会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 21. 发明授权
    • Fine-grained cloud management control using nested virtualization
    • 使用嵌套虚拟化的细粒度云管理控制
    • US08484639B2
    • 2013-07-09
    • US13080015
    • 2011-04-05
    • Hai HuangYaoping RuanSambit Sahu
    • Hai HuangYaoping RuanSambit Sahu
    • G06F9/455G06F15/16G06F15/173
    • G06F9/45541G06F9/45545G06F9/5077G06F2009/45566
    • A computer implemented method, a computer program product and a data processing system allocate resources within a computing organization. A hypervisor layer is implemented on an underlying hardware. The hypervisor layer comprises a set of virtual machines. A first pseudo-hypervisor layer is then implemented within a first one of the set of virtual machines of the hypervisor layer. The first pseudo-hypervisor layer comprises a second set of virtual machines. A first software component is located within a first virtual machine of the second set of virtual machines of the first pseudo-hypervisor layer. A second software component is collocated within a second virtual machine of the second set of virtual machines of the first pseudo-hypervisor layer.
    • 计算机实现的方法,计算机程序产品和数据处理系统在计算组织内分配资源。 管理程序层在底层硬件上实现。 管理程序层包括一组虚拟机。 然后,在管理程序层的一组虚拟机中的第一个虚拟机管理程序层中实现第一伪管理程序层。 第一伪管理程序层包括第二组虚拟机。 第一软件组件位于第一伪虚拟机管理程序层的第二组虚拟机的第一虚拟机内。 第二软件组件并置在第一伪虚拟机管理程序层的第二组虚拟机的第二虚拟机内。
    • 28. 发明授权
    • Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks
    • 用于提高内容分发网络对分布式拒绝服务攻击的弹性的方法和装置
    • US07836295B2
    • 2010-11-16
    • US10207695
    • 2002-07-29
    • Suresh N. ChariPau-Chen ChengKang-Won LeeSambit SahuAnees A. Shaikh
    • Suresh N. ChariPau-Chen ChengKang-Won LeeSambit SahuAnees A. Shaikh
    • H04L12/66
    • H04L63/1408H04L63/1458H04L67/1002
    • Several deterrence mechanisms suitable for content distribution networks (CDN) are provided. These include a hash-based request routing scheme and a site allocation scheme. The hash-based request routing scheme provides a way to distinguish legitimate requests from bogus requests. Using this mechanism, an attacker is required to generate O(n2)amount of traffic to victimize a CDN-hosted site when the site content is served from n CDN caches. Without these modifications, the attacker must generate only O(n) traffic to bring down the site. The site allocation scheme provides sufficient isolation among CDN-hosted Web sites to prevent an attack on one Web site from making other sites unavailable. Using an allocation strategy based on binary codes, it can be guaranteed that a successful attack on any individual Web site that disables its assigned servers, does not also bring down other Web sites hosted by the CDN.
    • 提供了适用于内容分发网络(CDN)的几种威慑机制。 这些包括基于散列的请求路由方案和站点分配方案。 基于散列的请求路由方案提供了一种区分合法请求与假请求的方法。 使用这种机制,当从n个CDN缓存提供站点内容时,攻击者需要生成O(n2)个流量来伤害CDN托管站点。 没有这些修改,攻击者必须只生成O(n)流量才能关闭该站点。 站点分配方案可以在CDN托管的网站之间提供足够的隔离,以防止一个网站的攻击使其他站点不可用。 使用基于二进制代码的分配策略,可以保证对任何单个网站的成功攻击禁用其分配的服务器,也不会导致其他由CDN托管的网站。