摘要 |
Embodiments are directed towards network address based flood attack mitigation methods. A PTMD disposed between one or more computers may monitor several network flows and generate metrics associated with malicious network activity, such as, flood attacks. If flood attacks are determined to be occurring, the PTMD may determine the network addresses targeted by the flood attack. Further, the PTMD may activate flood attack mitigation procedures for the targeted network addresses such that other network addresses associated with the monitored network flows are excluded from the flood attack mitigation procedure. The PTMD may monitor the network traffic subsequently communicated to the targeted network addresses. Accordingly, the PTMD may determine if the flood attack has ceased based on characteristics of the monitored network traffic. If the flood attack has ceased, the flood attack mitigation procedures for the targeted network addresses may be deactivated. |
申请人 |
F5 NETWORKS, INC.;CAI, HAO;BAUMANN, WILLIAM, ROSS;SZABO, PAUL, I.;MICHELS, TIMOTHY, SCOTT |
发明人 |
CAI, HAO;BAUMANN, WILLIAM, ROSS;SZABO, PAUL, I.;MICHELS, TIMOTHY, SCOTT |