Fortinet, Inc.
Two-stage hash based logic for application layer distributed denial of service (DDoS) attack attribution
Last updated:
Abstract:
Methods and systems for a two-stage attribution of application layer DDoS attack are provided. In a first table just a hash index is maintained whereas the second stage table keeps the string parameter corresponding to the application layer attribute under attack. A linked list maintains a plurality of rows if there is hash collision in the first table. The second table is aged out and reported periodically with details of large strings.
Status:
Grant
Type:
Utility
Filling date:
8 May 2018
Issue date:
26 Apr 2022