ANYCAST-BASED SPOOFED TRAFFIC DETECTION AND MITIGATION
Systems and methods for detecting spoofed traffic include determining (410) a first hop count of a first data query from a first transmitting device to a first server, determining (420) a second hop count of a second data query from the first transmitting device to a second server, determining (435)...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Systems and methods for detecting spoofed traffic include determining (410) a first hop count of a first data query from a first transmitting device to a first server, determining (420) a second hop count of a second data query from the first transmitting device to a second server, determining (435) a third hop count of a third data query appearing to be from the first transmitting device to the first server, and determining (445) a fourth hop count of a fourth data query appearing to be from the first transmitting device to the second server. The third and fourth hop counts are compared (450) to the first and second hop counts, respectively. It is determined (455) whether the third hop count differs from the first hop count by more than a predetermined amount. |
---|