Active monitoring of border network fabrics

    公开(公告)号:US10243785B1

    公开(公告)日:2019-03-26

    申请号:US15182133

    申请日:2016-06-14

    Abstract: Technologies are provided for active monitoring of network fabrics, such as border network fabrics. For example, test packets can be generated and sent to destination devices within the network fabrics. The test packets can have destination ports that have been identified as closed destination ports. The success of the test packets can be determined based on whether ICMP error packet responses are received. If a network problem is detected based on results of the test packets, then traceroute packets can be used to identify the location of the network problem.

    Shifting network traffic
    4.
    发明授权

    公开(公告)号:US10129089B1

    公开(公告)日:2018-11-13

    申请号:US14979362

    申请日:2015-12-22

    Abstract: A traffic shifting system is described to shift traffic away from one or more network devices or interfaces on those devices. The system ensures that traffic can be safely shifted off of a network device before the shifting occurs. The method is described as broken into several phases for simplicity, such as a discovery phase, a pre-check phase, a shifting phase, and a post-shift phase. Before shifting occurs, the discovery phase is used to obtain network topology and configuration information. In the pre-check phase, that information is interrogated so that a shifting can be performed without negatively impacting the network. If the pre-check phase is passed, then the network shifting can occur through adjustment of configuration parameters, such as a cost parameter. Finally, in the post-shift phase, checks are performed to ensure traffic is shifting away from the network device.

    Shifting network traffic from a network device

    公开(公告)号:US11563641B1

    公开(公告)日:2023-01-24

    申请号:US16228321

    申请日:2018-12-20

    Abstract: A traffic shifting system is described to shift traffic away from one or more network devices or interfaces. The system ensures that traffic can be safely shifted off of a network device before the shifting occurs. The method is described as broken into several phases, such as a discovery phase, a pre-check phase, a shifting phase, and a post-shift phase. Before shifting occurs, the discovery phase is used to obtain network topology and configuration information. In the pre-check phase, that information is interrogated so that a shifting can be performed without negatively impacting the network. If the pre-check phase is passed, then the network shifting can occur through adjustment of configuration parameters, such as a cost parameter associated with an interface on any devices for which traffic is being shifted. Finally, in the post-shift phase, checks are performed to ensure traffic is shifting away from the network device.

    SHIFTING NETWORK TRAFFIC FROM A NETWORK DEVICE

    公开(公告)号:US20170180210A1

    公开(公告)日:2017-06-22

    申请号:US14979356

    申请日:2015-12-22

    Abstract: A traffic shifting system is described to shift traffic away from one or more network devices or interfaces. The system ensures that traffic can be safely shifted off of a network device before the shifting occurs. The method is described as broken into several phases, such as a discovery phase, a pre-check phase, a shifting phase, and a post-shift phase. Before shifting occurs, the discovery phase is used to obtain network topology and configuration information. In the pre-check phase, that information is interrogated so that a shifting can be performed without negatively impacting the network. If the pre-check phase is passed, then the network shifting can occur through adjustment of configuration parameters, such as a cost parameter associated with an interface on any devices for which traffic is being shifted. Finally, in the post-shift phase, checks are performed to ensure traffic is shifting away from the network device.

    Shifting network traffic from a network device

    公开(公告)号:US10164836B2

    公开(公告)日:2018-12-25

    申请号:US14979356

    申请日:2015-12-22

    Abstract: A traffic shifting system is described to shift traffic away from one or more network devices or interfaces. The system ensures that traffic can be safely shifted off of a network device before the shifting occurs. The method is described as broken into several phases, such as a discovery phase, a pre-check phase, a shifting phase, and a post-shift phase. Before shifting occurs, the discovery phase is used to obtain network topology and configuration information. In the pre-check phase, that information is interrogated so that a shifting can be performed without negatively impacting the network. If the pre-check phase is passed, then the network shifting can occur through adjustment of configuration parameters, such as a cost parameter associated with an interface on any devices for which traffic is being shifted. Finally, in the post-shift phase, checks are performed to ensure traffic is shifting away from the network device.

    Techniques for identifying sources of unauthorized code
    9.
    发明授权
    Techniques for identifying sources of unauthorized code 有权
    识别未经授权的代码来源的技术

    公开(公告)号:US09130976B1

    公开(公告)日:2015-09-08

    申请号:US14084287

    申请日:2013-11-19

    Abstract: Techniques described and suggested herein include systems and methods for identifying potential sources of infections of devices by unauthorized code. In an embodiment, network traffic is logged. A plurality of computing devices that include unauthorized code is identified. The logged traffic is used to identify information sources accessed by the identified affected devices. The identified information sources may be refined. Refinement of the identified information sources may include excluding information sources that have been accessed by uninfected devices. A user interface that allows a user to further refine the identified information sources may be provided.

    Abstract translation: 本文描述和建议的技术包括用于通过未经授权的代码识别设备的潜在感染源的系统和方法。 在一个实施例中,记录网络流量。 识别包括未授权代码的多个计算设备。 记录的流量用于识别由识别的受影响设备访问的信息源。 所识别的信息源可以被改进。 识别的信息源的细化可能包括排除未感染设备访问的信息源。 可以提供允许用户进一步细化所识别的信息源的用户界面。

Patent Agency Ranking