International Business Machines Corporation
Identification of attack flows in a multi-tier network topology

Last updated:

Abstract:

Embodiments can provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are executed by the processor to cause the processor to implement a system for network protection, the method comprising determining, by the processor, if an incoming connection comprising one or more packets has a false latency larger than a trigger latency; determining, by the processor, if an attack is currently in progress; and if the attack is in progress, injecting, by the processor, at least one of the one or more packets of the incoming connection or one or more packets of an outgoing connection with a false latency.

Status:
Grant
Type:

Utility

Filling date:

14 Jan 2020

Issue date:

14 Sep 2021