Patents Assigned to Arbor Networks
-
Publication number: 20180103058Abstract: A system and computer-implemented method for mitigating a malicious network attack. The method includes receiving an attack alert that a network attack has been detected, saving a sample of captured network traffic in response to the attack alert, playing back the sample while applying a playback countermeasure to the captured network traffic to block sample segments from the sample, analyzing at least one of the blocked sample segments and throughput sample segments that are not blocked, and adjusting the playback countermeasure in response to a result of the analyzing.Type: ApplicationFiled: October 11, 2016Publication date: April 12, 2018Applicant: Arbor Networks, Inc.Inventor: Brian St. Pierre
-
Publication number: 20180077189Abstract: A method to monitor a network is provided, including receiving traffic metric data indicating measurements related to a characteristic of network traffic flowing in the network and identifying network threats in intercepted traffic of the network traffic. The method further includes identifying a time associated with detection of each occurrence of the network threats and generating a graphical user interface having a GUI that includes a display of a time series graph that corresponds to a selected time period. The display includes a network traffic plot and an alert plot adjacent to the network traffic plot. The network traffic plot indicates a characteristic of network traffic relative to a timeline displayed along a first axis. The alert plot includes alert indicators, wherein each alert indicator is associated with detection of a network threat and aligned relative to the timeline based on the time identified for each occurrence of the detected network threats.Type: ApplicationFiled: September 15, 2016Publication date: March 15, 2018Applicant: Arbor Networks, Inc.Inventors: Jeffrey Doppke, Joshua M. Fields, Christopher C. Cassell
-
Publication number: 20170373922Abstract: A network management system is provided in which a processing device coupled to a network performs operations to identify an interface accordance with a rule and associate the identified interface with a category in accordance with the rule. The interface is coupled between a managed device and the network. The rule is based on a name associated with the interface, wherein the name indicates semantic information about data transmitted via the interface. Upon detection of transmission of data via the interface, the processor further performs operations to determine an action associated with the category and apply the action to the data.Type: ApplicationFiled: June 23, 2016Publication date: December 28, 2017Applicant: Arbor Networks, Inc.Inventors: Michael Kloos, Thomas Sundstrom
-
Publication number: 20170279817Abstract: A method is provided to monitor network traffic, including reserving a portion of a system memory for short-term storage of copied network traffic, wherein the system memory is volatile, receiving copied packets of intercepted network traffic traversing a network, wherein the packets are associated with a plurality of respective traffic streams included in the network traffic, storing the copied packets in the portion of the system memory, maintaining an ordered list per traffic stream of copied packets that are stored, removing copied packets selected, based on their positions in their respective ordered lists, from the portion of the system memory based on a storage constraint, receiving an attack alert identifying a packet that is involved in a network attack, identifying the traffic stream that includes the packet identified, and transferring stored copied packets that are included in the identified traffic stream from the portion of the system memory to a long-term storage device.Type: ApplicationFiled: March 25, 2016Publication date: September 28, 2017Applicant: Arbor Networks, Inc.Inventors: Aaron Campbell, Christopher R. Hand, Frank Murphy
-
Patent number: 9749340Abstract: A computer system and method for monitoring traffic for determining denial of service attacks in a network. Data packets are monitored which are attempting to access one or more server devices in a protected network. A Transport Control Protocol (TCP) window advertisement value is determined for the data packets. If a detected TCP window advertisement value for monitored packets is determined less than a TCP window advertisement threshold value then a determination is made as to whether the data rate for the packets is less than a data rate threshold value. The monitored packets are determined malicious if the detected window advertisement value is less than the TCP window advertisement threshold value and the determined data rate is less than the data rate threshold value.Type: GrantFiled: April 28, 2015Date of Patent: August 29, 2017Assignee: Arbor Networks, Inc.Inventor: Lawrence B. Huston, III
-
Publication number: 20170208083Abstract: A network agent includes an ingress port in data communication with a network traffic source for receiving network traffic entering a network and an egress port in data communication with the ingress port and a protection device included in the network. The egress port is configured to transmit network traffic received from the ingress port to a network device included in the network. A processing device receives from a protection device included in the network blacklist addresses determined by the protection device to be a threat to the network, and maintains a blacklist that includes the received blacklist addresses. A physical layer device compares the network layer source address of a packet of the network traffic received by the ingress port to the blacklist and forwards the packet to the egress port only if the packet's source address is not included in the blacklist.Type: ApplicationFiled: January 14, 2016Publication date: July 20, 2017Applicant: Arbor Networks, Inc.Inventor: Edmund J. Gurney, III
-
Publication number: 20170177198Abstract: A method and computer system are provided. A processing device of the computer system is configured to execute a browser function. The browser function is configured to access an information resource having a data element that is associated with an attribute that includes information. The browser function is further configured to display the information resource in a display portion of a display screen of the processing device. The data element is associated with an area positioned at a location of the displayed information resource, wherein the area is designated for displaying the data element. The browser function is further configured to display the attribute's information in the area associated with the data element in response to a first user action.Type: ApplicationFiled: December 18, 2015Publication date: June 22, 2017Applicant: Arbor Networks, Inc.Inventors: Eleanor O' Neill, Louis Susi, Jeffrey Doppke
-
Patent number: 9628510Abstract: A system and method for providing redundancy with remote scrubbing center devices. The system includes an edge detection device and a plurality of scrubbing center devices in a telecommunications network for providing redundant scrubbing center functionality for the edge detection device. The edge detection device maintains a network connection with more than one of the plurality of scrubbing center devices whereby each of the more than one of the plurality of scrubbing center devices sends and receives a synchronization signal with each of the one or more edge detection devices as if it was the only remote scrubbing center device coupled to the edge detection device.Type: GrantFiled: May 12, 2015Date of Patent: April 18, 2017Assignee: Arbor Networks, Inc.Inventor: Sean O'Hara
-
Patent number: 9584533Abstract: A method for network traffic characterization is provided. Flow data records are acquired associated with a security alert signature. Unidimensional traffic clusters are generated based on the acquired data. A Bloom filter is populated with the acquired flow data records. Clusters of interest are identified from the generated unidimensional traffic clusters. The identified clusters of interest are compressed into a compressed set. A determination is made whether a multidimensional processing of the acquired flow data needs to be performed based on a priority associated with the alert signature. A multidimensional lattice corresponding to the unidimensional traffic clusters is generated. The multidimensional lattice is traversed and for each multidimensional node under consideration a determination is made if the Bloom filter contains flow records matching the multidimensional node under consideration.Type: GrantFiled: November 7, 2014Date of Patent: February 28, 2017Assignee: Arbor Networks, Inc.Inventors: David Watson, Lawrence B. Huston, III, James E. Winquist, Jeremiah Martell, Nicholas Scott
-
Patent number: 9578046Abstract: The systems and methods described herein relate to storing values, such as sketches, that represent time indexed data related to network traffic. The model may be indexed by multiple sets of keys and time range values. It is an advantage that the index is essentially repeated for different time intervals. Utilization of the sketches avoids prohibitively large amounts of network traffic from overwhelming the monitoring computing device(s). Further, the probabilistic representative accuracy of the sketches is dynamically configurable. The time indexed data may represent data traffic on a computer network. The time indexed data may be data packets sent on the network. In one or more embodiments the time indexed data may be sketches that represent and/or approximate the data packets. Further, it is contemplated herein that the accuracy of the sketches' representation may be dynamically configurable.Type: GrantFiled: August 9, 2013Date of Patent: February 21, 2017Assignee: Arbor Networks, Inc.Inventor: Michael Baker
-
Publication number: 20160337396Abstract: A system and method for providing redundancy with remote scrubbing center devices. The system includes an edge detection device and a plurality of scrubbing center devices in a telecommunications network for providing redundant scrubbing center functionality for the edge detection device. The edge detection device maintains a network connection with more than one of the plurality of scrubbing center devices whereby each of the more than one of the plurality of scrubbing center devices sends and receives a synchronization signal with each of the one or more edge detection devices as if it was the only remote scrubbing center device coupled to the edge detection device.Type: ApplicationFiled: May 12, 2015Publication date: November 17, 2016Applicant: Arbor Networks, Inc.Inventor: Sean O'Hara
-
Publication number: 20160323299Abstract: A computer system and method for monitoring traffic for determining denial of service attacks in a network. Data packets are monitored which are attempting to access one or more server devices in a protected network. A Transport Control Protocol (TCP) window advertisement value is determined for the data packets. If a detected TCP window advertisement value for monitored packets is determined less than a TCP window advertisement threshold value then a determination is made as to whether the data rate for the packets is less than a data rate threshold value. The monitored packets are determined malicious if the detected window advertisement value is less than the TCP window advertisement threshold value and the determined data rate is less than the data rate threshold value.Type: ApplicationFiled: April 28, 2015Publication date: November 3, 2016Applicant: Arbor Networks, Inc.Inventor: Lawrence B. Huston, III
-
Publication number: 20160294871Abstract: A computer-implemented system and method for mitigating against denial of service attacks. The system includes a network having a plurality of programmable network switches and a mitigation device connected to one or more of the network switches. The mitigation device includes logic integrated with and/or executable by a processor. The logic being adapted to monitor network traffic from one or more of the network switches and determine network policies to provide protection against denial of service attacks. The mitigation device is configured and adapted to send a software-defined networking (SDN) protocol signal to the one or more of the network switches to program the one or more of the switches to match and drop attacker data traffic contingent upon the determined network policies.Type: ApplicationFiled: March 31, 2015Publication date: October 6, 2016Applicant: Arbor Networks, Inc.Inventors: Lawrence B. Huston, III, Andrew Mortensen
-
Patent number: 9432385Abstract: A method to mitigate attack by an upstream service provider using cloud mitigation services. An edge detection device, which located at the subscriber's network edge, is able to communicate information via status messages about attacks to an upstream service provider. The service provider is then able to mitigate attacks based on the status messages. There is a feedback loop whereby the amount of dropped traffic by the service provider is added to the network traffic to keep the mitigation request open and prevent flapping. Likewise, the detection device includes time-to-engage and time-to-disengage timers to further prevent flapping.Type: GrantFiled: December 16, 2011Date of Patent: August 30, 2016Assignee: Arbor Networks, Inc.Inventors: Chester Kustarz, Lawrence Bruce Huston, III, James A. Simpson, James Edward Winquist, Olan Patrick Barnes, Eric Jackson
-
Patent number: 9426174Abstract: A method and system for managing data traffic and protecting computing assets. The method and system includes analyzing HTTP requests to determine if the HTTP requests are overly segmented, and, if the HTTP request is overly segmented, blocking and/or black-listing the malevolent communications and computing device. The analysis to determine if an HTTP request is overly segmented includes comparing the packet's size to a threshold, identifying the packet's content or lack thereof, identifying whether the packet is the last packet in a communication, and identifying whether the packet ends with the ā\nā ASCII character.Type: GrantFiled: December 5, 2013Date of Patent: August 23, 2016Assignee: Arbor Networks, Inc.Inventor: Aaron Campbell
-
Patent number: 9407659Abstract: A method and system for managing data traffic and protecting computing assets. The method and system includes intercepting queries and messages, such as EDNS0 queries, and sending probe queries and reply queries to the originating computing device to determine whether the originating computing device may be sufficiently validated so as to justify forwarding resource-intensive queries and messages to the targeted computing device.Type: GrantFiled: April 23, 2014Date of Patent: August 2, 2016Assignee: Arbor Networks, Inc.Inventors: Ellis Roland Dobbins, Alexandru G. Bardas, Marc R. Eisenbarth
-
Patent number: 9344440Abstract: A node in a communication network determines a data rate capacity of one or more nodes of the communication network and creates a single managed object grouping for each node of the one or more nodes having a same data rate capacity. The node establishes one or more static thresholds for the single managed object grouping based on the data rate capacity. The static thresholds are independent of a baseline condition of detected data rates at each node of the single managed object grouping. The node further detects a current rate of received data at each node of the single managed grouping and triggers at least one alert for each node of the single managed grouping when the current rate of the received data at a particular node exceeds the one or more static thresholds.Type: GrantFiled: June 20, 2013Date of Patent: May 17, 2016Assignee: Arbor Networks, Inc.Inventors: James Edward Winquist, Joseph Welch, Tim Hoffman, Olan Patrick Barnes
-
Publication number: 20160134503Abstract: A method for network traffic characterization is provided. Flow data records are acquired associated with a security alert signature. Unidimensional traffic clusters are generated based on the acquired data. A Bloom filter is populated with the acquired flow data records. Clusters of interest are identified from the generated unidimensional traffic clusters. The identified clusters of interest are compressed into a compressed set. A determination is made whether a multidimensional processing of the acquired flow data needs to be performed based on a priority associated with the alert signature. A multidimensional lattice corresponding to the unidimensional traffic clusters is generated. The multidimensional lattice is traversed and for each multidimensional node under consideration a determination is made if the Bloom filter contains flow records matching the multidimensional node under consideration.Type: ApplicationFiled: November 7, 2014Publication date: May 12, 2016Applicant: ARBOR NETWORKS, INC.Inventors: David Watson, Lawrence B. Huston, III, James E. Winquist, Jeremiah Martell, Nicholas Scott
-
Publication number: 20160088013Abstract: A method for monitoring traffic flow in a network is provided. A network monitoring probe monitors one or more network traffic flow parameters to detect a denial of service attack. In response to detecting the denial of service attack, a first set of data representing the denial of service attack alert is displayed. Filtering criteria are received from a user. The filtering criteria include at least one of the network flow parameters identified as legitimate network traffic. A second set of data is generated and displayed based on the filtering criteria.Type: ApplicationFiled: September 24, 2014Publication date: March 24, 2016Applicant: ARBOR NETWORKS, INC.Inventors: David Watson, Anthony Danducci, Joanna Markel, Willie Northway, Steven Lyskawa, James E. Winquist
-
Publication number: 20160065444Abstract: A method for monitoring control traffic in a network is provided. A network monitoring probe passively monitors one or more network performance metrics related to control traffic. A plurality of threshold values associated with the one or more network performance metrics is received from a user. An alert notification message is sent to the user via an alert engine, in response to determining that at least one of the plurality of threshold values has been reached by the control traffic.Type: ApplicationFiled: August 26, 2014Publication date: March 3, 2016Applicant: Arbor Networks, Inc.Inventors: Mark Schunder, R. G. Reed, Joseph Welch, Carl Anderson, Joanna Markel