摘要:
An unauthorized access prevention system that includes a search unit searching the flowing-in path of the unauthorized access to the services by a Web system disclosed by a user's ISP, a determination unit determining the place to implement a countermeasure for protecting the services from the unauthorized access based on the result of the search, and a notification unit notifying, according to a determination that that the countermeasure is implemented in the flow source that makes the unauthorized access flow into the user's communication network, the determination to the flow source.
摘要:
An unauthorized access prevention system includes a countermeasure method determination unit determining a method of taking countermeasures to protect a destination against unauthorized access based on a rate indicating a probability that predetermined traffic is unauthorized access. The rate is determined by calculating a number of times that the countermeasures were taken and subtracting a number of times that countermeasures were suspended, and dividing the resultant number of times that countermeasures were taken without suspension by the number of times that countermeasures were taken, for the predetermined traffic. The system also includes a storage device storing the number of times that countermeasures were taken and the number of times that countermeasures were taken without suspension. A countermeasure execution control unit controls when to take the countermeasures in the determined method. The countermeasure method determination unit selects an appropriate method of taking countermeasures by comparing the rate to predetermined threshold values.
摘要:
Upon receipt of an end point list, a model setting unit requests the measurement/information collection unit to search a path. The model setting unit receives a path appliance list from the measurement/information collection unit, and generates the configuration of a simulation model of a network. The model setting unit selects an appropriate model for each component of the configuration of the simulation model. Then, the model setting unit sets the parameter value of the model based on the measurement result and the collected information received from the measurement/information collection unit, and automatically generates the simulation model of the network.
摘要:
This invention is to minimize influence to other network by preventing unauthorized accesses such as DDoS attacks and probing by worms. When the blocking apparatuses 10a and 10b detect outbound packets by the DDoS attacks or by the probing by the worm, they carry out the Egress filtering for such outbound packets to prevent the packets relating to the unauthorized access from being sent to the backbone network 1000. Moreover, because a notice to the effect that the unauthorized access is detected is sent to other blocking apparatuses 10c and 10d via the management apparatus 16, for example, the blocking apparatuses 10c and 10d precautionarily carry out the Ingress filtering to prevent the packets relating to the unauthorized access from being sent to the network C and D.
摘要:
An apparatus and method for verifying route and bandwidth settings of multiple services provided over networks. The apparatus has an extractor and a verifier. Based on input data describing services each having primary and secondary routes between specific locations, an available bandwidth of each network, and a guaranteed bandwidth of each service, the extractor selects a first network to be verified and extracts first services that use the first network as their respective primary routes. The extractor then selects at least one second network from among the networks that the first services specify as their respective secondary routes. The extractor extracts second services that use the second network as their primary routes and specify the first network as their secondary routes. The verifier sums up guaranteed bandwidths that the first and second services should provide, and determines whether the sum is smaller than an available bandwidth of the first network.
摘要:
An apparatus and method for verifying route and bandwidth settings of multiple services provided over networks. The apparatus has an extractor and a verifier. Based on input data describing services each having primary and secondary routes between specific locations, an available bandwidth of each network, and a guaranteed bandwidth of each service, the extractor selects a first network to be verified and extracts first services that use the first network as their respective primary routes. The extractor then selects at least one second network from among the networks that the first services specify as their respective secondary routes. The extractor extracts second services that use the second network as their primary routes and specify the first network as their secondary routes. The verifier sums up guaranteed bandwidths that the first and second services should provide, and determines whether the sum is smaller than an available bandwidth of the first network.
摘要:
A service distribution device and method for balancing load distribution among servers without placing the servers in a high load or overloaded state. Models of the servers and services are generated from the record of monitored packets. Simulations are performed to predict the server load, and based on the results of the predictions, settings are determined to distribute the services among the servers so that load is balanced.
摘要:
This invention is to minimize influence to other network by preventing unauthorized accesses such as DDoS attacks and probing by worms. When the blocking apparatuses 10a and 10b detect outbound packets by the DDoS attacks or by the probing by the worm, they carry out the Egress filtering for such outbound packets to prevent the packets relating to the unauthorized access from being sent to the backbone network 1000. Moreover, because a notice to the effect that the unauthorized access is detected is sent to other blocking apparatuses 10c and 10d via the management apparatus 16, for example, the blocking apparatuses 10c and 10d precautionarily carry out the Ingress filtering to prevent the packets relating to the unauthorized access from being sent to the network C and D.
摘要:
A managed server (srv-10) is powered on by a power controlling unit. The managed server executes a POST process, and transfers a PXE request to a boot controlling unit. The boot controlling unit transfers an HBA vendor determining program. In the managed server, the WWN is set by an HBA vendor-dedicated program corresponding to an HBA vendor, and when a PCI initialization code can not be loaded, the POST process is re-started, and the PXE request is transferred again. The boot controlling unit transfers an NOP program, and the managed server starts an OS with a SAN boot.
摘要:
A managed server (srv-10) is powered on by a power controlling unit. The managed server executes a POST process, and transfers a PXE request to a boot controlling unit. The boot controlling unit transfers an HBA vendor determining program. In the managed server, the WWN is set by an HBA vendor-dedicated program corresponding to an HBA vendor, and when a PCI initialization code can not be loaded, the POST process is re-started, and the PXE request is transferred again. The boot controlling unit transfers an NOP program, and the managed server starts an OS with a SAN boot.