Hash-based systems and methods for detecting, preventing, and tracing network worms and viruses

WC Milliken - US Patent 7,328,349, 2008 - Google Patents
Abstract A system (126-129) detects transmission of potentially malicious packets. The
system (126-129) receives packets and generates hash values corresponding to each of the …

Techniques for traffic diversion in software defined networks for mitigating denial of service attacks

A Chesla, E Doron - US Patent 9,055,006, 2015 - Google Patents
A method for mitigating of denial of service (DoS) attacks in a software defined network
(SDN). The method comprises receiving a DoS attack indication performed against at least …

Method for source-spoofed IP packet traceback

W Milliken - US Patent 8,059,551, 2011 - Google Patents
BACKGROUND The pervasiveness of the Internet makes it an attractive target to people with
malicious intent. Also, the design of the Internet makes it quite easy to obscure the origin of a …

Topology independent storage arrays and methods

TE Ludwig, CW Frank - US Patent 7,702,850, 2010 - Google Patents
4,890,227 A 12/1989 Watanabe et al. 5,129,088 A 7, 1992 Auslander et al. 5, 193,171 A 3,
1993 Shinmura et al. 5,506,969 A 4, 1996 Wall et al. 5,546,541 A 8, 1996 Drew et al …

Disaggregated resources and access methods

TE Ludwig, M Adams - US Patent 8,819,092, 2014 - Google Patents
US PATENT DOCUMENTS provide access to resource consumers by offering resource
node information to the resource consumers. Resource node information Supplied by each …

Stegoframeorder—mac layer covert network channel for wireless ieee 802.11 networks

K Sawicki, G Bieszczad, Z Piotrowski - Sensors, 2021 - mdpi.com
The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in
wireless computer networks exploiting non-deterministic algorithms of medium access (such …

Out-of band IP traceback using IP packets

A Belenky - US Patent 9,060,019, 2015 - Google Patents
7,444,515 B2 10/2008 Dharmapurikar et al. aspect involves discovering a denial-of-service
attack. Another aspect involves modifying operational parameters in response to the attack …

Generating storage system commands

M Adams, TE Ludwig, SK Baughman… - US Patent …, 2010 - Google Patents
5,867,686 A 2f1999 Conner et al. 6,928.473 B1 8/2005 Sundaram et al. 5,884,038 A 3/1999
Kapoor 6,941,555 B2 9/2005 Jacobs et al. 5,889,935 A 3, 1999 Ofek et al. 6,947,430 B2 …

Methods and apparatus for low power wireless communication

DD Wentzloff, BH Calhoun, NE Roberts… - US Patent …, 2019 - Google Patents
Embodiments include methods and apparatus for wireless network communication between
a device that operates a radio in compliance with a wireless communication standard and …

Virtual devices and virtual bus tunnels, modules and methods

CW Frank, TE Ludwig, WR Babbitt Jr, M Adams… - US Patent …, 2009 - Google Patents
Inventors: Charles William Frank, 62 Wheeler, Irvine, CA (US) 92620; Thomas Earl Ludwig,
4800 Camino Costado, San Clemente, CA (US) 92673; William R. Babbitt, Jr., 22350 …