Endpoint Trust-based Traffic Management
Publication Date: 2017-Oct-31
The IP.com Prior Art Database
Related PeopleOther Related People:
Current methods for managing traffic through content inspection tend to process all sessions similarly. Internet traffic examples like DDoS mitigation require all data to pass through one of a limited number of scrubbing centers, which create both natural choke points and the potential for widespread collateral damage should a center become overloaded. Similar issues exist with email SPAM and malware filtering, traffic shaping, etc. We propose a general method to utilize existing iPv6 protocols that enables destinations to temporarily confer trust on sources, and for trusted traffic to be routed and processed differently from untrusted traffic. We further propose a variant of this method for HTTP and HTTPS traffic that works with both IPv4 and IPv6.