Patents by Inventor Rephael Tzadikario

Rephael Tzadikario has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7979694
    Abstract: A method for authenticating communication traffic includes intercepting a request directed over a network from a source address to open a connection to a target computer in accordance with a handshake procedure specified by a predetermined communication protocol. A reply to the request that deviates from the specified handshake procedure is sent to the source address. A response from the source address to the reply is analyzed in order to make an assessment of legitimacy of the source address. Upon determining, based on the assessment, that the source address is legitimate, the target computer is permitted to complete the handshake procedure so as to open the connection with the source address.
    Type: Grant
    Filed: March 2, 2004
    Date of Patent: July 12, 2011
    Assignee: Cisco Technology, Inc.
    Inventors: Dan Touitou, Guy Pazi, Yehiel Shtein, Rephael Tzadikario
  • Patent number: 7624447
    Abstract: A computer-implemented method is provided for screening communication traffic. A list of one or more threshold pairs including respective first and second threshold values, each of which first threshold values is greater than one, are defined. Network traffic from a plurality of sources is monitored, so as to determine for each source a count of unique destination addresses to which the source transmitted data during a period of time. A response to malicious network traffic is invoked responsively to finding that each of a first number of the sources sent data to at least a second number of the destination addresses, wherein, for at least one of the threshold pairs, the first number is at least equal to the respective first threshold value, and the second number is at least equal to the respective second threshold value.
    Type: Grant
    Filed: September 8, 2005
    Date of Patent: November 24, 2009
    Assignee: Cisco Technology, Inc.
    Inventors: Keren Horowitz, Dror Karmi, Rami Rivlin, Dan Touitou, Rephael Tzadikario, Yehiel Stein
  • Patent number: 7540025
    Abstract: A computer-implemented method for mitigating attacks of malicious traffic in a computer network includes receiving a set of attack sequences, including first traffic sequences suspected of containing the malicious traffic, analyzing the attack sequences so as to automatically extract a regular expression that matches at least a portion of the attack sequences in the set, and comparing second traffic sequences to the regular expression in order to identify the second traffic sequences that contain the malicious traffic.
    Type: Grant
    Filed: November 18, 2004
    Date of Patent: May 26, 2009
    Assignee: Cisco Technology, Inc.
    Inventor: Rephael Tzadikario
  • Patent number: 7342929
    Abstract: An improved network device that controls throughput of packets received thereby, e.g., to downstream devices or to downstream logic contained within the same network device. The network device comprises a scheduler that schedules one or more packets of a selected class for throughput as a function of a weight of that class and weights of one or more other classes. The weight of at least the selected class is dynamic and is a function of a history of volume of packets received by the network device in the selected class. An apparatus for protecting against overload conditions on a network, e.g., of the type caused by DDoS attacks, has a scheduler and a token bucket mechanism, e.g., as described above. Such apparatus can also include a plurality of queues into which packets of the respective classes are placed on receipt by the apparatus. Those packets are dequeued by the scheduler, e.g., in the manner described above, for transmittal to downstream devices (e.g., potential victim nodes) on the network.
    Type: Grant
    Filed: April 26, 2002
    Date of Patent: March 11, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: Anat Bremler-Barr, Dan Touitou, Keren Horvitz, Rephael Tzadikario, Yehuda Afek
  • Publication number: 20060107321
    Abstract: A computer-implemented method for mitigating attacks of malicious traffic in a computer network includes receiving a set of attack sequences, including first traffic sequences suspected of containing the malicious traffic, analyzing the attack sequences so as to automatically extract a regular expression that matches at least a portion of the attack sequences in the set, and comparing second traffic sequences to the regular expression in order to identify the second traffic sequences that contain the malicious traffic.
    Type: Application
    Filed: November 18, 2004
    Publication date: May 18, 2006
    Inventor: Rephael Tzadikario
  • Publication number: 20050021999
    Abstract: A method for authenticating communication traffic includes intercepting a request directed over a network from a source address to open a connection to a target computer in accordance with a handshake procedure specified by a predetermined communication protocol. A reply to the request that deviates from the specified handshake procedure is sent to the source address. A response from the source address to the reply is analyzed in order to make an assessment of legitimacy of the source address. Upon determining, based on the assessment, that the source address is legitimate, the target computer is permitted to complete the handshake procedure so as to open the connection with the source address.
    Type: Application
    Filed: March 2, 2004
    Publication date: January 27, 2005
    Applicant: RIVERHEAD NETWORKS INC.
    Inventors: Dan Touitou, Guy Pazi, Yehiel Shtein, Rephael Tzadikario
  • Publication number: 20030076848
    Abstract: An improved network device that controls throughput of packets received thereby, e.g., to downstream devices or to downstream logic contained within the same network device. The network device comprises a scheduler that schedules one or more packets of a selected class for throughput as a function of a weight of that class and weights of one or more other classes. The weight of at least the selected class is dynamic and is a function of a history of volume of packets received by the network device in the selected class. An apparatus for protecting against overload conditions on a network, e.g., of the type caused by DDoS attacks, has a scheduler and a token bucket mechanism, e.g., as described above. Such apparatus can also include a plurality of queues into which packets of the respective classes are placed on receipt by the apparatus. Those packets are dequeued by the scheduler, e.g., in the manner described above, for transmittal to downstream devices (e.g., potential victim nodes) on the network.
    Type: Application
    Filed: April 26, 2002
    Publication date: April 24, 2003
    Inventors: Anat Bremler-Barr, Dan Touitou, Keren Horvitz, Rephael Tzadikario, Yehuda Afek