-
公开(公告)号:US20250138739A1
公开(公告)日:2025-05-01
申请号:US18495142
申请日:2023-10-26
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Gil Barash , Shlomi Apel
IPC: G06F3/06
Abstract: Example implementations relate to data storage. An example includes inspecting a block level input/output (I/O) request to be executed by a block-based storage device, and in response to a determination that the block level I/O request includes a filesystem operation, generating a copy of the block level I/O request. The example also includes parsing the copy of the block level I/O request to extract a plurality of attributes of the filesystem operation, where the parsing is asynchronous to an execution of the block level I/O request by the block-based storage device. The example also includes storing the extracted plurality of attributes of the filesystem operation in an entry of a filesystem operation database, where each entry of the filesystem operation database is associated with a different filesystem operation in a filesystem stored on the block-based storage device.
-
2.
公开(公告)号:US12242354B2
公开(公告)日:2025-03-04
申请号:US18479477
申请日:2023-10-02
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Tomer Ben-Or , Gil Barash , Chen Burshan , Yair Manor
Abstract: A data center for data backup and replication, including a pool of multiple storage units for storing a journal of I/O write commands issued at respective times, wherein the journal spans a history window of a pre-specified time length, and a journal manager for dynamically allocating more storage units for storing the journal as the journal size increases, and for dynamically releasing storage units as the journal size decreases.
-
公开(公告)号:US20240143761A1
公开(公告)日:2024-05-02
申请号:US18051110
申请日:2022-10-31
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Alex Veprinsky , Gil Barash , Oded Kedem
CPC classification number: G06F21/566 , G06F17/18 , G06F2221/033
Abstract: Example implementations relate to storing data in a storage system. An example includes accessing a first portion of a data stream to be stored in a storage system; selecting sample data blocks included in the first portion; determining entropy values based on the sample data blocks; selecting, based on the sample data blocks, a entropy threshold from multiple precalculated entropy thresholds; determining whether the generated set of entropy values matches the selected entropy threshold within a probability level; and in response to a determination that the generated set of entropy values matches the selected entropy threshold within the probability level, identifying the first portion of the data stream as potentially including encrypted data affected by a ransomware attack.
-
-