US 12,464,016 B2
Discriminating defense against DDoS attacks
Naftaly H. Minsky, New York, NY (US)
Assigned to RUTGERS, THE STATE UNIVERSITY OF NEW JERSEY, New Brunswick, NJ (US)
Appl. No. 18/570,284
Filed by Rutgers, The State University of New Jersey, New Brunswick, NJ (US)
PCT Filed Jun. 17, 2022, PCT No. PCT/US2022/073018
§ 371(c)(1), (2) Date Dec. 14, 2023,
PCT Pub. No. WO2022/266672, PCT Pub. Date Dec. 22, 2022.
Claims priority of provisional application 63/211,885, filed on Jun. 17, 2021.
Prior Publication US 2024/0291857 A1, Aug. 29, 2024
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1458 (2013.01) [H04L 63/0227 (2013.01); H04L 63/0823 (2013.01); H04L 2463/143 (2013.01)] 16 Claims
OG exemplary drawing
 
1. A method of defending a server against distributed denial-of-service (DDoS) attacks, the method comprising:
obtaining an indication of packets defined as important by a defending server;
defining a discrimination criterion, the discrimination criterion being a mechanism to identify packets complying with the obtained indication;
obtaining packets; and
for each obtained packet, controlling transmission of the packet to the defending server based on a verification, using the discrimination criterion, that the packet complies with the obtained indication, thereby defending the server from DDoS attacks;
wherein controlling transmission of the packet to the defending server comprises:
at a guarding node associated with the defending server, modifying or maintaining a pass field of the packet to indicate compliance or non-compliance with the obtained indication; and
transmitting the packet to the defending server in response to the pass field of the packet indicating compliance with the obtained indication; or carrying out a policy of dropping the packet, at a router, in response to the pass field of the packet indicating non-compliance with the obtained indication.