Method and apparatus for identifying phishing websites in network traffic using generated regular expressions
    51.
    发明申请
    Method and apparatus for identifying phishing websites in network traffic using generated regular expressions 有权
    用于使用生成的正则表达式来识别网络流量中的网络钓鱼网站的方法和装置

    公开(公告)号:US20090300768A1

    公开(公告)日:2009-12-03

    申请号:US12156341

    申请日:2008-05-30

    IPC分类号: G06F21/00

    摘要: According to an aspect of this invention, a method to detect phishing URLs involves: creating a whitelist of URLs using a first regular expression; creating a blacklist of URLs using a second regular expression; comparing a URL to the whitelist; and if the URL is not on the whitelist, comparing the URL to the blacklist. False negatives and positives may be avoided by classifying Internet domain names for the target organization as “legitimate”. This classification leaves a filtered set of URLs with unknown domain names which may be more closely examined to detect a potential phishing URL. Valid domain names may be classified without end-user participation.

    摘要翻译: 根据本发明的一个方面,一种检测网络钓鱼URL的方法包括:使用第一正则表达式创建URL的白名单; 使用第二个正则表达式创建URL黑名单; 将网址与白名单进行比较; 如果该网址不在白名单中,请将该URL与黑名单进行比较。 通过将目标组织的互联网域名分类为“合法”,可以避免虚假的否定和积极性。 此类别会留下一组经过筛选的未知域名的URL,可以更仔细地检查以检测潜在的网络钓鱼URL。 有效的域名可能没有最终用户的参与分类。

    Method and apparatus for large-scale automated distributed denial of service attack detection
    53.
    发明申请
    Method and apparatus for large-scale automated distributed denial of service attack detection 有权
    用于大规模自动分布式拒绝服务攻击检测的方法和装置

    公开(公告)号:US20070283436A1

    公开(公告)日:2007-12-06

    申请号:US11452623

    申请日:2006-06-14

    IPC分类号: G06F12/14

    CPC分类号: H04L63/1425 H04L63/1458

    摘要: A multi-staged framework for detecting and diagnosing Denial of Service attacks is disclosed in which a low-cost anomaly detection mechanism is first used to collect coarse data, such as may be obtained from Simple Network Management Protocol (SNMP) data flows. Such data is analyzed to detect volume anomalies that could possibly be indicative of a DDoS attack. If such an anomaly is suspected, incident reports are then generated and used to trigger the collection and analysis of fine grained data, such as that available in Netflow data flows. Both types of collection and analysis are illustratively conducted at edge routers within the service provider network that interface customers and customer networks to the service provider. Once records of the more detailed information have been retrieved, they are examined to determine whether the anomaly represents a distributed denial of service attack, at which point an alarm is generated.

    摘要翻译: 公开了一种用于检测和诊断拒绝服务攻击的多阶段框架,其中首先使用低成本异常检测机制来收集粗略数据,例如可以从简单网络管理协议(SNMP)数据流中获得。 分析这些数据以检测可能表示DDoS攻击的体积异常。 如果怀疑出现这种异常,则会生成事件报告,并用于触发对Netflow数据流中可用的细粒度数据的收集和分析。 这两种类型的收集和分析在服务提供商网络中的边缘路由器上进行说明性地进行,其将客户和客户网络接入服务提供商。 一旦检索到更详细信息的记录,就检查它们以确定异常是否表示分布式拒绝服务攻击,此时产生警报。

    Anycast aware transport for content distribution networks
    55.
    发明授权
    Anycast aware transport for content distribution networks 有权
    内容分发网络的任播感知传输

    公开(公告)号:US09450804B2

    公开(公告)日:2016-09-20

    申请号:US12553769

    申请日:2009-09-03

    摘要: A system for providing content includes a plurality of content delivery servers and a routing control module. Each of the content delivery servers is configured to receive a first request from a client system sent to an anycast IP address for the content, and to provide a first portion of the content to the client system. Each of the content delivery servers is further configured to receive a second request from the client system sent to the anycast IP address for a second portion of the content, and to provide the second portion of the content to the client system. The routing control module is configured to modify the routing of the anycast address from a first content delivery server to a second content delivery server.

    摘要翻译: 用于提供内容的系统包括多个内容传递服务器和路由控制模块。 每个内容递送服务器被配置为从发送到内容的任播IP地址的客户端系统接收第一请求,并且向客户端系统提供内容的第一部分。 每个内容递送服务器还被配置为从第二部分的内容接收从发送到任播IP地址的客户端系统的第二部分的内容的第二请求,并将内容的第二部分提供给客户端系统。 路由控制模块被配置为修改任播地址从第一内容递送服务器到第二内容递送服务器的路由。

    Floodlight radar system for detecting and locating moving targets in three dimensions
    57.
    发明授权
    Floodlight radar system for detecting and locating moving targets in three dimensions 有权
    用于三维检测和定位移动目标的泛光雷达系统

    公开(公告)号:US09250319B2

    公开(公告)日:2016-02-02

    申请号:US13819354

    申请日:2011-07-19

    摘要: A floodlight radar system includes a transmitter arranged to generate output waveforms at first and second centre frequencies, and at least one transmit antenna configured to illuminate a search volume constantly at the first and second centre frequencies. A sparse array of receive antennas is arranged in a common plane and configured to monitor the search volume constantly. The system includes a receive circuit arranged to extract target position information from return signals received by each antenna, and a signal processor circuit which is arranged to resolve ambiguity in the position information using a known relationship between calculated Doppler spectra, wavelengths and phase differences at the first and second frequencies, to calculate azimuth, elevation, range and velocity of a target identified in the search volume. The system is able to rapidly detect and locate multiple fast moving targets in three dimensions.

    摘要翻译: 泛光雷达系统包括发射机,其布置成在第一和第二中心频率处产生输出波形,以及至少一个发射天线,被配置为在第一和第二中心频率上恒定地照射搜索量。 接收天线的稀疏阵列被布置在公共平面中并且被配置成不断地监视搜索量。 该系统包括接收电路,其被布置为从每个天线接收的返回信号中提取目标位置信息;以及信号处理器电路,其被布置成使用所计算的多普勒频谱,波长和相位差之间的已知关系来解析位置信息中的歧义 第一和第二频率,以计算在搜索量中识别的目标的方位角,高程,范围和速度。 该系统能够在三维方面快速检测和定位多个快速移动目标。

    Cloud infrastructure services
    58.
    发明授权
    Cloud infrastructure services 有权
    云基础设施服务

    公开(公告)号:US09106584B2

    公开(公告)日:2015-08-11

    申请号:US13245720

    申请日:2011-09-26

    摘要: An aspect of the disclosed technology is a general-purpose platform that may be used to provide resilient cloud services. Tasks may be written as procedures in general-purpose programming languages that directly manipulate resources via control interfaces. In one implementation, resource states, such as router configurations and virtual machine states, associated with a cloud customer that provides communications services, may be abstracted into tables in a relational or semi-structured database. State changes that have been written to the database tables are automatically propagated by the database to appropriate customer physical devices, such as network elements, thereby implementing various customer network operations.

    摘要翻译: 所公开技术的一个方面是可用于提供弹性云服务的通用平台。 任务可以写成通用控制界面直接操纵资源的通用编程语言中的程序。 在一个实现中,与提供通信服务的云客户相关联的资源状态(例如路由器配置和虚拟机状态)可以被抽象为关系或半结构化数据库中的表。 已写入数据库表的状态更改会自动由数据库传播到适当的客户物理设备(如网络元素),从而实现各种客户网络操作。

    Network aware application management
    59.
    发明授权
    Network aware application management 有权
    网络感知应用程序管理

    公开(公告)号:US08825820B2

    公开(公告)日:2014-09-02

    申请号:US12562826

    申请日:2009-09-18

    摘要: A method of managing a network application includes identifying a network path for the network application, obtaining network performance measurements along the network path, obtaining application performance information for the network application, and extracting infrastructure specific information for the infrastructure supporting the network application. The method further includes correlating the application performance information, network performance measurements, and the infrastructure specific information to identify a performance issue affecting the network application, and modifying the application behavior, the network behavior, or any combination thereof in response to the performance issue.

    摘要翻译: 管理网络应用的方法包括识别网络应用的网络路径,沿网络路径获得网络性能测量,获得网络应用的应用性能信息,以及为支持网络应用的基础设施提取基础架构特定信息。 该方法还包括将应用性能信息,网络性能测量和基础结构特定信息相关联以识别影响网络应用的性能问题,以及响应于性能问题修改应用行为,网络行为或其任何组合。

    Systems, methods, and apparatus to debug a network application by utilizing a cloned network and an interactive debugging technique
    60.
    发明授权
    Systems, methods, and apparatus to debug a network application by utilizing a cloned network and an interactive debugging technique 失效
    通过利用克隆网络和交互式调试技术来调试网络应用的系统,方法和装置

    公开(公告)号:US08352801B2

    公开(公告)日:2013-01-08

    申请号:US13542329

    申请日:2012-07-05

    IPC分类号: G06F11/00 G06F11/14

    摘要: A method includes instantiating a cloned network that includes a second set of virtual service nodes. The second set of virtual service nodes includes at least one cloned virtual service node that is a clone of a corresponding virtual service node in a first set of virtual service nodes. The at least one cloned virtual service node has access to a history of events that occurred at the corresponding virtual service node in the first set of virtual service nodes. The method includes initiating an interactive debugging session that includes step by step processing of the events of the history of events.

    摘要翻译: 一种方法包括实例化包括第二组虚拟服务节点的克隆网络。 第二组虚拟服务节点包括至少一个克隆的虚拟服务节点,其是第一组虚拟服务节点中相应的虚拟服务节点的克隆。 所述至少一个克隆的虚拟服务节点具有访问发生在第一组虚拟服务节点中的相应虚拟服务节点处的事件的历史记录。 该方法包括启动交互式调试会话,其包括对事件历史的事件的逐步处理。