Patents Assigned to Arbor Networks
  • Patent number: 10965553
    Abstract: A method for optimizing performance analysis of a plurality of network hosts associated with a communications network includes aggregating captured network performance data including a plurality of captured network performance metrics for a plurality of network flows. Each one of the plurality of network flows is associated with a plurality of network hosts. The aggregated captured network performance data is encoded by employing at least one data modification function. Dimensionality of the encoded captured network performance data is reduced using a neural network model. One or more reduced-dimensional clusters of the encoded captured network performance data are generated. Each of the one or more reduced-dimensional clusters is grouping one or more hosts of the plurality of network hosts based on the captured network performance metrics.
    Type: Grant
    Filed: August 20, 2018
    Date of Patent: March 30, 2021
    Assignee: Arbor Networks, Inc.
    Inventors: Mathew Ralph Richardson, Lawrence Bruce Huston, III, R. Grant Reed
  • Patent number: 10951649
    Abstract: A method of detecting patterns in network traffic is provided. The method includes receiving a plurality of packets of network traffic, each packet having a payload populated with payload data and selecting payload lengths that occurred most frequently. For each of the selected payload lengths, a pattern template is generated using characters per position of the payload that satisfy a frequency criterion. A bit encoding scheme is assigned for each of the selected payload lengths and its associated pattern template. Each packet of the plurality of packets that has a payload length equal to any of the selected payload lengths and payload content that matches a pattern template generated for the payload is encoded into a single value. The single value uses the bit encoding scheme for the payload length and the pattern template matched.
    Type: Grant
    Filed: April 9, 2019
    Date of Patent: March 16, 2021
    Assignee: Arbor Networks, Inc.
    Inventor: Steinthor Bjarnason
  • Publication number: 20210037047
    Abstract: A system and computer-implemented method of managing botnet attacks to a computer network is provided. The system and method includes receiving a DNS request included in network traffic, each DNS request included in the network traffic and including a domain name of a target host and identifying a source address of a source host, wherein the translation of the domain name, if translated, provides an IP address to the source host that requested the translation. The domain name of the DNS request is compared to a botnet domain repository, wherein the botnet domain repository includes one or more entries, each entry having a confirmation indicator that indicates whether the entry corresponds to a confirmed botnet.
    Type: Application
    Filed: July 31, 2019
    Publication date: February 4, 2021
    Applicant: Arbor Networks, Inc.
    Inventors: Sean O'Hara, Andrew David Mortensen, Brian St. Pierre
  • Patent number: 10904203
    Abstract: A method for encoding domain name information into flow records includes receiving a flow record. The flow record includes initial network flow information in a standard flow record format including at least a source address and a destination address. Domain name information associated with each of the source address and destination address is retrieved from a database. The domain name information is encoded into the received flow record while maintaining the initial network flow information to yield an enhanced flow record.
    Type: Grant
    Filed: September 9, 2016
    Date of Patent: January 26, 2021
    Assignee: Arbor Networks, Inc.
    Inventors: Lawrence B. Huston, III, James E. Winquist, Alex Levine, Ronald G. Hay, Brett Higgins, Andrew D. Mortensen, William M. Northway, Jr., Eric Jackson
  • Publication number: 20200389431
    Abstract: A system and computer-implemented method to monitor network traffic for a protected network using a block of IP addresses including an IP address for a server. The method includes selecting one or more green addresses, each being a different IP address from the block of IP addresses, associating the green addresses with the IP address of the server, and receiving a packet of the internet traffic from a client directed to an IP address of the block of IP addresses prior to any performance of DPI on the packet. It is determined whether the destination address matches the one or more green addresses or is a yellow address (which belongs to the block of IP addresses, but is not a green address). When determined that the destination address matches the one or more green addresses, the method the packet is sent to the IP address associated with the matching green address, bypassing any DPI.
    Type: Application
    Filed: June 4, 2019
    Publication date: December 10, 2020
    Applicant: Arbor Networks, Inc.
    Inventor: Brian St. Pierre
  • Publication number: 20200382397
    Abstract: A method includes receiving summary messages summarizing respective aggregated traffic metadata packets output from the at least one traffic management device and an engine. Each summary message identifies an origination pair having a traffic management device and an aggregation engine and a sequence number. The method further includes tracking per subinterval of a series of sub-intervals, highest and lowest sequence numbers and a count of summary messages received for each unique origination pair from the beginning of the subinterval. The method further includes accumulating, per interval, accumulated highest and lowest sequence numbers and an accumulated count of summary messages for each unique origination pair from the beginning of the interval and for all previous subintervals for tracking dropped aggregated traffic metadata packets for the interval.
    Type: Application
    Filed: May 27, 2020
    Publication date: December 3, 2020
    Applicant: Arbor Networks, Inc.
    Inventors: Andrew Lee Adams, Cameron T. Hanover
  • Publication number: 20200382540
    Abstract: A computer-implemented method and device for analyzing network packet traffic flow affected by a network security device in a communication network. Received in a network monitoring device is packet traffic flow data from a network security device that filters network traffic based upon prescribed security filter settings. The network monitoring device analyzes the received packet traffic flow data by correlating the received traffic flow data with the security filter settings prescribed in the network security device. Certain statistics are identified regarding the network traffic flow affected by the security filter settings of the network security device based upon the correlating of the received traffic flow data with the security filter settings prescribed in the network security device. A report regarding the identified statistics is preferably sent to a network administrator.
    Type: Application
    Filed: May 19, 2020
    Publication date: December 3, 2020
    Applicant: Arbor Networks, Inc.
    Inventors: Scott Iekel-Johnson, James Edward Winquist, David Watson
  • Publication number: 20200329069
    Abstract: A method of detecting patterns in network traffic is provided. The method includes receiving a plurality of packets of network traffic, each packet having a payload populated with payload data and selecting payload lengths that occurred most frequently. For each of the selected payload lengths, a pattern template is generated using characters per position of the payload that satisfy a frequency criterion. A bit encoding scheme is assigned for each of the selected payload lengths and its associated pattern template. Each packet of the plurality of packets that has a payload length equal to any of the selected payload lengths and payload content that matches a pattern template generated for the payload is encoded into a single value. The single value uses the bit encoding scheme for the payload length and the pattern template matched.
    Type: Application
    Filed: April 9, 2019
    Publication date: October 15, 2020
    Applicant: Arbor Networks, Inc.
    Inventor: Steinthor Bjarnason
  • Publication number: 20200329054
    Abstract: A method of detecting patterns in network traffic is provided. The method includes receiving packets of network traffic, performing a frequency analysis per field of the packets as a function of frequency of the occurrence of the same data in the corresponding field, and selecting top values which are values associated with each field of the set of fields that satisfy a criterion as having occurred most frequently in the packets as a function of a result of the frequency analysis.
    Type: Application
    Filed: April 9, 2019
    Publication date: October 15, 2020
    Applicant: Arbor Networks, Inc.
    Inventors: Steinthor Bjarnason, Andrew Ralph Beard, David Turnbull
  • Patent number: 10798124
    Abstract: A system and computer-implemented method to detect a slowloris-type network attack, wherein the method includes receiving data gathered by a server of a network over time, the data received including data about timing of requests from a plurality of clients received by the server, tracking the data about timing of requests over time, determining one or more characteristics about distribution of the data tracked, tracking the one or more characteristics to determine whether there is an increase in time for reading, by the server, a larger portion of requests tracked, identifying a change in the characteristics that indicates the presence of a slowloris-type network attack, and performing an action, in response to the change, to at least one of generate an alert about the slowloris-type network attack, request mitigation of the slowloris-type network attack, and mitigate the slowloris-type network attack.
    Type: Grant
    Filed: April 25, 2018
    Date of Patent: October 6, 2020
    Assignee: Arbor Networks, Inc.
    Inventor: Sean O'Hara
  • Patent number: 10771499
    Abstract: A DDoS attack mitigation system includes a plurality of stateless network devices connected to a network. The system also includes one or more DPI devices connected to the plurality of stateless devices. The system further includes a controller connected to the plurality of stateless devices and connected to the DPI devices. The controller includes logic integrated with and/or executable by a processor. The controller is configured to receive a signal from a first DPI device and analyze the received signal. The controller is further configured to update a network traffic policy to redirect at least some of network traffic destined for the first DPI device to one or more DPI devices different from the first DPI device based on the analyzed signal and to send a signal indicative of the updated network policy to at least some of the plurality of stateless devices.
    Type: Grant
    Filed: June 7, 2017
    Date of Patent: September 8, 2020
    Assignee: Arbor Networks, Inc.
    Inventor: Joshua Graham Knight
  • Publication number: 20200259860
    Abstract: A computer implemented method and system for protecting against denial of service attacks by detecting changes in a preferred set of hierarchically-structured items in a network data stream in which a set of network destination prefixes is identified that account for a user specified target of the attack traffic. Changes in the attack traffic profile are detected and new sets of network destination prefixes are generated when the attack has shifted by a predetermined threshold. sets of identified destination prefixes are then translated into route announcements to divert attack traffic to mitigation devices.
    Type: Application
    Filed: September 9, 2019
    Publication date: August 13, 2020
    Applicant: Arbor Networks, Inc.
    Inventors: Andrew Lee Adams, Cameron Hanover, Dagan Harrington, Jiasi Li, Joachim Wright
  • Patent number: 10708294
    Abstract: A system and method are provided to select mitigation parameters. The method includes receiving selection of at least one mitigation parameter, accessing a selected portion of stored network traffic or associated summaries that corresponds to a selectable time window, applying a mitigation to the selected portion of the stored network traffic or associated summaries using the selected at least one mitigation parameter, and outputting results of the applied mitigation.
    Type: Grant
    Filed: January 19, 2017
    Date of Patent: July 7, 2020
    Assignee: Arbor Networks, Inc.
    Inventors: William M. Northway, Jr., Andrew D. Mortensen, James E. Winquist, Ronald G. Hay, Nicholas Scott
  • Patent number: 10701076
    Abstract: A network agent includes an ingress port in data communication with a network traffic source for receiving network traffic entering a network and an egress port in data communication with the ingress port and a protection device included in the network. The egress port is configured to transmit network traffic received from the ingress port to a network device included in the network. A processing device receives from a protection device included in the network blacklist addresses determined by the protection device to be a threat to the network, and maintains a blacklist that includes the received blacklist addresses. A physical layer device compares the network layer source address of a packet of the network traffic received by the ingress port to the blacklist and forwards the packet to the egress port only if the packet's source address is not included in the blacklist.
    Type: Grant
    Filed: January 14, 2016
    Date of Patent: June 30, 2020
    Assignee: Arbor Networks, Inc.
    Inventor: Edmund J. Gurney, III
  • Patent number: 10637885
    Abstract: A method for configuring a network monitoring device is provided. One or more performance metrics associated with one or more thresholds to be configured are received from a user. Historical network traffic flow information associated with a previously detected malicious activity is analyzed to identify characteristic values for the one or more performance metrics. Threshold values are automatically configured based on the identified characteristic values.
    Type: Grant
    Filed: November 28, 2016
    Date of Patent: April 28, 2020
    Assignee: Arbor Networks, Inc.
    Inventors: James E. Winquist, William M. Northway, Jr., Ronald G. Hay, Nicholas Scott, Lawrence B. Huston, III
  • Publication number: 20200099597
    Abstract: A method for optimizing performance analysis of a plurality of network hosts associated with a communications network includes aggregating captured network performance data including a plurality of captured network performance metrics for a plurality of network flows. Each one of the plurality of network flows is associated with a plurality of network hosts. The aggregated captured network performance data is encoded by employing at least one data modification function. Dimensionality of the encoded captured network performance data is reduced using a neural network model. One or more reduced-dimensional clusters of the encoded captured network performance data are generated. Each of the one or more reduced-dimensional clusters is grouping one or more hosts of the plurality of network hosts based on the captured network performance metrics.
    Type: Application
    Filed: August 20, 2018
    Publication date: March 26, 2020
    Applicant: Arbor Networks. Inc.
    Inventors: Mathew Ralph Richardson, Lawrence Bruce Huston, III, R. Grant Reed
  • Patent number: 10601778
    Abstract: A system, method and computer readable storage medium that analyzes network traffic intercepts data communications occurring between one or more hosts and a preselected target host in a protected network. The intercepted data communication includes a plurality of data packets. The intercepted data communications are analyzed to determine volumetric incoming and outgoing traffic flows for the received data packets. The determined volumetric incoming traffic flow for the received packets is graphically represented by a first region. The determined volumetric outgoing traffic flow for the received packets is graphically represented by a second region. The graphical representation includes a plurality of nodes interconnected by a plurality of links. The plurality of nodes represents the hosts. The plurality of links indicate operational relationship between the preselected target host, the one or more hosts, communication ports and communication services used in the data communications.
    Type: Grant
    Filed: September 15, 2016
    Date of Patent: March 24, 2020
    Assignee: Arbor Networks, Inc.
    Inventors: Joshua M. Fields, Christopher C. Cassell, Jeffrey Doppke
  • Publication number: 20200092327
    Abstract: A computer implemented method and system for identifying a preferred set of hierarchically structured items in streaming data for analyzing Netflow data to identify those network destinations that are currently the target of a DDoS attack and to automatically select a set of network prefixes such that diversion routes for the prefixes are sent to the routers to divert attack traffic to TMS devices, The method includes searching sets of Hierarchical Heavy Hitters wherein each set corresponds to a different fraction of a total volume of network traffic and scoring each set according to an arbitrary scoring function. A certain set is selected and scored with a ‘good’ score and a member of the ‘good’ scored set is ranked in accordance with an arbitrary ranking function. A subset of the ‘good’ scored set is selected such that the volume associated with the subset is in close proximity to a user-specified total whereby the selected subset becomes a set of recommended prefixes.
    Type: Application
    Filed: September 9, 2019
    Publication date: March 19, 2020
    Applicant: Arbor Networks, Inc.
    Inventors: Andrew Lee Adams, Cameron Hanover, Dagan Harrington, Jiasi Li, Joachim Wright
  • Patent number: 10567415
    Abstract: A method to monitor a network is provided which includes identifying a time associated with detection of each occurrence of the network threats and generating a graphical user interface that includes a display of a time series graph that corresponds to a selected time period and an interactive popup window indicating certain details associated with a user selected network threat.
    Type: Grant
    Filed: September 15, 2016
    Date of Patent: February 18, 2020
    Assignee: Arbor Networks, Inc.
    Inventors: Jeffrey Doppke, Joshua M. Fields, Christopher C. Cassell
  • Publication number: 20200014714
    Abstract: A system and computer-implemented method to detect particular Domain Name System (DNS) misuse, wherein the method includes obtaining monitored network data. The monitored network data includes respective instances of request traffic. The request traffic is associated with DNS requests that request resolution of a name that belongs to at least one identified domain. Each DNS request is sent from a source address of one or more stub resolver; the source address of the stub resolver may be spoofed. Each instance of request traffic includes the source address, the name for which DNS resolution is requested to be resolved, and the at least one identified domain associated with a corresponding DNS request. The method further includes tracking over time, using a probabilistic algorithm, an approximation of a first cardinality of names belonging to a selected domain of the at least one identified domain included in the instances of request traffic.
    Type: Application
    Filed: July 9, 2018
    Publication date: January 9, 2020
    Applicant: Arbor Networks, Inc.
    Inventors: Andrew David Mortensen, Alan Saqui