摘要:
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
摘要:
A computer system and computer program product for optimizing an aspect of an Information Technology (IT) structure of an IT system. The aspect of the IT structure is optimized with respect to at least one control parameter. The IT structure includes a plurality of elements. Each element independently is a hardware element, a software element, or a combination of a hardware element and a software element. Each control parameter has a value that is specific to each element of the IT structure.
摘要:
A method and system for searching and retrieving reusable assets is disclosed. An index file in a database stores reusable assets. A search request history in the database stores past search requests and corresponding past search results. A search program performs a search upon receiving a new search request within the index file and generates a new search result. The search program correlates past search requests to the new search request by comparing search terms in past search requests to search terms in the new search request. Search terms in past search requests are replaced with semantically similar terms based on taxonomy level and synonyms and results of highly correlated past search requests are added to the new search result. Reusability of each reusable asset in the new search result is appraised.
摘要:
A method and system for preventing a detection of web crawling. A randomizing HTTP proxy server receives a first request from a web crawler to scan a website and forwards the first request to a randomly selected first proxy computer. The first proxy computer utilizes a first network address translation (NAT)-enabled router to forward the first request to the website. A NAT algorithm associates a first source Internet Protocol (IP) address with the first request. The randomizing HTTP proxy server receives a second web crawler-initiated request to scan the website and forwards the second request to a randomly selected second proxy computer. The second proxy computer utilizes a second NAT-enabled router to forward the second request to the website. The NAT algorithm associates a second source IP address with the second request. The web server identifies the first and second source IP addresses as being different.
摘要:
The present invention is directed to a method, system, and computer program product for providing local load balancing for high-availability servers. In particular, the present invention is based on the use of an HACMP cluster of servers (for high availability) each running an instance of a TCP splitter (for load balancing). A cluster of servers is provided, wherein a Transport Control Protocol (TCP) splitter runs on each of the servers. Each TCP splitter is configured to split an incoming data stream to a respective server among a plurality of the servers for processing. Each server in the cluster has a different routable Internet Protocol (IP) address. Upon a failure of a server, the IP address of the failed server is reassigned to another server in the cluster.
摘要:
A method and system for predicting a user activity level associated with an application. An activity level is a number of transactions performed by users utilizing the application per time period or a number of users utilizing the application per time period. Measurements of activity levels are assigned to a user activity metric (UAM) variable, and associated values are assigned to a set of factors. At least one correlation coefficient between each factor and the UAM is calculated. In response to a maximum correlation coefficient associated with a factor being less than a pre-defined threshold, the factor is excluded from the set of factors to facilitate forming a subset of factors associated with correlation coefficients whose absolute values are greater than or equal to the pre-defined threshold. A regression model utilizing the subset is generated to predict an activity level.
摘要:
A method and system for porting an abstract Information Technology (IT) structure into an IT delivery environment. An abstract IT structure A that is currently within an IT delivery environment X is translated by generating a virtual IT structure V from the abstract IT structure A through specification of an IT delivery environment Y. Delivery binding the virtual IT structure V to the IT delivery environment Y generates a delivery-bound virtual IT structure D. The delivery-bound virtual IT structure D is deployed in the IT delivery environment Y, resulting in a real IT structure instance R capable of operating in the IT delivery environment Y.
摘要:
A method and system for porting an abstract Information Technology (IT) structure into an IT delivery environment. An abstract IT structure A that is currently within an IT delivery environment X is translated by generating a virtual IT structure V from the abstract IT structure A through specification of an IT delivery environment Y. Delivery binding the virtual IT structure V to the IT delivery environment Y generates a delivery-bound virtual IT structure D. The delivery-bound virtual IT structure D is deployed in the IT delivery environment Y, resulting in a real IT structure instance R capable of operating in the IT delivery environment Y.
摘要:
A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
摘要:
A method and system for preventing a detection of web crawling. A randomizing HTTP proxy server receives a first request from a web crawler to scan a website and forwards the first request to a randomly selected first proxy computer. The first proxy computer utilizes a first network address translation (NAT)-enabled router to forward the first request to the website. A NAT algorithm associates a first source Internet Protocol (IP) address with the first request. The randomizing HTTP proxy server receives a second web crawler-initiated request to scan the website and forwards the second request to a randomly selected second proxy computer. The second proxy computer utilizes a second NAT-enabled router to forward the second request to the website. The NAT algorithm associates a second source IP address with the second request. The web server identifies the first and second source IP addresses as being different.