-
公开(公告)号:US20170331704A1
公开(公告)日:2017-11-16
申请号:US15669645
申请日:2017-08-04
Applicant: Amazon Technologies, Inc.
Inventor: Karl Andre McCabe , Eoin Francis Cavanagh , Sonali Roy , Carlos Vara Callau , Tyson James Lamoreaux , Alan Michael Judge , Timothy Richard Kohn
CPC classification number: H04L43/04 , G06F11/008 , G06F11/3452 , H04L41/064 , H04L41/0677 , H04L41/069 , H04L41/5009 , H04L41/507 , H04L43/0835
Abstract: Generally described, systems and methods are provided for detecting the impact of network failures. The system collects performance information from a plurality of nodes and links in a network, aggregates the collected performance information across paths in the network, processes the aggregated performance information for detecting failures on the paths, adjusts the set of performance information by removing the performance information for any nodes considered to be associated with performance information that is statistically different from performance information from other nodes at a given location or extrapolates the collected information to other paths, and determines the impact to customers of the network failures detected using the adjusted set of performance information.
-
公开(公告)号:US10411972B2
公开(公告)日:2019-09-10
申请号:US15669645
申请日:2017-08-04
Applicant: Amazon Technologies, Inc.
Inventor: Karl Andre McCabe , Eoin Francis Cavanagh , Sonali Roy , Carlos Vara Callau , Tyson James Lamoreaux , Alan Michael Judge , Timothy Richard Kohn
Abstract: Generally described, systems and methods are provided for detecting the impact of network failures. The system collects performance information from a plurality of nodes and links in a network, aggregates the collected performance information across paths in the network, processes the aggregated performance information for detecting failures on the paths, adjusts the set of performance information by removing the performance information for any nodes considered to be associated with performance information that is statistically different from performance information from other nodes at a given location or extrapolates the collected information to other paths, and determines the impact to customers of the network failures detected using the adjusted set of performance information.
-
公开(公告)号:US10243785B1
公开(公告)日:2019-03-26
申请号:US15182133
申请日:2016-06-14
Applicant: Amazon Technologies, Inc.
Inventor: John Corrigan , Karl Andre McCabe , Eoin Francis Cavanagh
Abstract: Technologies are provided for active monitoring of network fabrics, such as border network fabrics. For example, test packets can be generated and sent to destination devices within the network fabrics. The test packets can have destination ports that have been identified as closed destination ports. The success of the test packets can be determined based on whether ICMP error packet responses are received. If a network problem is detected based on results of the test packets, then traceroute packets can be used to identify the location of the network problem.
-
公开(公告)号:US10129089B1
公开(公告)日:2018-11-13
申请号:US14979362
申请日:2015-12-22
Applicant: Amazon Technologies, Inc.
Inventor: Dzianis Lisouski , Michal Zygmunt Zawirski , Robert Kennedy , Karl Andre McCabe , Paul A. Stancik , Matthew Dean Rehder , Brian Long
IPC: H04L12/24
Abstract: A traffic shifting system is described to shift traffic away from one or more network devices or interfaces on those devices. The system ensures that traffic can be safely shifted off of a network device before the shifting occurs. The method is described as broken into several phases for simplicity, such as a discovery phase, a pre-check phase, a shifting phase, and a post-shift phase. Before shifting occurs, the discovery phase is used to obtain network topology and configuration information. In the pre-check phase, that information is interrogated so that a shifting can be performed without negatively impacting the network. If the pre-check phase is passed, then the network shifting can occur through adjustment of configuration parameters, such as a cost parameter. Finally, in the post-shift phase, checks are performed to ensure traffic is shifting away from the network device.
-
公开(公告)号:US11563641B1
公开(公告)日:2023-01-24
申请号:US16228321
申请日:2018-12-20
Applicant: Amazon Technologies, Inc.
Inventor: Dzianis Lisouski , Michal Zygmunt Zawirski , Robert Kennedy , Karl Andre McCabe , Paul A. Stancik , Matthew Dean Rehder , Brian Long
IPC: H04L12/24 , H04L41/12 , H04L43/0876 , H04L45/12 , H04L41/0873 , H04L41/0813
Abstract: A traffic shifting system is described to shift traffic away from one or more network devices or interfaces. The system ensures that traffic can be safely shifted off of a network device before the shifting occurs. The method is described as broken into several phases, such as a discovery phase, a pre-check phase, a shifting phase, and a post-shift phase. Before shifting occurs, the discovery phase is used to obtain network topology and configuration information. In the pre-check phase, that information is interrogated so that a shifting can be performed without negatively impacting the network. If the pre-check phase is passed, then the network shifting can occur through adjustment of configuration parameters, such as a cost parameter associated with an interface on any devices for which traffic is being shifted. Finally, in the post-shift phase, checks are performed to ensure traffic is shifting away from the network device.
-
公开(公告)号:US20170180210A1
公开(公告)日:2017-06-22
申请号:US14979356
申请日:2015-12-22
Applicant: Amazon Technologies, Inc.
Inventor: Dzianis Lisouski , Michal Zygmunt Zawirski , Robert Kennedy , Karl Andre McCabe , Paul A. Stancik , Matthew Dean Rehder , Brian Long
IPC: H04L12/24
CPC classification number: H04L41/12 , H04L41/0813 , H04L41/0873 , H04L43/0876 , H04L45/123
Abstract: A traffic shifting system is described to shift traffic away from one or more network devices or interfaces. The system ensures that traffic can be safely shifted off of a network device before the shifting occurs. The method is described as broken into several phases, such as a discovery phase, a pre-check phase, a shifting phase, and a post-shift phase. Before shifting occurs, the discovery phase is used to obtain network topology and configuration information. In the pre-check phase, that information is interrogated so that a shifting can be performed without negatively impacting the network. If the pre-check phase is passed, then the network shifting can occur through adjustment of configuration parameters, such as a cost parameter associated with an interface on any devices for which traffic is being shifted. Finally, in the post-shift phase, checks are performed to ensure traffic is shifting away from the network device.
-
公开(公告)号:US10164836B2
公开(公告)日:2018-12-25
申请号:US14979356
申请日:2015-12-22
Applicant: Amazon Technologies, Inc.
Inventor: Dzianis Lisouski , Michal Zygmunt Zawirski , Robert Kennedy , Karl Andre McCabe , Paul A. Stancik , Matthew Dean Rehder , Brian Long
IPC: H04L12/24 , H04L12/721 , H04L12/26
Abstract: A traffic shifting system is described to shift traffic away from one or more network devices or interfaces. The system ensures that traffic can be safely shifted off of a network device before the shifting occurs. The method is described as broken into several phases, such as a discovery phase, a pre-check phase, a shifting phase, and a post-shift phase. Before shifting occurs, the discovery phase is used to obtain network topology and configuration information. In the pre-check phase, that information is interrogated so that a shifting can be performed without negatively impacting the network. If the pre-check phase is passed, then the network shifting can occur through adjustment of configuration parameters, such as a cost parameter associated with an interface on any devices for which traffic is being shifted. Finally, in the post-shift phase, checks are performed to ensure traffic is shifting away from the network device.
-
公开(公告)号:US09742638B1
公开(公告)日:2017-08-22
申请号:US13959566
申请日:2013-08-05
Applicant: Amazon Technologies, Inc.
Inventor: Karl Andre McCabe , Eoin Francis Cavanagh , Sonali Roy , Carlos Vara Callau , Tyson James Lamoreaux , Alan Michael Judge , Timothy Richard Kohn
IPC: H04L12/26
CPC classification number: H04L43/04 , G06F11/008 , G06F11/3452 , H04L41/064 , H04L41/0677 , H04L41/069 , H04L41/5009 , H04L41/507 , H04L43/0835
Abstract: Generally described, systems and methods are provided for detecting the impact of network failures. The system collects performance information from a plurality of nodes and links in a network, aggregates the collected performance information across paths in the network, processes the aggregated performance information for detecting failures on the paths, adjusts the set of performance information by removing the performance information for any nodes considered to be associated with performance information that is statistically different from performance information from other nodes at a given location or extrapolates the collected information to other paths, and determines the impact to customers of the network failures detected using the adjusted set of performance information.
-
9.
公开(公告)号:US09130976B1
公开(公告)日:2015-09-08
申请号:US14084287
申请日:2013-11-19
Applicant: Amazon Technologies, Inc.
Inventor: Karl Andre McCabe , Jon Arron McClintock , David James Roy Erdmann
CPC classification number: H04L63/14 , G06F21/44 , G06F21/566 , G06F2221/2101 , H04L63/1441 , H04L69/24 , H04L2463/146
Abstract: Techniques described and suggested herein include systems and methods for identifying potential sources of infections of devices by unauthorized code. In an embodiment, network traffic is logged. A plurality of computing devices that include unauthorized code is identified. The logged traffic is used to identify information sources accessed by the identified affected devices. The identified information sources may be refined. Refinement of the identified information sources may include excluding information sources that have been accessed by uninfected devices. A user interface that allows a user to further refine the identified information sources may be provided.
Abstract translation: 本文描述和建议的技术包括用于通过未经授权的代码识别设备的潜在感染源的系统和方法。 在一个实施例中,记录网络流量。 识别包括未授权代码的多个计算设备。 记录的流量用于识别由识别的受影响设备访问的信息源。 所识别的信息源可以被改进。 识别的信息源的细化可能包括排除未感染设备访问的信息源。 可以提供允许用户进一步细化所识别的信息源的用户界面。
-
-
-
-
-
-
-
-