会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明申请
    • CUSTOM ROUTING DECISIONS
    • 自定义路由决定
    • US20130010797A1
    • 2013-01-10
    • US13620509
    • 2012-09-14
    • Eric Jason BrandwineSwaminathan SivasubramanianBradley E. MarshallTate Andrew Certain
    • Eric Jason BrandwineSwaminathan SivasubramanianBradley E. MarshallTate Andrew Certain
    • H04L12/56
    • H04L45/14H04L12/4641H04L45/02
    • With the advent of virtualization technologies, networks and routing for those networks can now be simulated using commodity hardware rather than actual routers. For example, virtualization technologies such as those provided by VMWare, XEN, or User-Mode Linux can be adapted to allow a single physical computing machine to be shared among multiple virtual networks by providing each virtual network user with one or more virtual machines hosted by the single physical computing machine, with each such virtual machine being a software simulation acting as a distinct logical computing system that provides users with the illusion that they are the sole operators and administrators of a given hardware computing resource. In addition, routing can be accomplished through software, providing additional routing flexibility to the virtual network in comparison with traditional routing. As a result, in some implementations, supplemental information other than packet information can be used to determine network routing.
    • 随着虚拟化技术的出现,现在可以使用商品硬件而不是实际的路由器来模拟这些网络的网络和路由。 例如,诸如由VMWare,XEN或用户模式Linux提供的虚拟化技术可以被调整为允许单个物理计算机器在多个虚拟网络之间共享,通过为每个虚拟网络用户提供一个或多个由 单个物理计算机,其中每个这样的虚拟机是作为不同逻辑计算系统的软件模拟器,其向用户提供它们是给定硬件计算资源的唯一操作者和管理员的错觉。 此外,路由可以通过软件实现,与传统路由相比,为虚拟网络提供了额外的路由灵活性。 结果,在一些实现中,可以使用除分组信息之外的补充信息来确定网络路由。
    • 9. 发明授权
    • Tiered network flow analysis
    • 分层网络流分析
    • US08510821B1
    • 2013-08-13
    • US12825718
    • 2010-06-29
    • Eric Jason BrandwineSwaminathan SivasubramanianBradley E. MarshallTate Andrew Certain
    • Eric Jason BrandwineSwaminathan SivasubramanianBradley E. MarshallTate Andrew Certain
    • G06F15/16G06F11/00G06F11/30
    • G06F21/552G06F11/3006G06F11/3072H04L63/1416H04L63/1441
    • The effects on networking systems of attacks on vulnerabilities, such as vulnerable modules in a webserver, SYN flooding, etc, can be devastating to a network environment. In various embodiments, a first, quick, or inexpensive analysis is performed on incoming network flows. If an intrusion issue or other problem is suspected based on the first, rapid, or an inexpensive analysis, then the flow can be flagged for redirection to another process, virtual machine, or physical computer module that will perform a deeper, more expensive analysis on the network flow. If there are no issues detected in the second, deeper analysis, then the network flow can be forwarded to its intended recipient. If an issue is detected in the second, deeper analysis, then the network flow can be throttled, quarantined, ignored, sent to an un-trusted portion of the system, sent for more analysis, or otherwise handled or flagged.
    • 对网络系统攻击漏洞的影响,如网络服务器中的易受攻击的模块,SYN洪泛等,可能会对网络环境造成破坏。 在各种实施例中,对传入的网络流进行第一,快速或便宜的分析。 如果基于第一个,快速或便宜的分析怀疑入侵问题或其他问题,则可以标记流程以重定向到另一个进程,虚拟机或物理计算机模块,这将执行更深入,更昂贵的分析 网络流量。 如果在第二次更深入的分析中没有检测到问题,则网络流可以转发到其预期的接收者。 如果在第二次更深入的分析中检测到问题,则可以对网络流进行限制,隔离,忽略,发送到系统的不可信部分,发送以进行更多分析或以其他方式处理或标记。