract: An authenticating method including storing internally a reference hash set having hashes of genuine client binary and/or library files. The method further includes receiving an authentication request for authentication of the client process to authorize the client process to access a server resource provided by the server process. In a first phase, the method further includes requesting from the client OS, the process details and the hashes of the client binary and/or library files and verifying (using the reference hash set) these hashes received. In a second phase the method further includes, contingent on positive verification in the first phase, transmitting a random message to the client process by locating it using the IP address and PID presented during the authentication request, verifying a copy of the random message received back from the client process, and contingent on positive verification in the second phase, allowing the client process to access the requested server resource.
    Type: Application
    Filed: July 18, 2022
    Publication date: November 16, 2023
    Applicant: Arbor Networks, Inc.
    Inventor: Amogh N. Joshi
  • Publication number: 20230362207
    Abstract: A computer method and system for mitigating Domain Name System (DNS) misuse using a probabilistic data structure, such as a cuckoo filter. Intercepted is network traffic flowing from one or more external hosts to a computer network, the intercepted network traffic including a DNS request that requests a Resource Record name in a DNS zone file. A determination is made as to whether the DNS request is requesting resolution at a protected DNS Name Server. A hash value is calculated for the requested Resource Record name if it is determined the DNS request is requesting resolution at the protected DNS Name Server. A determination is then made as to whether the calculated hash value for the requested Resource Record name is present in the probabilistic data structure. The DNS request is forwarded to the protected server if the requested Resource Record name is determined present in the probabilistic data structure.
    Type: Application
    Filed: July 14, 2023
    Publication date: November 9, 2023
    Applicant: Arbor Networks, Inc.
    Inventors: Brian St. Pierre, Sean O'Hara, Edmund J. Gurney, III
  • Publication number: 20230319082
    Abstract: A method and apparatus for processing flow specification (Flowspec) messages to one or more of a plurality of customer networks by a controller device coupled to the plurality of customer networks. Preferably a network controller monitors network traffic flowing through each of the customer networks for detecting a network attack in one of the plurality of customer networks, via monitoring of the network traffic. Upon detection of a network attack, a Flowspec message is generated for the customer network detected to be under network attack wherein the Flowspec message is configured specifically for that customer network. The generated Flowspec message is transmitted to the customer network detected to be under network attack for implementation by the customer network for mitigation of the detected network attack.
    Type: Application
    Filed: April 4, 2022
    Publication date: October 5, 2023
    Applicant: Arbor Networks, Inc.
    Inventors: Scott Cameron, Danielle Fritz, Mitchell Hoffmeyer, Scott Iekel-Johnson, Andrew Inman, Grant Levene, Jiasi Li, William Martin Northway, JR., Ryan O'Rielly, Michael Ratanatharathorn, Lori Sulik, Chris Thiele, James Edward Winquist
  • Publication number: 20230308416
    Abstract: A method includes selecting one or more green addresses, each being a different IP address from a block of IP addresses, associating the green addresses with the IP address of the server, and receiving a packet from a client directed to an IP address of the block of IP addresses. It is determined whether the destination address matches the one or more green addresses or is a yellow address. When determined that the destination address matches the one or more green addresses, the packet is sent to the IP address associated with the matching green address, bypassing any DPI. Otherwise, the packet is sent to a scrubber to analyze the packet using, DPI and handle the packet or perform a redirection of the client. The redirection causes subsequent requests from the client to be sent to the IP address associated with the green address, bypassing any DPI.
    Type: Application
    Filed: June 1, 2023
    Publication date: September 28, 2023
    Applicant: Arbor Networks, Inc.
    Inventor: Brian St. Pierre
  • Patent number: 11770405
    Abstract: A method of automated filtering includes receiving a network traffic snapshot having packets with data stored in respective fields, generating a statistical data structure storing each potential unique combination of data stored in respective fields with an associated counter that is incremented for each occurrence that the combination matches one of the packets of the network traffic snapshot and one or more observation timestamps. Determining an observed vector from the statistical data structure, wherein the observed vector has associated attribute/value pairs and counters that satisfy a predetermined criterion. The observed vector's attribute/value pairs are compared to known attribute/value pairs associated with known DDoS attack vectors of an attack vector database.
    Type: Grant
    Filed: September 10, 2020
    Date of Patent: September 26, 2023
    Assignee: ARBOR NETWORKS, INC.
    Inventors: Steinthor Bjarnason, Brian St. Pierre
  • Publication number: 20230283631
    Abstract: A computer system and process for mitigating a Distributed Denial of Service (DDoS) attack to one or more protected computer networks by determining keywords and/or patterns in HyperText Transfer Protocol (HTTP) responses. Stored HTTP responses are analyzed to extract one or more HTTP characteristics for each stored HTTP response. One or more patterns having one or more keywords in each stored HTTP response is determined utilizing the extracted one or more HTTP characteristics for each stored HTTP response. A hash value is determined for each determined pattern, which is preferably stored in a hash structure accompanied by its respective determined HTTP characteristics. Each hash value accompanied by its respective determined HTTP characteristics is stored as a mitigation filter candidate if the hash value contains a determined pattern consisting of at least a predetermined percentage of all determined patterns stored in the hash structure.
    Type: Application
    Filed: May 12, 2022
    Publication date: September 7, 2023
    Applicant: Arbor Networks, Inc.
    Inventors: Steinthor Bjarnason, Ellis Roland Dobbins
  • Patent number: 11743301
    Abstract: A computer method and system for mitigating Domain Name System (DNS) misuse using a probabilistic data structure, such as a cuckoo filter. Intercepted is network traffic flowing from one or more external hosts to a computer network, the intercepted network traffic including a DNS request that requests a Resource Record name in a DNS zone file. A determination is made as to whether the DNS request is requesting resolution at a protected DNS Name Server. A hash value is calculated for the requested Resource Record name if it is determined the DNS request is requesting resolution at the protected DNS Name Server. A determination is then made as to whether the calculated hash value for the requested Resource Record name is present in the probabilistic data structure. The DNS request is forwarded to the protected server if the requested Resource Record name is determined present in the probabilistic data structure.
    Type: Grant
    Filed: November 17, 2021
    Date of Patent: August 29, 2023
    Assignee: Arbor Networks, Inc.
    Inventors: Brian St. Pierre, Sean O'Hara, Edmund J. Gurney, III
  • Publication number: 20230269269
    Abstract: A computer method and system for determining patterns in network traffic packets having structured subfields for generating filter candidate regular expressions for DDoS attack mitigation. Stored packets are analyzed to extract a query name for each stored packet. Each query name is segregated into subfields. A Results-table is generated utilizing the segregated subfields of the query names. A Field-length table is generated that contains the length of the Field Values (Field-length) for each Field Name and an associated counter indicating how many instances the Field-length for a Field Name is present in the extracted query names. The Field-length table is analyzed to determine patterns of equal length in the “Results” table. Utilizing the Patterns table, unique combinations of the Field Values are generated as a filter candidate regular expression for DDoS attack mitigation purposes.
    Type: Application
    Filed: February 23, 2022
    Publication date: August 24, 2023
    Applicant: Arbor Networks, Inc.
    Inventor: Steinthor Bjarnason
  • Publication number: 20230231874
    Abstract: A method of monitoring a network during a DDoS attack is provided. The method includes receiving packets included in the attack, determining whether the packets are designated for tarpitting, for each packet from a source determined to be designated for tarpitting, assigning the packet to an existing or newly established flow, applying at least one tarpitting technique, and applying a randomization function for adjusting the at least one tarpitting technique or for selecting the at least one tarpitting technique to be applied from a plurality of candidate tarpitting techniques.
    Type: Application
    Filed: June 17, 2022
    Publication date: July 20, 2023
    Applicant: Arbor Networks, Inc.
    Inventor: Brian St. Pierre
  • Publication number: 20230231873
    Abstract: A method and network are provided for monitoring a network during a DDoS attack. The method includes establishing a flow record for flows designated for tarpitting and a state machine, each state of multiple states of the state machine having an associated handler function. The handler function associated with a current state of a state machine associated with a flow is invoked to perform one or more actions associated with the flow or the flow record for applying at least one tarpitting technique of one or more candidate tarpitting techniques associated with the flow record, and return a next state, which is used to update the current state of the state machine. The handler function associated with the current state of the state machine is repeatedly invoked, wherein each invocation of the handler function potentially applies different tarpitting techniques.
    Type: Application
    Filed: June 17, 2022
    Publication date: July 20, 2023
    Applicant: Arbor Networks, Inc.
    Inventor: Brian St. Pierre
  • Publication number: 20230231870
    Abstract: A method of delaying computer network clients from sending DNS queries. The method includes receiving a DNS query from a client and consulting a client record in a client record database and/or a flow record in a flow record database storing information about the flow including about one or more previous DNS queries and/or responses in the flow. The method further includes formulating a response to the DNS query as a function of the information about the client and/or the information about the flow, updating the client record with information about the client and/or the flow record with information about the DNS query and the response as formulated, and transmitting the response as formulated to the client. The DNS query includes a question and the response is intentionally defective or incomplete and causes the client to be delayed in sending another DNS query as part of an attack.
    Type: Application
    Filed: June 17, 2022
    Publication date: July 20, 2023
    Applicant: Arbor Networks, Inc.
    Inventor: Brian St. Pierre
  • Patent number: 11700233
    Abstract: A system and computer-implemented method to monitor network traffic for a protected network using a block of IP addresses including an IP address for a server. The method includes selecting one or more green addresses, each being a different IP address from the block of IP addresses, associating the green addresses with the IP address of the server, and receiving a packet of the internet traffic from a client directed to an IP address of the block of IP addresses prior to any performance of DPI on the packet. It is determined whether the destination address matches the one or more green addresses or is a yellow address (which belongs to the block of IP addresses, but is not a green address). When determined that the destination address matches the one or more green addresses, the method the packet is sent to the IP address associated with the matching green address, bypassing any DPI.
    Type: Grant
    Filed: June 4, 2019
    Date of Patent: July 11, 2023
    Assignee: Arbor Networks, Inc.
    Inventor: Brian St. Pierre