Patents Assigned to Arbor Networks
  • Publication number: 20180103058
    Abstract: A system and computer-implemented method for mitigating a malicious network attack. The method includes receiving an attack alert that a network attack has been detected, saving a sample of captured network traffic in response to the attack alert, playing back the sample while applying a playback countermeasure to the captured network traffic to block sample segments from the sample, analyzing at least one of the blocked sample segments and throughput sample segments that are not blocked, and adjusting the playback countermeasure in response to a result of the analyzing.
    Type: Application
    Filed: October 11, 2016
    Publication date: April 12, 2018
    Applicant: Arbor Networks, Inc.
    Inventor: Brian St. Pierre
  • Publication number: 20180077189
    Abstract: A method to monitor a network is provided, including receiving traffic metric data indicating measurements related to a characteristic of network traffic flowing in the network and identifying network threats in intercepted traffic of the network traffic. The method further includes identifying a time associated with detection of each occurrence of the network threats and generating a graphical user interface having a GUI that includes a display of a time series graph that corresponds to a selected time period. The display includes a network traffic plot and an alert plot adjacent to the network traffic plot. The network traffic plot indicates a characteristic of network traffic relative to a timeline displayed along a first axis. The alert plot includes alert indicators, wherein each alert indicator is associated with detection of a network threat and aligned relative to the timeline based on the time identified for each occurrence of the detected network threats.
    Type: Application
    Filed: September 15, 2016
    Publication date: March 15, 2018
    Applicant: Arbor Networks, Inc.
    Inventors: Jeffrey Doppke, Joshua M. Fields, Christopher C. Cassell
  • Publication number: 20170373922
    Abstract: A network management system is provided in which a processing device coupled to a network performs operations to identify an interface accordance with a rule and associate the identified interface with a category in accordance with the rule. The interface is coupled between a managed device and the network. The rule is based on a name associated with the interface, wherein the name indicates semantic information about data transmitted via the interface. Upon detection of transmission of data via the interface, the processor further performs operations to determine an action associated with the category and apply the action to the data.
    Type: Application
    Filed: June 23, 2016
    Publication date: December 28, 2017
    Applicant: Arbor Networks, Inc.
    Inventors: Michael Kloos, Thomas Sundstrom
  • Publication number: 20170279817
    Abstract: A method is provided to monitor network traffic, including reserving a portion of a system memory for short-term storage of copied network traffic, wherein the system memory is volatile, receiving copied packets of intercepted network traffic traversing a network, wherein the packets are associated with a plurality of respective traffic streams included in the network traffic, storing the copied packets in the portion of the system memory, maintaining an ordered list per traffic stream of copied packets that are stored, removing copied packets selected, based on their positions in their respective ordered lists, from the portion of the system memory based on a storage constraint, receiving an attack alert identifying a packet that is involved in a network attack, identifying the traffic stream that includes the packet identified, and transferring stored copied packets that are included in the identified traffic stream from the portion of the system memory to a long-term storage device.
    Type: Application
    Filed: March 25, 2016
    Publication date: September 28, 2017
    Applicant: Arbor Networks, Inc.
    Inventors: Aaron Campbell, Christopher R. Hand, Frank Murphy
  • Patent number: 9749340
    Abstract: A computer system and method for monitoring traffic for determining denial of service attacks in a network. Data packets are monitored which are attempting to access one or more server devices in a protected network. A Transport Control Protocol (TCP) window advertisement value is determined for the data packets. If a detected TCP window advertisement value for monitored packets is determined less than a TCP window advertisement threshold value then a determination is made as to whether the data rate for the packets is less than a data rate threshold value. The monitored packets are determined malicious if the detected window advertisement value is less than the TCP window advertisement threshold value and the determined data rate is less than the data rate threshold value.
    Type: Grant
    Filed: April 28, 2015
    Date of Patent: August 29, 2017
    Assignee: Arbor Networks, Inc.
    Inventor: Lawrence B. Huston, III
  • Publication number: 20170208083
    Abstract: A network agent includes an ingress port in data communication with a network traffic source for receiving network traffic entering a network and an egress port in data communication with the ingress port and a protection device included in the network. The egress port is configured to transmit network traffic received from the ingress port to a network device included in the network. A processing device receives from a protection device included in the network blacklist addresses determined by the protection device to be a threat to the network, and maintains a blacklist that includes the received blacklist addresses. A physical layer device compares the network layer source address of a packet of the network traffic received by the ingress port to the blacklist and forwards the packet to the egress port only if the packet's source address is not included in the blacklist.
    Type: Application
    Filed: January 14, 2016
    Publication date: July 20, 2017
    Applicant: Arbor Networks, Inc.
    Inventor: Edmund J. Gurney, III
  • Publication number: 20170177198
    Abstract: A method and computer system are provided. A processing device of the computer system is configured to execute a browser function. The browser function is configured to access an information resource having a data element that is associated with an attribute that includes information. The browser function is further configured to display the information resource in a display portion of a display screen of the processing device. The data element is associated with an area positioned at a location of the displayed information resource, wherein the area is designated for displaying the data element. The browser function is further configured to display the attribute's information in the area associated with the data element in response to a first user action.
    Type: Application
    Filed: December 18, 2015
    Publication date: June 22, 2017
    Applicant: Arbor Networks, Inc.
    Inventors: Eleanor O' Neill, Louis Susi, Jeffrey Doppke
  • Patent number: 9628510
    Abstract: A system and method for providing redundancy with remote scrubbing center devices. The system includes an edge detection device and a plurality of scrubbing center devices in a telecommunications network for providing redundant scrubbing center functionality for the edge detection device. The edge detection device maintains a network connection with more than one of the plurality of scrubbing center devices whereby each of the more than one of the plurality of scrubbing center devices sends and receives a synchronization signal with each of the one or more edge detection devices as if it was the only remote scrubbing center device coupled to the edge detection device.
    Type: Grant
    Filed: May 12, 2015
    Date of Patent: April 18, 2017
    Assignee: Arbor Networks, Inc.
    Inventor: Sean O'Hara
  • Patent number: 9584533
    Abstract: A method for network traffic characterization is provided. Flow data records are acquired associated with a security alert signature. Unidimensional traffic clusters are generated based on the acquired data. A Bloom filter is populated with the acquired flow data records. Clusters of interest are identified from the generated unidimensional traffic clusters. The identified clusters of interest are compressed into a compressed set. A determination is made whether a multidimensional processing of the acquired flow data needs to be performed based on a priority associated with the alert signature. A multidimensional lattice corresponding to the unidimensional traffic clusters is generated. The multidimensional lattice is traversed and for each multidimensional node under consideration a determination is made if the Bloom filter contains flow records matching the multidimensional node under consideration.
    Type: Grant
    Filed: November 7, 2014
    Date of Patent: February 28, 2017
    Assignee: Arbor Networks, Inc.
    Inventors: David Watson, Lawrence B. Huston, III, James E. Winquist, Jeremiah Martell, Nicholas Scott
  • Patent number: 9578046
    Abstract: The systems and methods described herein relate to storing values, such as sketches, that represent time indexed data related to network traffic. The model may be indexed by multiple sets of keys and time range values. It is an advantage that the index is essentially repeated for different time intervals. Utilization of the sketches avoids prohibitively large amounts of network traffic from overwhelming the monitoring computing device(s). Further, the probabilistic representative accuracy of the sketches is dynamically configurable. The time indexed data may represent data traffic on a computer network. The time indexed data may be data packets sent on the network. In one or more embodiments the time indexed data may be sketches that represent and/or approximate the data packets. Further, it is contemplated herein that the accuracy of the sketches' representation may be dynamically configurable.
    Type: Grant
    Filed: August 9, 2013
    Date of Patent: February 21, 2017
    Assignee: Arbor Networks, Inc.
    Inventor: Michael Baker
  • Publication number: 20160337396
    Abstract: A system and method for providing redundancy with remote scrubbing center devices. The system includes an edge detection device and a plurality of scrubbing center devices in a telecommunications network for providing redundant scrubbing center functionality for the edge detection device. The edge detection device maintains a network connection with more than one of the plurality of scrubbing center devices whereby each of the more than one of the plurality of scrubbing center devices sends and receives a synchronization signal with each of the one or more edge detection devices as if it was the only remote scrubbing center device coupled to the edge detection device.
    Type: Application
    Filed: May 12, 2015
    Publication date: November 17, 2016
    Applicant: Arbor Networks, Inc.
    Inventor: Sean O'Hara
  • Publication number: 20160323299
    Abstract: A computer system and method for monitoring traffic for determining denial of service attacks in a network. Data packets are monitored which are attempting to access one or more server devices in a protected network. A Transport Control Protocol (TCP) window advertisement value is determined for the data packets. If a detected TCP window advertisement value for monitored packets is determined less than a TCP window advertisement threshold value then a determination is made as to whether the data rate for the packets is less than a data rate threshold value. The monitored packets are determined malicious if the detected window advertisement value is less than the TCP window advertisement threshold value and the determined data rate is less than the data rate threshold value.
    Type: Application
    Filed: April 28, 2015
    Publication date: November 3, 2016
    Applicant: Arbor Networks, Inc.
    Inventor: Lawrence B. Huston, III
  • Publication number: 20160294871
    Abstract: A computer-implemented system and method for mitigating against denial of service attacks. The system includes a network having a plurality of programmable network switches and a mitigation device connected to one or more of the network switches. The mitigation device includes logic integrated with and/or executable by a processor. The logic being adapted to monitor network traffic from one or more of the network switches and determine network policies to provide protection against denial of service attacks. The mitigation device is configured and adapted to send a software-defined networking (SDN) protocol signal to the one or more of the network switches to program the one or more of the switches to match and drop attacker data traffic contingent upon the determined network policies.
    Type: Application
    Filed: March 31, 2015
    Publication date: October 6, 2016
    Applicant: Arbor Networks, Inc.
    Inventors: Lawrence B. Huston, III, Andrew Mortensen
  • Patent number: 9432385
    Abstract: A method to mitigate attack by an upstream service provider using cloud mitigation services. An edge detection device, which located at the subscriber's network edge, is able to communicate information via status messages about attacks to an upstream service provider. The service provider is then able to mitigate attacks based on the status messages. There is a feedback loop whereby the amount of dropped traffic by the service provider is added to the network traffic to keep the mitigation request open and prevent flapping. Likewise, the detection device includes time-to-engage and time-to-disengage timers to further prevent flapping.
    Type: Grant
    Filed: December 16, 2011
    Date of Patent: August 30, 2016
    Assignee: Arbor Networks, Inc.
    Inventors: Chester Kustarz, Lawrence Bruce Huston, III, James A. Simpson, James Edward Winquist, Olan Patrick Barnes, Eric Jackson
  • Patent number: 9426174
    Abstract: A method and system for managing data traffic and protecting computing assets. The method and system includes analyzing HTTP requests to determine if the HTTP requests are overly segmented, and, if the HTTP request is overly segmented, blocking and/or black-listing the malevolent communications and computing device. The analysis to determine if an HTTP request is overly segmented includes comparing the packet's size to a threshold, identifying the packet's content or lack thereof, identifying whether the packet is the last packet in a communication, and identifying whether the packet ends with the ā€œ\nā€ ASCII character.
    Type: Grant
    Filed: December 5, 2013
    Date of Patent: August 23, 2016
    Assignee: Arbor Networks, Inc.
    Inventor: Aaron Campbell
  • Patent number: 9407659
    Abstract: A method and system for managing data traffic and protecting computing assets. The method and system includes intercepting queries and messages, such as EDNS0 queries, and sending probe queries and reply queries to the originating computing device to determine whether the originating computing device may be sufficiently validated so as to justify forwarding resource-intensive queries and messages to the targeted computing device.
    Type: Grant
    Filed: April 23, 2014
    Date of Patent: August 2, 2016
    Assignee: Arbor Networks, Inc.
    Inventors: Ellis Roland Dobbins, Alexandru G. Bardas, Marc R. Eisenbarth
  • Patent number: 9344440
    Abstract: A node in a communication network determines a data rate capacity of one or more nodes of the communication network and creates a single managed object grouping for each node of the one or more nodes having a same data rate capacity. The node establishes one or more static thresholds for the single managed object grouping based on the data rate capacity. The static thresholds are independent of a baseline condition of detected data rates at each node of the single managed object grouping. The node further detects a current rate of received data at each node of the single managed grouping and triggers at least one alert for each node of the single managed grouping when the current rate of the received data at a particular node exceeds the one or more static thresholds.
    Type: Grant
    Filed: June 20, 2013
    Date of Patent: May 17, 2016
    Assignee: Arbor Networks, Inc.
    Inventors: James Edward Winquist, Joseph Welch, Tim Hoffman, Olan Patrick Barnes
  • Publication number: 20160134503
    Abstract: A method for network traffic characterization is provided. Flow data records are acquired associated with a security alert signature. Unidimensional traffic clusters are generated based on the acquired data. A Bloom filter is populated with the acquired flow data records. Clusters of interest are identified from the generated unidimensional traffic clusters. The identified clusters of interest are compressed into a compressed set. A determination is made whether a multidimensional processing of the acquired flow data needs to be performed based on a priority associated with the alert signature. A multidimensional lattice corresponding to the unidimensional traffic clusters is generated. The multidimensional lattice is traversed and for each multidimensional node under consideration a determination is made if the Bloom filter contains flow records matching the multidimensional node under consideration.
    Type: Application
    Filed: November 7, 2014
    Publication date: May 12, 2016
    Applicant: ARBOR NETWORKS, INC.
    Inventors: David Watson, Lawrence B. Huston, III, James E. Winquist, Jeremiah Martell, Nicholas Scott
  • Publication number: 20160088013
    Abstract: A method for monitoring traffic flow in a network is provided. A network monitoring probe monitors one or more network traffic flow parameters to detect a denial of service attack. In response to detecting the denial of service attack, a first set of data representing the denial of service attack alert is displayed. Filtering criteria are received from a user. The filtering criteria include at least one of the network flow parameters identified as legitimate network traffic. A second set of data is generated and displayed based on the filtering criteria.
    Type: Application
    Filed: September 24, 2014
    Publication date: March 24, 2016
    Applicant: ARBOR NETWORKS, INC.
    Inventors: David Watson, Anthony Danducci, Joanna Markel, Willie Northway, Steven Lyskawa, James E. Winquist
  • Publication number: 20160065444
    Abstract: A method for monitoring control traffic in a network is provided. A network monitoring probe passively monitors one or more network performance metrics related to control traffic. A plurality of threshold values associated with the one or more network performance metrics is received from a user. An alert notification message is sent to the user via an alert engine, in response to determining that at least one of the plurality of threshold values has been reached by the control traffic.
    Type: Application
    Filed: August 26, 2014
    Publication date: March 3, 2016
    Applicant: Arbor Networks, Inc.
    Inventors: Mark Schunder, R. G. Reed, Joseph Welch, Carl Anderson, Joanna Markel