1
Suresh N Chari, Pau Chen Cheng, Kang Won Lee, Sambit Sahu, Anees A Shaikh: Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks. International Business Machines Corporation, F Chau & Associates, November 16, 2010: US07836295 (4 worldwide citation)

Several deterrence mechanisms suitable for content distribution networks (CDN) are provided. These include a hash-based request routing scheme and a site allocation scheme. The hash-based request routing scheme provides a way to distinguish legitimate requests from bogus requests. Using this mechani ...


2
Chari Suresh N, Cheng Pau Chen, Lee Kang Won, Sahu Sambit, Shaikh Anees A: Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks. International Business Machines Corporation, CHAU Frank, February 5, 2004: WO/2004/012089 (1 worldwide citation)

Several deterrence mechanisms suitable for content distribution networks (CDN) (120) are provided. These include a hash-based request routing scheme and a site allocation scheme. The hash-based request routing scheme provides a way to distinguish legitimate requests from bogus requests. Using this m ...


3
Chari Suresh N, Cheng Pau Chen, Lee Kang Won, Sahu Sambit, Shaikh Anees A: Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks. Ibm, July 13, 2005: EP1552401-A1

Several deterrence mechanisms suitable for content distribution networks (CDN) are provided. These include a hash-based request routing scheme and a site allocation scheme. The hash-based request routing scheme provides a way to distinguish legitimate requests from bogus requests. Using this mechani ...


4
Suresh N Chari, Pau Chen Cheng, Kang Won Lee, Sambit Sahu, Anees A Shaikh: Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks. International Business Machines Corporation, Frank Chau, F Chau & Associates, January 29, 2004: US20040019781-A1

Several deterrence mechanisms suitable for content distribution networks (CDN) are provided. These include a hash-based request routing scheme and a site allocation scheme. The hash-based request routing scheme provides a way to distinguish legitimate requests from bogus requests. Using this mechani ...


5
Chari Suresh N, Cheng Pau Chen, Lee Kang Won, Sahu Sambit, Shaikh Anees A: Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks. Ibm, kang jianfeng, September 14, 2005: CN03816806

Several deterrence mechanisms suitable for content distribution networks (CDN) (120) are provided. These include a hash-based request routing scheme and a site allocation scheme. The hash-based request routing scheme provides a way to distinguish legitimate requests from bogus requests. Using this m ...


6
Chari Suresh N, Cheng Pau Chen, Lee Kang Won, Sahu Sambit, Shaikh Anees A: Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks. International Business Machines Corporation, February 28, 2005: KR1020057000148

Several deterrence mechanisms suitable for content distribution networks (CDN) (120) are provided. These include a hash-based request routing scheme and a site allocation scheme. The hash-based request routing scheme provides a way to distinguish legitimate requests from bogus requests. Using this m ...