Fortinet, Inc.
Two-stage hash based logic for application layer distributed denial of service (DDoS) attack attribution

Last updated:

Abstract:

Methods and systems for a two-stage attribution of application layer DDoS attack are provided. In a first table just a hash index is maintained whereas the second stage table keeps the string parameter corresponding to the application layer attribute under attack. A linked list maintains a plurality of rows if there is hash collision in the first table. The second table is aged out and reported periodically with details of large strings.

Status:
Grant
Type:

Utility

Filling date:

8 May 2018

Issue date:

26 Apr 2022