US6961341B1
(en)
*
|
1996-07-02 |
2005-11-01 |
Microsoft Corporation |
Adaptive bandwidth throttling for network services
|
US6725272B1
(en)
*
|
2000-02-18 |
2004-04-20 |
Netscaler, Inc. |
Apparatus, method and computer program product for guaranteed content delivery incorporating putting a client on-hold based on response time
|
US6870331B2
(en)
*
|
2000-05-31 |
2005-03-22 |
Sarnoff Corporation |
Space-saving cathode ray tube employing a non-self-converging deflection yoke
|
US7711790B1
(en)
|
2000-08-24 |
2010-05-04 |
Foundry Networks, Inc. |
Securing an accessible computer system
|
US7725587B1
(en)
*
|
2000-08-24 |
2010-05-25 |
Aol Llc |
Deep packet scan hacker identification
|
US7043759B2
(en)
*
|
2000-09-07 |
2006-05-09 |
Mazu Networks, Inc. |
Architecture to thwart denial of service attacks
|
US7743134B2
(en)
*
|
2000-09-07 |
2010-06-22 |
Riverbed Technology, Inc. |
Thwarting source address spoofing-based denial of service attacks
|
US7702806B2
(en)
*
|
2000-09-07 |
2010-04-20 |
Riverbed Technology, Inc. |
Statistics collection for network traffic
|
US7278159B2
(en)
*
|
2000-09-07 |
2007-10-02 |
Mazu Networks, Inc. |
Coordinated thwarting of denial of service attacks
|
US7124440B2
(en)
*
|
2000-09-07 |
2006-10-17 |
Mazu Networks, Inc. |
Monitoring network traffic denial of service attacks
|
US7398317B2
(en)
*
|
2000-09-07 |
2008-07-08 |
Mazu Networks, Inc. |
Thwarting connection-based denial of service attacks
|
US20020032871A1
(en)
*
|
2000-09-08 |
2002-03-14 |
The Regents Of The University Of Michigan |
Method and system for detecting, tracking and blocking denial of service attacks over a computer network
|
US20020032793A1
(en)
*
|
2000-09-08 |
2002-03-14 |
The Regents Of The University Of Michigan |
Method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic
|
US20020138643A1
(en)
*
|
2000-10-19 |
2002-09-26 |
Shin Kang G. |
Method and system for controlling network traffic to a network computer
|
US7039721B1
(en)
*
|
2001-01-26 |
2006-05-02 |
Mcafee, Inc. |
System and method for protecting internet protocol addresses
|
US7146642B1
(en)
*
|
2001-06-29 |
2006-12-05 |
Mcafee, Inc. |
System, method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate device
|
KR20030009887A
(en)
*
|
2001-07-24 |
2003-02-05 |
주식회사 케이티 |
A system and method for intercepting DoS attack
|
US7047303B2
(en)
*
|
2001-07-26 |
2006-05-16 |
International Business Machines Corporation |
Apparatus and method for using a network processor to guard against a “denial-of-service” attack on a server or server cluster
|
US7464410B1
(en)
*
|
2001-08-30 |
2008-12-09 |
At&T Corp. |
Protection against flooding of a server
|
US20030074434A1
(en)
*
|
2001-10-11 |
2003-04-17 |
Jason James L. |
Determination of message source in network communications
|
JP4323745B2
(en)
*
|
2002-01-15 |
2009-09-02 |
三洋電機株式会社 |
Storage device
|
JP3566699B2
(en)
*
|
2002-01-30 |
2004-09-15 |
株式会社東芝 |
Server computer protection device and data transfer control method for the same
|
US7213264B2
(en)
|
2002-01-31 |
2007-05-01 |
Mazu Networks, Inc. |
Architecture to thwart denial of service attacks
|
US7743415B2
(en)
*
|
2002-01-31 |
2010-06-22 |
Riverbed Technology, Inc. |
Denial of service attacks characterization
|
JP3971941B2
(en)
|
2002-03-05 |
2007-09-05 |
三洋電機株式会社 |
Data storage
|
US6944663B2
(en)
*
|
2002-03-06 |
2005-09-13 |
Sun Microsystems, Inc. |
Method and apparatus for using client puzzles to protect against denial-of-service attacks
|
US7099320B1
(en)
*
|
2002-04-19 |
2006-08-29 |
Conxion Corporation |
Method and apparatus for detection of and response to abnormal data streams in high bandwidth data pipes
|
GB2391419A
(en)
|
2002-06-07 |
2004-02-04 |
Hewlett Packard Co |
Restricting the propagation of a virus within a network
|
GB2401280B
(en)
*
|
2003-04-29 |
2006-02-08 |
Hewlett Packard Development Co |
Propagation of viruses through an information technology network
|
US7418492B1
(en)
|
2002-06-20 |
2008-08-26 |
P-Cube Ltd. |
System and a method for testing network communication devices
|
US7254133B2
(en)
*
|
2002-07-15 |
2007-08-07 |
Intel Corporation |
Prevention of denial of service attacks
|
JP4387087B2
(en)
*
|
2002-07-25 |
2009-12-16 |
三洋電機株式会社 |
Data storage device
|
US7434254B1
(en)
*
|
2002-10-25 |
2008-10-07 |
Cisco Technology, Inc. |
Method and apparatus for automatic filter generation and maintenance
|
US8504879B2
(en)
*
|
2002-11-04 |
2013-08-06 |
Riverbed Technology, Inc. |
Connection based anomaly detection
|
US7664963B2
(en)
*
|
2002-11-04 |
2010-02-16 |
Riverbed Technology, Inc. |
Data collectors in connection-based intrusion detection
|
US8479057B2
(en)
*
|
2002-11-04 |
2013-07-02 |
Riverbed Technology, Inc. |
Aggregator for connection based anomaly detection
|
US7363656B2
(en)
*
|
2002-11-04 |
2008-04-22 |
Mazu Networks, Inc. |
Event detection/anomaly correlation heuristics
|
US7774839B2
(en)
|
2002-11-04 |
2010-08-10 |
Riverbed Technology, Inc. |
Feedback mechanism to minimize false assertions of a network intrusion
|
US7353538B2
(en)
*
|
2002-11-08 |
2008-04-01 |
Federal Network Systems Llc |
Server resource management, analysis, and intrusion negation
|
US7401360B2
(en)
*
|
2002-12-03 |
2008-07-15 |
Tekelec |
Methods and systems for identifying and mitigating telecommunications network security threats
|
US20060187821A1
(en)
*
|
2002-12-26 |
2006-08-24 |
Takahiro Watanabe |
Network terminal apparatus, communication overload avoiding method and program
|
US20040128539A1
(en)
*
|
2002-12-30 |
2004-07-01 |
Intel Corporation |
Method and apparatus for denial of service attack preemption
|
US7234161B1
(en)
*
|
2002-12-31 |
2007-06-19 |
Nvidia Corporation |
Method and apparatus for deflecting flooding attacks
|
US7747244B2
(en)
*
|
2003-01-23 |
2010-06-29 |
Research In Motion Limited |
Methods and apparatus for re-establishing communication for a wireless communication device after a communication loss in a wireless communication network
|
JP2004229125A
(en)
*
|
2003-01-24 |
2004-08-12 |
Sony Corp |
Transmitter and receiver
|
US7979694B2
(en)
*
|
2003-03-03 |
2011-07-12 |
Cisco Technology, Inc. |
Using TCP to authenticate IP source addresses
|
GB2401281B
(en)
*
|
2003-04-29 |
2006-02-08 |
Hewlett Packard Development Co |
Propagation of viruses through an information technology network
|
US7796515B2
(en)
*
|
2003-04-29 |
2010-09-14 |
Hewlett-Packard Development Company, L.P. |
Propagation of viruses through an information technology network
|
US7620070B1
(en)
|
2003-06-24 |
2009-11-17 |
Nvidia Corporation |
Packet processing with re-insertion into network interface circuitry
|
US7913294B1
(en)
|
2003-06-24 |
2011-03-22 |
Nvidia Corporation |
Network protocol processing for filtering packets
|
US7814542B1
(en)
*
|
2003-06-30 |
2010-10-12 |
Cisco Technology, Inc. |
Network connection detection and throttling
|
US9614772B1
(en)
|
2003-10-20 |
2017-04-04 |
F5 Networks, Inc. |
System and method for directing network traffic in tunneling applications
|
FR2863128A1
(en)
*
|
2003-11-28 |
2005-06-03 |
France Telecom |
Signaling protocols e.g. internet protocol, unlawful usage detection and prevention method for e.g. Internet, involves applying delay insufficient and sufficient for blocking lawful and unlawful usage, respectively
|
US20050135239A1
(en)
*
|
2003-12-19 |
2005-06-23 |
International Business Machines Corporation |
Autonomic optimization of wireless local area networks via protocol concentration
|
CN100411344C
(en)
*
|
2004-01-19 |
2008-08-13 |
南京大学 |
Web server load control method for resisting rejection service attack
|
US7436770B2
(en)
*
|
2004-01-21 |
2008-10-14 |
Alcatel Lucent |
Metering packet flows for limiting effects of denial of service attacks
|
US8046763B1
(en)
*
|
2004-02-20 |
2011-10-25 |
Oracle America, Inc. |
Regulation of resource requests to control rate of resource consumption
|
WO2005101872A1
(en)
|
2004-04-14 |
2005-10-27 |
Nooren Consulting B.V. |
Method for preventing the delivery of short message service message spam
|
CN100593350C
(en)
*
|
2004-04-19 |
2010-03-03 |
意大利电信股份公司 |
Method and system for resource management in communication networks, related network and computer program product therefor
|
GB2431316B
(en)
*
|
2005-10-12 |
2008-05-21 |
Hewlett Packard Development Co |
Propagation of malicious code through an information technology network
|
US20050256968A1
(en)
*
|
2004-05-12 |
2005-11-17 |
Johnson Teddy C |
Delaying browser requests
|
US8203941B2
(en)
*
|
2004-05-28 |
2012-06-19 |
Hewlett-Packard Development Company, L.P. |
Virus/worm throttle threshold settings
|
US8154987B2
(en)
*
|
2004-06-09 |
2012-04-10 |
Intel Corporation |
Self-isolating and self-healing networked devices
|
US7441272B2
(en)
|
2004-06-09 |
2008-10-21 |
Intel Corporation |
Techniques for self-isolation of networked devices
|
US7929534B2
(en)
*
|
2004-06-28 |
2011-04-19 |
Riverbed Technology, Inc. |
Flow logging for connection-based anomaly detection
|
US8423645B2
(en)
|
2004-09-14 |
2013-04-16 |
International Business Machines Corporation |
Detection of grid participation in a DDoS attack
|
US20060059558A1
(en)
*
|
2004-09-15 |
2006-03-16 |
John Selep |
Proactive containment of network security attacks
|
US7657618B1
(en)
*
|
2004-10-15 |
2010-02-02 |
F5 Networks, Inc. |
Management of multiple client requests
|
US7760653B2
(en)
*
|
2004-10-26 |
2010-07-20 |
Riverbed Technology, Inc. |
Stackable aggregation for connection based anomaly detection
|
US7552206B2
(en)
*
|
2004-10-27 |
2009-06-23 |
Microsoft Corporation |
Throttling service connections based on network paths
|
US20060095961A1
(en)
*
|
2004-10-29 |
2006-05-04 |
Priya Govindarajan |
Auto-triage of potentially vulnerable network machines
|
US7797749B2
(en)
*
|
2004-11-03 |
2010-09-14 |
Intel Corporation |
Defending against worm or virus attacks on networks
|
US7602709B1
(en)
*
|
2004-11-17 |
2009-10-13 |
Juniper Networks, Inc. |
Congestion management of session negotiations in network devices
|
US7206845B2
(en)
*
|
2004-12-21 |
2007-04-17 |
International Business Machines Corporation |
Method, system and program product for monitoring and controlling access to a computer system resource
|
US7779471B2
(en)
*
|
2005-04-05 |
2010-08-17 |
Cisco Technology, Inc. |
Method and system for preventing DOS attacks
|
US7818795B1
(en)
|
2005-04-07 |
2010-10-19 |
Marvell Israel (M.I.S.L) Ltd. |
Per-port protection against denial-of-service and distributed denial-of-service attacks
|
US7765305B2
(en)
*
|
2005-04-07 |
2010-07-27 |
Microsoft Corporation |
Retry request overload protection
|
US7995538B2
(en)
*
|
2005-04-07 |
2011-08-09 |
Qualcomm Incorporated |
Method and apparatus for throttling access to a shared resource
|
US7774849B2
(en)
*
|
2005-04-15 |
2010-08-10 |
Tekelec |
Methods, systems, and computer program products for detecting and mitigating denial of service attacks in a telecommunications signaling network
|
US20060248588A1
(en)
*
|
2005-04-28 |
2006-11-02 |
Netdevices, Inc. |
Defending Denial of Service Attacks in an Inter-networked Environment
|
US8418233B1
(en)
|
2005-07-29 |
2013-04-09 |
F5 Networks, Inc. |
Rule based extensible authentication
|
US8533308B1
(en)
|
2005-08-12 |
2013-09-10 |
F5 Networks, Inc. |
Network traffic management through protocol-configurable transaction processing
|
US20070118653A1
(en)
*
|
2005-11-22 |
2007-05-24 |
Sabre Inc. |
System, method, and computer program product for throttling client traffic
|
US8146146B1
(en)
|
2005-12-23 |
2012-03-27 |
At&T Intellectual Property Ii, L.P. |
Method and apparatus for integrated network security alert information retrieval
|
US7881199B2
(en)
*
|
2006-01-04 |
2011-02-01 |
Alcatel Lucent |
System and method for prioritization of traffic through internet access network
|
US8565088B1
(en)
|
2006-02-01 |
2013-10-22 |
F5 Networks, Inc. |
Selectively enabling packet concatenation based on a transaction boundary
|
US8001601B2
(en)
*
|
2006-06-02 |
2011-08-16 |
At&T Intellectual Property Ii, L.P. |
Method and apparatus for large-scale automated distributed denial of service attack detection
|
US8156557B2
(en)
*
|
2007-01-04 |
2012-04-10 |
Cisco Technology, Inc. |
Protection against reflection distributed denial of service attacks
|
US9106606B1
(en)
|
2007-02-05 |
2015-08-11 |
F5 Networks, Inc. |
Method, intermediate device and computer program code for maintaining persistency
|
US8644151B2
(en)
*
|
2007-05-22 |
2014-02-04 |
Cisco Technology, Inc. |
Processing packet flows
|
US7689689B2
(en)
*
|
2007-06-11 |
2010-03-30 |
Air Products And Chemicals, Inc. |
Protection of industrial equipment from network storms emanating from a network system
|
US20100042734A1
(en)
*
|
2007-08-31 |
2010-02-18 |
Atli Olafsson |
Proxy server access restriction apparatus, systems, and methods
|
US8370937B2
(en)
*
|
2007-12-03 |
2013-02-05 |
Cisco Technology, Inc. |
Handling of DDoS attacks from NAT or proxy devices
|
US20090144404A1
(en)
*
|
2007-12-04 |
2009-06-04 |
Microsoft Corporation |
Load management in a distributed system
|
US20090150536A1
(en)
*
|
2007-12-05 |
2009-06-11 |
Microsoft Corporation |
Application layer congestion control
|
US9578055B1
(en)
*
|
2008-01-25 |
2017-02-21 |
F5 Networks, Inc. |
Thwarting drone-waged denial of service attacks on a network
|
US9832069B1
(en)
|
2008-05-30 |
2017-11-28 |
F5 Networks, Inc. |
Persistence based on server response in an IP multimedia subsystem (IMS)
|
US9130846B1
(en)
|
2008-08-27 |
2015-09-08 |
F5 Networks, Inc. |
Exposed control components for customizable load balancing and persistence
|
CN101674293B
(en)
*
|
2008-09-11 |
2013-04-03 |
阿里巴巴集团控股有限公司 |
Method and system for processing abnormal request in distributed application
|
US8161155B2
(en)
*
|
2008-09-29 |
2012-04-17 |
At&T Intellectual Property I, L.P. |
Filtering unwanted data traffic via a per-customer blacklist
|
US8631149B2
(en)
*
|
2008-11-25 |
2014-01-14 |
Citrix Systems, Inc. |
Systems and methods for object rate limiting
|
US9015322B2
(en)
*
|
2008-12-30 |
2015-04-21 |
Avaya Inc. |
Access to resources in a virtual environment
|
US8103769B1
(en)
*
|
2009-09-03 |
2012-01-24 |
Amazon Technologies, Inc. |
Dynamic isolation of shared resources
|
CN102045308B
(en)
*
|
2009-10-10 |
2014-04-30 |
中兴通讯股份有限公司 |
Method and device for preventing denial of service (DoS) attacks
|
US8452835B2
(en)
*
|
2009-12-23 |
2013-05-28 |
Citrix Systems, Inc. |
Systems and methods for object rate limiting in multi-core system
|
US9058210B2
(en)
|
2010-03-23 |
2015-06-16 |
Ebay Inc. |
Weighted request rate limiting for resources
|
US9313224B1
(en)
*
|
2010-09-30 |
2016-04-12 |
Google Inc. |
Connectivity protector
|
US8644177B2
(en)
|
2010-12-16 |
2014-02-04 |
Blackberry Limited |
Methods and apparatus for use in controlling data traffic for a wireless mobile terminal using a wireless access point (AP)
|
US20120174196A1
(en)
|
2010-12-30 |
2012-07-05 |
Suresh Bhogavilli |
Active validation for ddos and ssl ddos attacks
|
US9473530B2
(en)
|
2010-12-30 |
2016-10-18 |
Verisign, Inc. |
Client-side active validation for mitigating DDOS attacks
|
US8667056B1
(en)
*
|
2011-06-29 |
2014-03-04 |
Amazon Technologies, Inc. |
Dynamic traffic management
|
US9148304B2
(en)
|
2011-11-16 |
2015-09-29 |
International Business Machines Corporation |
Generating production server load activity for a test server
|
US8914497B1
(en)
*
|
2011-12-15 |
2014-12-16 |
Amazon Technologies, Inc. |
System and method for throttling service requests having non-uniform workloads
|
EP2807574A4
(en)
|
2012-01-24 |
2015-11-18 |
L 3 Comm Corp |
Methods and apparatus for managing network traffic
|
TWI469656B
(en)
*
|
2012-02-10 |
2015-01-11 |
Apple Inc |
Methods and apparatus for correcting error events associated with identity provisioning
|
US10432587B2
(en)
|
2012-02-21 |
2019-10-01 |
Aventail Llc |
VPN deep packet inspection
|
KR101424490B1
(en)
|
2013-01-17 |
2014-08-01 |
주식회사 윈스 |
Reverse access detecting system and method based on latency
|
EP2951971A1
(en)
*
|
2013-01-31 |
2015-12-09 |
Telefonaktiebolaget LM Ericsson (publ) |
Method and firewall for soliciting incoming packets
|
US9807092B1
(en)
|
2013-07-05 |
2017-10-31 |
Dcs7, Llc |
Systems and methods for classification of internet devices as hostile or benign
|
US9705895B1
(en)
|
2013-07-05 |
2017-07-11 |
Dcs7, Llc |
System and methods for classifying internet devices as hostile or benign
|
US9942265B2
(en)
*
|
2014-01-06 |
2018-04-10 |
International Business Machines Corporation |
Preventing application-level denial-of-service in a multi-tenant system
|
WO2016014728A1
(en)
*
|
2014-07-22 |
2016-01-28 |
Parallel Wireless, Inc. |
Signaling storm reduction from radio networks
|
US9900801B2
(en)
|
2014-08-08 |
2018-02-20 |
Parallel Wireless, Inc. |
Congestion and overload reduction
|
US11350254B1
(en)
|
2015-05-05 |
2022-05-31 |
F5, Inc. |
Methods for enforcing compliance policies and devices thereof
|
JP2017097625A
(en)
*
|
2015-11-24 |
2017-06-01 |
富士通株式会社 |
Determination program, determination method, and determination device
|
US11757946B1
(en)
*
|
2015-12-22 |
2023-09-12 |
F5, Inc. |
Methods for analyzing network traffic and enforcing network policies and devices thereof
|
US11178150B1
(en)
|
2016-01-20 |
2021-11-16 |
F5 Networks, Inc. |
Methods for enforcing access control list based on managed application and devices thereof
|
US10003598B2
(en)
|
2016-04-15 |
2018-06-19 |
Bank Of America Corporation |
Model framework and system for cyber security services
|
US9832201B1
(en)
|
2016-05-16 |
2017-11-28 |
Bank Of America Corporation |
System for generation and reuse of resource-centric threat modeling templates and identifying controls for securing technology resources
|
US9948652B2
(en)
|
2016-05-16 |
2018-04-17 |
Bank Of America Corporation |
System for resource-centric threat modeling and identifying controls for securing technology resources
|
US11122042B1
(en)
|
2017-05-12 |
2021-09-14 |
F5 Networks, Inc. |
Methods for dynamically managing user access control and devices thereof
|
US11343237B1
(en)
|
2017-05-12 |
2022-05-24 |
F5, Inc. |
Methods for managing a federated identity environment using security and access control data and devices thereof
|
US10339309B1
(en)
|
2017-06-09 |
2019-07-02 |
Bank Of America Corporation |
System for identifying anomalies in an information system
|
US10581745B2
(en)
*
|
2017-12-11 |
2020-03-03 |
International Business Machines Corporation |
Dynamic throttling thresholds
|
US10270794B1
(en)
*
|
2018-02-09 |
2019-04-23 |
Extrahop Networks, Inc. |
Detection of denial of service attacks
|
WO2019195086A1
(en)
*
|
2018-04-03 |
2019-10-10 |
Walmart Apollo, Llc |
Customized service request permission control system
|
US10862866B2
(en)
|
2018-06-26 |
2020-12-08 |
Oracle International Corporation |
Methods, systems, and computer readable media for multiple transaction capabilities application part (TCAP) operation code (opcode) screening
|
US11483209B2
(en)
*
|
2019-11-19 |
2022-10-25 |
Advanced Micro Devices, Inc. |
Forward progress mechanisms for a communications network having multiple nodes
|