Patents by Inventor Scott Iekel-Johnson
Scott Iekel-Johnson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230319082Abstract: A method and apparatus for processing flow specification (Flowspec) messages to one or more of a plurality of customer networks by a controller device coupled to the plurality of customer networks. Preferably a network controller monitors network traffic flowing through each of the customer networks for detecting a network attack in one of the plurality of customer networks, via monitoring of the network traffic. Upon detection of a network attack, a Flowspec message is generated for the customer network detected to be under network attack wherein the Flowspec message is configured specifically for that customer network. The generated Flowspec message is transmitted to the customer network detected to be under network attack for implementation by the customer network for mitigation of the detected network attack.Type: ApplicationFiled: April 4, 2022Publication date: October 5, 2023Applicant: Arbor Networks, Inc.Inventors: Scott Cameron, Danielle Fritz, Mitchell Hoffmeyer, Scott Iekel-Johnson, Andrew Inman, Grant Levene, Jiasi Li, William Martin Northway, JR., Ryan O'Rielly, Michael Ratanatharathorn, Lori Sulik, Chris Thiele, James Edward Winquist
-
Patent number: 11558410Abstract: A computer-implemented method and device for analyzing network packet traffic flow affected by a network security device in a communication network. Received in a network monitoring device is packet traffic flow data from a network security device that filters network traffic based upon prescribed security filter settings. The network monitoring device analyzes the received packet traffic flow data by correlating the received traffic flow data with the security filter settings prescribed in the network security device. Certain statistics are identified regarding the network traffic flow affected by the security filter settings of the network security device based upon the correlating of the received traffic flow data with the security filter settings prescribed in the network security device. A report regarding the identified statistics is preferably sent to a network administrator.Type: GrantFiled: May 19, 2020Date of Patent: January 17, 2023Assignee: Arbor Networks, Inc.Inventors: Scott Iekel-Johnson, James Edward Winquist, David Watson
-
Publication number: 20200382540Abstract: A computer-implemented method and device for analyzing network packet traffic flow affected by a network security device in a communication network. Received in a network monitoring device is packet traffic flow data from a network security device that filters network traffic based upon prescribed security filter settings. The network monitoring device analyzes the received packet traffic flow data by correlating the received traffic flow data with the security filter settings prescribed in the network security device. Certain statistics are identified regarding the network traffic flow affected by the security filter settings of the network security device based upon the correlating of the received traffic flow data with the security filter settings prescribed in the network security device. A report regarding the identified statistics is preferably sent to a network administrator.Type: ApplicationFiled: May 19, 2020Publication date: December 3, 2020Applicant: Arbor Networks, Inc.Inventors: Scott Iekel-Johnson, James Edward Winquist, David Watson
-
Patent number: 10116692Abstract: A system for mitigating network attacks within encrypted network traffic is provided. The system includes a protected network including a plurality of devices. The system further includes attack mitigation devices communicatively coupled to the protected network and to a cloud platform. The attack mitigation devices are configured and operable to decrypt the encrypted traffic received from the cloud platform and destined to the protected network to form a plurality of decrypted network packets and analyze the plurality of decrypted network to detect attacks. The attack mitigation devices are further configured to generate, in response to detecting the attacks, attack signatures corresponding to the detected attacks and configured to send the generated attack signatures to attack mitigation services provided in the cloud platform. The attack mitigation services are configured and operable to drop encrypted network traffic matching the attack signatures received from the attack mitigation devices.Type: GrantFiled: September 4, 2015Date of Patent: October 30, 2018Assignee: Arbor Networks, Inc.Inventors: Lawrence B. Huston, III, Scott Iekel-Johnson
-
Publication number: 20180191744Abstract: An on-premises network protection system and method for providing on-premises network protection are provided. The system includes a memory configured to store instructions and a processor disposed in communication with the memory, wherein the processor upon execution of the instructions is configured to receive notification that a characteristic of premises-based network traffic associated with at least one identified target of a network attack exceeds a predetermined threshold, and submit, based on the notification, a request, that identifies the at least one identified target, to a cloud-based protection system to provide cloud-based threat mitigation for a portion of network traffic associated with the at least one identified target.Type: ApplicationFiled: January 5, 2017Publication date: July 5, 2018Applicant: Arbor Networks, Inc.Inventors: Carlos E. Morales, Scott Iekel-Johnson
-
Publication number: 20170070531Abstract: A system for mitigating network attacks within encrypted network traffic is provided. The system includes a protected network including a plurality of devices. The system further includes attack mitigation devices communicatively coupled to the protected network and to a cloud platform. The attack mitigation devices are configured and operable to decrypt the encrypted traffic received from the cloud platform and destined to the protected network to form a plurality of decrypted network packets and analyze the plurality of decrypted network to detect attacks. The attack mitigation devices are further configured to generate, in response to detecting the attacks, attack signatures corresponding to the detected attacks and configured to send the generated attack signatures to attack mitigation services provided in the cloud platform. The attack mitigation services are configured and operable to drop encrypted network traffic matching the attack signatures received from the attack mitigation devices.Type: ApplicationFiled: September 4, 2015Publication date: March 9, 2017Inventors: Lawrence B. Huston, III, Scott Iekel-Johnson
-
Patent number: 9060020Abstract: A system, method and computer readable storage medium that receives traffic/packets from external devices attempting to access protected devices in a protected network. A determination is made to whether a received packet belongs to one of a plurality of packet classifications. Each packet classification indicative of different classes of IP traffic. Countermeasures are applied to a received packet to prevent attack upon the protected devices. Applying a countermeasure to a received packet determined to belong to one of the plurality of packet classifications includes countermeasure modification/selection contingent upon the determined packet classification for the received packet.Type: GrantFiled: April 24, 2013Date of Patent: June 16, 2015Assignee: Arbor Networks, Inc.Inventors: Scott Iekel-Johnson, Aaron Campbell, Lawrence Bruce Huston, III, Brian Moran, Jeff Edwards, Marc Eisenbarth, Jose Oscar Nazario
-
Patent number: 8879415Abstract: A scalable flow monitoring solution takes in standard flow records exported from network devices such as routers, switches, firewalls, hubs, etc., and annotates the flow with additional information. This information is derived from a number of sources, including Border Gateway Protocol (BGP), Simple Network Management Protocol (SNMP), user configuration, and other, intelligent flow analysis. These annotations add information to the flow data, and can be used to perform value-added flow analysis. The annotated flow is then resent to a configurable set of destinations using standard flow formatting, e.g., Cisco System Inc.'s NetFlow, in one implementation. This allows the annotated flow to be processed and the enhanced information to be used by other flow analysis tools and existing flow analysis infrastructure.Type: GrantFiled: March 1, 2013Date of Patent: November 4, 2014Assignee: Arbor Networks, Inc.Inventors: Craig H. Labovitz, Joseph Eggleston, Scott Iekel-Johnson
-
Publication number: 20140325634Abstract: A system, method and computer readable storage medium that receives traffic/packets from external devices attempting to access protected devices in a protected network. A determination is made to whether a received packet belongs to one of a plurality of packet classifications. Each packet classification indicative of different classes of IP traffic. Countermeasures are applied to a received packet to prevent attack upon the protected devices. Applying a countermeasure to a received packet determined to belong to one of the plurality of packet classifications includes countermeasure modification/selection contingent upon the determined packet classification for the received packet.Type: ApplicationFiled: April 24, 2013Publication date: October 30, 2014Inventors: Scott Iekel-Johnson, Aaron Campbell, Lawrence Bruce Huston, III, Brian Moran, Jeff Edwards, Marc Eisenbarth, Jose Oscar Nazario
-
Publication number: 20130290521Abstract: A scalable flow monitoring solution takes in standard flow records exported from network devices such as routers, switches, firewalls, hubs, etc., and annotates the flow with additional information. This information is derived from a number of sources, including Border Gateway Protocol (BGP), Simple Network Management Protocol (SNMP), user configuration, and other, intelligent flow analysis. These annotations add information to the flow data, and can be used to perform value-added flow analysis. The annotated flow is then resent to a configurable set of destinations using standard flow formatting, e.g., Cisco System Inc.'s NetFlow, in one implementation. This allows the annotated flow to be processed and the enhanced information to be used by other flow analysis tools and existing flow analysis infrastructure.Type: ApplicationFiled: March 1, 2013Publication date: October 31, 2013Inventors: Craig H. Labovitz, Joseph Eggleston, Scott Iekel-Johnson
-
Patent number: 8549139Abstract: A system and method is provided for detecting, tracking and/or blocking control signal attacks, which can occur between local computer systems and/or between remote computer systems, network links, and/or routing systems over a computer network. The system includes a router monitor adapted to receive a plurality of control signals and related information from the computer network and to process the plurality of control signals and related information to detect one or more control signal anomalies. The router monitor is further adapted to generate a plurality of alert signals representing the one or more control signal anomalies. The system further includes a controller that is coupled to the router monitor and is adapted to receive the plurality of alert signals from the router monitor.Type: GrantFiled: November 29, 2010Date of Patent: October 1, 2013Assignee: Arbor NetworksInventors: Craig H. Labovitz, Scott Iekel-Johnson
-
Publication number: 20110296005Abstract: A system and method is provided for detecting, tracking and/or blocking control signal attacks, which can occur between local computer systems and/or between remote computer systems, network links, and/or routing systems over a computer network. The system includes a router monitor adapted to receive a plurality of control signals and related information from the computer network and to process the plurality of control signals and related information to detect one or more control signal anomalies. The router monitor is further adapted to generate a plurality of alert signals representing the one or more control signal anomalies. The system further includes a controller that is coupled to the router monitor and is adapted to receive the plurality of alert signals from the router monitor.Type: ApplicationFiled: November 29, 2010Publication date: December 1, 2011Applicant: Arbor NetworksInventors: Craig H. Labovitz, Scott Iekel-Johnson
-
Patent number: 7844696Abstract: A system and method is provided for detecting, tracking and/or blocking control signal attacks, which can occur between local computer systems and/or between remote computer systems, network links, and/or routing systems over a computer network. The system includes a router monitor adapted to receive a plurality of control signals and related information from the computer network and to process the plurality of control signals and related information to detect one or more control signal anomalies. The router monitor is further adapted to generate a plurality of alert signals representing the one or more control signal anomalies. The system further includes a controller that is coupled to the router monitor and is adapted to receive the plurality of alert signals from the router monitor.Type: GrantFiled: June 27, 2002Date of Patent: November 30, 2010Assignee: Arbor Networks, Inc.Inventors: Craig H. Labovitz, Scott Iekel-Johnson
-
Publication number: 20090168648Abstract: A scalable flow monitoring solution takes in standard flow records exported from network devices such as routers, switches, firewalls, hubs, etc., and annotates the flow with additional information. This information is derived from a number of sources, including Border Gateway Protocol (BGP), Simple Network Management Protocol (SNMP), user configuration, and other, intelligent flow analysis. These annotations add information to the flow data, and can be used to perform value-added flow analysis. The annotated flow is then resent to a configurable set of destinations using standard flow formatting, e.g., Cisco System Inc.'s NetFlow, in one implementation. This allows the annotated flow to be processed and the enhanced information to be used by other flow analysis tools and existing flow analysis infrastructure.Type: ApplicationFiled: December 29, 2007Publication date: July 2, 2009Applicant: Arbor Networks, Inc.Inventors: Craig Labovitz, Joseph Eggleston, Scott Iekel-Johnson
-
Publication number: 20030037136Abstract: A system and method is provided for detecting, tracking and/or blocking control signal attacks, which can occur between local computer systems and/or between remote computer systems, network links, and/or routing systems over a computer network. The system includes a router monitor adapted to receive a plurality of control signals and related information from the computer network and to process the plurality of control signals and related information to detect one or more control signal anomalies. The router monitor is further adapted to generate a plurality of alert signals representing the one or more control signal anomalies. The system further includes a controller that is coupled to the router monitor and is adapted to receive the plurality of alert signals from the router monitor.Type: ApplicationFiled: June 27, 2002Publication date: February 20, 2003Inventors: Craig H. Labovitz, Scott Iekel-Johnson