Patents by Inventor Scott Iekel-Johnson

Scott Iekel-Johnson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230319082
    Abstract: A method and apparatus for processing flow specification (Flowspec) messages to one or more of a plurality of customer networks by a controller device coupled to the plurality of customer networks. Preferably a network controller monitors network traffic flowing through each of the customer networks for detecting a network attack in one of the plurality of customer networks, via monitoring of the network traffic. Upon detection of a network attack, a Flowspec message is generated for the customer network detected to be under network attack wherein the Flowspec message is configured specifically for that customer network. The generated Flowspec message is transmitted to the customer network detected to be under network attack for implementation by the customer network for mitigation of the detected network attack.
    Type: Application
    Filed: April 4, 2022
    Publication date: October 5, 2023
    Applicant: Arbor Networks, Inc.
    Inventors: Scott Cameron, Danielle Fritz, Mitchell Hoffmeyer, Scott Iekel-Johnson, Andrew Inman, Grant Levene, Jiasi Li, William Martin Northway, JR., Ryan O'Rielly, Michael Ratanatharathorn, Lori Sulik, Chris Thiele, James Edward Winquist
  • Patent number: 11558410
    Abstract: A computer-implemented method and device for analyzing network packet traffic flow affected by a network security device in a communication network. Received in a network monitoring device is packet traffic flow data from a network security device that filters network traffic based upon prescribed security filter settings. The network monitoring device analyzes the received packet traffic flow data by correlating the received traffic flow data with the security filter settings prescribed in the network security device. Certain statistics are identified regarding the network traffic flow affected by the security filter settings of the network security device based upon the correlating of the received traffic flow data with the security filter settings prescribed in the network security device. A report regarding the identified statistics is preferably sent to a network administrator.
    Type: Grant
    Filed: May 19, 2020
    Date of Patent: January 17, 2023
    Assignee: Arbor Networks, Inc.
    Inventors: Scott Iekel-Johnson, James Edward Winquist, David Watson
  • Publication number: 20200382540
    Abstract: A computer-implemented method and device for analyzing network packet traffic flow affected by a network security device in a communication network. Received in a network monitoring device is packet traffic flow data from a network security device that filters network traffic based upon prescribed security filter settings. The network monitoring device analyzes the received packet traffic flow data by correlating the received traffic flow data with the security filter settings prescribed in the network security device. Certain statistics are identified regarding the network traffic flow affected by the security filter settings of the network security device based upon the correlating of the received traffic flow data with the security filter settings prescribed in the network security device. A report regarding the identified statistics is preferably sent to a network administrator.
    Type: Application
    Filed: May 19, 2020
    Publication date: December 3, 2020
    Applicant: Arbor Networks, Inc.
    Inventors: Scott Iekel-Johnson, James Edward Winquist, David Watson
  • Patent number: 10116692
    Abstract: A system for mitigating network attacks within encrypted network traffic is provided. The system includes a protected network including a plurality of devices. The system further includes attack mitigation devices communicatively coupled to the protected network and to a cloud platform. The attack mitigation devices are configured and operable to decrypt the encrypted traffic received from the cloud platform and destined to the protected network to form a plurality of decrypted network packets and analyze the plurality of decrypted network to detect attacks. The attack mitigation devices are further configured to generate, in response to detecting the attacks, attack signatures corresponding to the detected attacks and configured to send the generated attack signatures to attack mitigation services provided in the cloud platform. The attack mitigation services are configured and operable to drop encrypted network traffic matching the attack signatures received from the attack mitigation devices.
    Type: Grant
    Filed: September 4, 2015
    Date of Patent: October 30, 2018
    Assignee: Arbor Networks, Inc.
    Inventors: Lawrence B. Huston, III, Scott Iekel-Johnson
  • Publication number: 20180191744
    Abstract: An on-premises network protection system and method for providing on-premises network protection are provided. The system includes a memory configured to store instructions and a processor disposed in communication with the memory, wherein the processor upon execution of the instructions is configured to receive notification that a characteristic of premises-based network traffic associated with at least one identified target of a network attack exceeds a predetermined threshold, and submit, based on the notification, a request, that identifies the at least one identified target, to a cloud-based protection system to provide cloud-based threat mitigation for a portion of network traffic associated with the at least one identified target.
    Type: Application
    Filed: January 5, 2017
    Publication date: July 5, 2018
    Applicant: Arbor Networks, Inc.
    Inventors: Carlos E. Morales, Scott Iekel-Johnson
  • Publication number: 20170070531
    Abstract: A system for mitigating network attacks within encrypted network traffic is provided. The system includes a protected network including a plurality of devices. The system further includes attack mitigation devices communicatively coupled to the protected network and to a cloud platform. The attack mitigation devices are configured and operable to decrypt the encrypted traffic received from the cloud platform and destined to the protected network to form a plurality of decrypted network packets and analyze the plurality of decrypted network to detect attacks. The attack mitigation devices are further configured to generate, in response to detecting the attacks, attack signatures corresponding to the detected attacks and configured to send the generated attack signatures to attack mitigation services provided in the cloud platform. The attack mitigation services are configured and operable to drop encrypted network traffic matching the attack signatures received from the attack mitigation devices.
    Type: Application
    Filed: September 4, 2015
    Publication date: March 9, 2017
    Inventors: Lawrence B. Huston, III, Scott Iekel-Johnson
  • Patent number: 9060020
    Abstract: A system, method and computer readable storage medium that receives traffic/packets from external devices attempting to access protected devices in a protected network. A determination is made to whether a received packet belongs to one of a plurality of packet classifications. Each packet classification indicative of different classes of IP traffic. Countermeasures are applied to a received packet to prevent attack upon the protected devices. Applying a countermeasure to a received packet determined to belong to one of the plurality of packet classifications includes countermeasure modification/selection contingent upon the determined packet classification for the received packet.
    Type: Grant
    Filed: April 24, 2013
    Date of Patent: June 16, 2015
    Assignee: Arbor Networks, Inc.
    Inventors: Scott Iekel-Johnson, Aaron Campbell, Lawrence Bruce Huston, III, Brian Moran, Jeff Edwards, Marc Eisenbarth, Jose Oscar Nazario
  • Patent number: 8879415
    Abstract: A scalable flow monitoring solution takes in standard flow records exported from network devices such as routers, switches, firewalls, hubs, etc., and annotates the flow with additional information. This information is derived from a number of sources, including Border Gateway Protocol (BGP), Simple Network Management Protocol (SNMP), user configuration, and other, intelligent flow analysis. These annotations add information to the flow data, and can be used to perform value-added flow analysis. The annotated flow is then resent to a configurable set of destinations using standard flow formatting, e.g., Cisco System Inc.'s NetFlow, in one implementation. This allows the annotated flow to be processed and the enhanced information to be used by other flow analysis tools and existing flow analysis infrastructure.
    Type: Grant
    Filed: March 1, 2013
    Date of Patent: November 4, 2014
    Assignee: Arbor Networks, Inc.
    Inventors: Craig H. Labovitz, Joseph Eggleston, Scott Iekel-Johnson
  • Publication number: 20140325634
    Abstract: A system, method and computer readable storage medium that receives traffic/packets from external devices attempting to access protected devices in a protected network. A determination is made to whether a received packet belongs to one of a plurality of packet classifications. Each packet classification indicative of different classes of IP traffic. Countermeasures are applied to a received packet to prevent attack upon the protected devices. Applying a countermeasure to a received packet determined to belong to one of the plurality of packet classifications includes countermeasure modification/selection contingent upon the determined packet classification for the received packet.
    Type: Application
    Filed: April 24, 2013
    Publication date: October 30, 2014
    Inventors: Scott Iekel-Johnson, Aaron Campbell, Lawrence Bruce Huston, III, Brian Moran, Jeff Edwards, Marc Eisenbarth, Jose Oscar Nazario
  • Publication number: 20130290521
    Abstract: A scalable flow monitoring solution takes in standard flow records exported from network devices such as routers, switches, firewalls, hubs, etc., and annotates the flow with additional information. This information is derived from a number of sources, including Border Gateway Protocol (BGP), Simple Network Management Protocol (SNMP), user configuration, and other, intelligent flow analysis. These annotations add information to the flow data, and can be used to perform value-added flow analysis. The annotated flow is then resent to a configurable set of destinations using standard flow formatting, e.g., Cisco System Inc.'s NetFlow, in one implementation. This allows the annotated flow to be processed and the enhanced information to be used by other flow analysis tools and existing flow analysis infrastructure.
    Type: Application
    Filed: March 1, 2013
    Publication date: October 31, 2013
    Inventors: Craig H. Labovitz, Joseph Eggleston, Scott Iekel-Johnson
  • Patent number: 8549139
    Abstract: A system and method is provided for detecting, tracking and/or blocking control signal attacks, which can occur between local computer systems and/or between remote computer systems, network links, and/or routing systems over a computer network. The system includes a router monitor adapted to receive a plurality of control signals and related information from the computer network and to process the plurality of control signals and related information to detect one or more control signal anomalies. The router monitor is further adapted to generate a plurality of alert signals representing the one or more control signal anomalies. The system further includes a controller that is coupled to the router monitor and is adapted to receive the plurality of alert signals from the router monitor.
    Type: Grant
    Filed: November 29, 2010
    Date of Patent: October 1, 2013
    Assignee: Arbor Networks
    Inventors: Craig H. Labovitz, Scott Iekel-Johnson
  • Publication number: 20110296005
    Abstract: A system and method is provided for detecting, tracking and/or blocking control signal attacks, which can occur between local computer systems and/or between remote computer systems, network links, and/or routing systems over a computer network. The system includes a router monitor adapted to receive a plurality of control signals and related information from the computer network and to process the plurality of control signals and related information to detect one or more control signal anomalies. The router monitor is further adapted to generate a plurality of alert signals representing the one or more control signal anomalies. The system further includes a controller that is coupled to the router monitor and is adapted to receive the plurality of alert signals from the router monitor.
    Type: Application
    Filed: November 29, 2010
    Publication date: December 1, 2011
    Applicant: Arbor Networks
    Inventors: Craig H. Labovitz, Scott Iekel-Johnson
  • Patent number: 7844696
    Abstract: A system and method is provided for detecting, tracking and/or blocking control signal attacks, which can occur between local computer systems and/or between remote computer systems, network links, and/or routing systems over a computer network. The system includes a router monitor adapted to receive a plurality of control signals and related information from the computer network and to process the plurality of control signals and related information to detect one or more control signal anomalies. The router monitor is further adapted to generate a plurality of alert signals representing the one or more control signal anomalies. The system further includes a controller that is coupled to the router monitor and is adapted to receive the plurality of alert signals from the router monitor.
    Type: Grant
    Filed: June 27, 2002
    Date of Patent: November 30, 2010
    Assignee: Arbor Networks, Inc.
    Inventors: Craig H. Labovitz, Scott Iekel-Johnson
  • Publication number: 20090168648
    Abstract: A scalable flow monitoring solution takes in standard flow records exported from network devices such as routers, switches, firewalls, hubs, etc., and annotates the flow with additional information. This information is derived from a number of sources, including Border Gateway Protocol (BGP), Simple Network Management Protocol (SNMP), user configuration, and other, intelligent flow analysis. These annotations add information to the flow data, and can be used to perform value-added flow analysis. The annotated flow is then resent to a configurable set of destinations using standard flow formatting, e.g., Cisco System Inc.'s NetFlow, in one implementation. This allows the annotated flow to be processed and the enhanced information to be used by other flow analysis tools and existing flow analysis infrastructure.
    Type: Application
    Filed: December 29, 2007
    Publication date: July 2, 2009
    Applicant: Arbor Networks, Inc.
    Inventors: Craig Labovitz, Joseph Eggleston, Scott Iekel-Johnson
  • Publication number: 20030037136
    Abstract: A system and method is provided for detecting, tracking and/or blocking control signal attacks, which can occur between local computer systems and/or between remote computer systems, network links, and/or routing systems over a computer network. The system includes a router monitor adapted to receive a plurality of control signals and related information from the computer network and to process the plurality of control signals and related information to detect one or more control signal anomalies. The router monitor is further adapted to generate a plurality of alert signals representing the one or more control signal anomalies. The system further includes a controller that is coupled to the router monitor and is adapted to receive the plurality of alert signals from the router monitor.
    Type: Application
    Filed: June 27, 2002
    Publication date: February 20, 2003
    Inventors: Craig H. Labovitz, Scott Iekel-Johnson