会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • Live Router Migration
    • 实时路由器迁移
    • US20110032830A1
    • 2011-02-10
    • US12536610
    • 2009-08-06
    • Jacobus Van Der MerweYi Wang
    • Jacobus Van Der MerweYi Wang
    • H04L12/26H04L12/28
    • H04L45/586
    • Live router migration is implemented by separating the logical features of a virtual router from its physical features. Tunnels are established between a source (physical) router and a destination (physical) router, allowing the control plane of the virtual router being migrated to send and receive messages from the destination router. The control plane information is then transferred to the destination router, which functions to clone the data plane at the destination router. Outgoing links from the destination router are then be established. The double appearance of the data plane at both the source and destination routers allows for the data plane information to be transferred asynchronously over to the destination router. Once all of the data plane information has been transferred, incoming data traffic links at the destination router can be established and the tunnels between the routers taken down.
    • 通过将虚拟路由器的逻辑特征与其物理特征分开来实现实时路由器迁移。 在源(物理)路由器和目的地(物理)路由器之间建立隧道,允许虚拟路由器的控制平面被迁移以从目的地路由器发送和接收消息。 然后,控制平面信息被传送到目的地路由器,其用于在目的地路由器处克隆数据平面。 然后建立来自目的地路由器的出站链路。 数据平面在源和目的地路由器的双重外观允许将数据平面信息异步传输到目标路由器。 一旦所有的数据平面信息被传输,就可以建立目的地路由器上的传入数据流量链路,并且路由器之间的隧道被占用。
    • 8. 发明授权
    • Method and apparatus for large-scale automated distributed denial of service attack detection
    • 用于大规模自动分布式拒绝服务攻击检测的方法和装置
    • US08001601B2
    • 2011-08-16
    • US11452623
    • 2006-06-14
    • Nicholas DuffieldJacobus Van Der MerweVyas SekarOliver Spatscheck
    • Nicholas DuffieldJacobus Van Der MerweVyas SekarOliver Spatscheck
    • G06F11/00G06F12/14G06F12/16G08B23/00
    • H04L63/1425H04L63/1458
    • A multi-staged framework for detecting and diagnosing Denial of Service attacks is disclosed in which a low-cost anomaly detection mechanism is first used to collect coarse data, such as may be obtained from Simple Network Management Protocol (SNMP) data flows. Such data is analyzed to detect volume anomalies that could possibly be indicative of a DDoS attack. If such an anomaly is suspected, incident reports are then generated and used to trigger the collection and analysis of fine grained data, such as that available in Netflow data flows. Both types of collection and analysis are illustratively conducted at edge routers within the service provider network that interface customers and customer networks to the service provider. Once records of the more detailed information have been retrieved, they are examined to determine whether the anomaly represents a distributed denial of service attack, at which point an alarm is generated.
    • 公开了一种用于检测和诊断拒绝服务攻击的多阶段框架,其中首先使用低成本异常检测机制来收集粗略数据,例如可以从简单网络管理协议(SNMP)数据流中获得。 分析这些数据以检测可能表示DDoS攻击的体积异常。 如果怀疑出现这种异常,则会生成事件报告,并用于触发对Netflow数据流中可用的细粒度数据的收集和分析。 这两种类型的收集和分析在服务提供商网络中的边缘路由器上进行说明性地进行,其将客户和客户网络接入服务提供商。 一旦检索到更详细信息的记录,就检查它们以确定异常是否表示分布式拒绝服务攻击,此时产生警报。