-
公开(公告)号:US10909557B2
公开(公告)日:2021-02-02
申请号:US15651057
申请日:2017-07-17
Applicant: Amazon Technologies, Inc.
Inventor: Andrew Stuart Huntwork , Melissa Elaine Davis , Gavin Richard Jewell
Abstract: Disclosed are various embodiments for predicting and classifying events that create a sudden or substantial increase in network traffic activity. To begin, an increase of network activity can be detected. Upon detecting the increase in network activity, it can be determined that the increase in network activity is unexpected in view of one or more predicted activity events. The system can be adjusted to reduce the network activity in response to determining that the increase in network activity is unexpected.
-
公开(公告)号:US20170316437A1
公开(公告)日:2017-11-02
申请号:US15651057
申请日:2017-07-17
Applicant: Amazon Technologies, Inc.
Inventor: Andrew Stuart Huntwork , Melissa Elaine Davis , Gavin Richard Jewell
CPC classification number: G06Q30/0202 , G06F9/50
Abstract: Disclosed are various embodiments for predicting and classifying events that create a sudden or substantial increase in network traffic activity. To begin, an increase of network activity can be detected. Upon detecting the increase in network activity, it can be determined that the increase in network activity is unexpected in view of one or more predicted activity events. The system can be adjusted to reduce the network activity in response to determining that the increase in network activity is unexpected.
-
公开(公告)号:US09870348B1
公开(公告)日:2018-01-16
申请号:US14160099
申请日:2014-01-21
Applicant: Amazon Technologies, Inc.
Inventor: John Ingram Baker Dugaw , Zachary Mohamed Shalla , Anand Victor , Jeremy Boynes , Andrew Stuart Huntwork
CPC classification number: G06F17/2247 , G06Q30/00
Abstract: Disclosed are various embodiments for the mapping of behavior to data. Multiple behavior elements from a code library that are compatible with one or more data elements of a document are determined according to a data contract associated with each one of the behavior elements. Each of the behavior elements is configured to consume one or more data elements and produce a user interface feature. One or more of the behavior elements are selected according to one or more rules. A mapping of the selected behavior elements to the data elements is generated.
-
公开(公告)号:US09590854B1
公开(公告)日:2017-03-07
申请号:US14314548
申请日:2014-06-25
Applicant: Amazon Technologies, Inc.
Inventor: Shashank Shekhar , Gurinder Raju , Andrew Stuart Huntwork , David Edouard Louis Robert , Pravi Garg
IPC: H04L12/24
CPC classification number: H04L41/0873 , H04L41/0893
Abstract: Techniques for providing a network auditing service may be provided. Information about a configuration of a potentially compromised network of computer resources may be compared to a maintained and standard network configuration that is distinct from the potentially compromised network to determine differences. In one example, the potentially compromised network of computer resources may be periodically scanned for configuration information, which may be compared to the standard network configuration to determine if any changes have occurred that would indicate security problems. A report of the differences between the potentially compromised network and the standard network configuration information may be generated and provided for presentation.
Abstract translation: 可以提供用于提供网络审计服务的技术。 可以将关于潜在受损的计算机资源网络的配置的信息与不同于潜在受损网络的维护和标准网络配置进行比较,以确定差异。 在一个示例中,可以周期性地扫描计算机资源的可能受损的网络,用于配置信息,其可以与标准网络配置进行比较,以确定是否发生了任何指示安全问题的更改。 可能会生成潜在受损网络和标准网络配置信息之间差异的报告,并提供用于演示。
-
公开(公告)号:US10013691B1
公开(公告)日:2018-07-03
申请号:US14164703
申请日:2014-01-27
Applicant: Amazon Technologies, Inc.
Inventor: Andrew Stuart Huntwork , Jeremy Boynes
CPC classification number: G06Q20/382 , G06Q10/06 , G06Q30/0601 , G06Q40/02
Abstract: Disclosed are various embodiments for separating control of network sites through the use of a proxy server application. A request for network content is received from a computing device. The network content is hosted by an organization on behalf of a customer. The network content is requested from one application on a trusted network that is subject to security supervision by the organization when the network content is determined to correspond to a secured portion of a network site. The network content is instead requested from another application managed by the customer on an untrusted network that is not subject to security supervision by the organization when the network content is determined to correspond to an unsecured portion of the network site. The network content is then sent to the computing device.
-
公开(公告)号:US09727882B1
公开(公告)日:2017-08-08
申请号:US13924046
申请日:2013-06-21
Applicant: Amazon Technologies, Inc.
Inventor: Andrew Stuart Huntwork , Melissa Elaine Davis , Gavin Richard Jewell
CPC classification number: G06Q30/0202 , G06F9/50
Abstract: Disclosed are various embodiments for predicting and classifying events that create a sudden and substantial increase in network traffic activity. To begin, a sales event may be predicted based on the results following the search for one or more prediction factors that occur during a predefined period of time. Based either on the individual results of each evaluation or a combination of results of the search of two or more of the prediction factors, a sales event may be predicted. Additionally, upon detection of a sudden and substantial increase in network traffic activity, one or more classification factors may be evaluated to determine whether the cause of the increase is due to a sales event or other type of alternative activity event.
-
-
-
-
-