摘要:
Mechanisms (such methods, systems, and non-transitory computer readable media) for training a machine learning server instance are provided. In some embodiments, the mechanisms comprise: receiving a natural language (NL) query; selecting a plurality of known queries with corresponding known database query portions; using a natural language processing system instance to select a plurality of most-similar queries from the plurality of known queries to the NL query; and training a machine learning server instance using the plurality of most-similar queries and the corresponding known database query portions.
摘要:
Scheduling traffic of a communication session between an application on WiFi and another device, by: receiving traffic of a first session; determining that the traffic belongs to a first classification; determining that a time allocated to the first classification times a second classification airtime is less than or equal to a time allocated to the second classification times a first classification airtime; selecting a counter associated with the first session as being the largest of multiple counters each associated with a different communication session of multiple communication sessions (which include the first session); determining that the traffic of the first session is to be scheduled for transmission to the application over WiFi in response to the counter being determined to be the largest of the plurality of counters; and based on the traffic being determined to be scheduled, increasing the airtime associated with the first classification and decreases the counter.
摘要:
Scheduling traffic of a communication session between an application on WiFi and another device, by: receiving traffic of a first session; determining that the traffic belongs to a first classification; determining that a time allocated to the first classification times a second classification airtime is less than or equal to a time allocated to the second classification times a first classification airtime; selecting a counter associated with the first session as being the largest of multiple counters each associated with a different communication session of multiple communication sessions (which include the first session); determining that the traffic of the first session is to be scheduled for transmission to the application over WiFi in response to the counter being determined to be the largest of the plurality of counters; and based on the traffic being determined to be scheduled, increasing the airtime associated with the first classification and decreases the counter.
摘要:
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems are provided. These systems and methods provide an alert correlator and an alert distributor that enable early signs of an attack to be detected and rapidly disseminated to collaborating systems. The alert correlator utilizes data structures to correlate alert detections and provide a mechanism through which threat information can be revealed to other collaborating systems. The alert distributor uses an efficient technique to group collaborating systems and then pass data between certain members of those groups according to a schedule. In this way data can be routinely distributed without generating excess traffic loads.
摘要:
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems are provided. These systems and methods provide an alert correlator and an alert distributor that enable early signs of an attack to be detected and rapidly disseminated to collaborating systems. The alert correlator utilizes data structures to correlate alert detections and provide a mechanism through which threat information can be revealed to other collaborating systems. The alert distributor uses an efficient technique to group collaborating systems and then pass data between certain members of those groups according to a schedule. In this way data can be routinely distributed without generating excess traffic loads.
摘要:
A method of regulating queuing delay in a network routing device independent of TCP loading is provided including receiving data packets, monitoring the data packets using token buckets and a Proportional and Integral (P+I) Active Queue Management (AQM) scheme, marking selected data packets falling within a profile, and adjusting flow preference of the monitored packets.
摘要:
Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems are provided. These systems and methods provide an alert correlator and an alert distributor that enable early signs of an attack to be detected and rapidly disseminated to collaborating systems. The alert correlator utilizes data structures to correlate alert detections and provide a mechanism through which threat information can be revealed to other collaborating systems. The alert distributor uses an efficient technique to group collaborating systems and then pass data between certain members of those groups according to a schedule. In this way data can be routinely distributed without generating excess traffic loads.
摘要:
Methods, media and systems for responding to a Denial of Service (DoS) attack are provided. In some embodiments, a method includes detecting a DoS attack, migrating one or more processes that provide a service to an unaffected system; authenticating users that are authorized to use the service; and routing traffic generated by authenticated users to the unaffected system.
摘要:
Methods, systems, and media for forming linear combinations of data are provided. In some embodiments, methods for forming a linear combination of data include: receiving at a device a first codeword, wherein the first codeword comprises a linear combination of at least a first data unit including data, and a second data unit including data; encoding at the device the first codeword and a third data unit including data to form a second codeword, wherein the second codeword includes a linear combination of at least the first data unit, the second data unit, and the third data unit; and transmitting from the device the second codeword.
摘要:
Methods, media and systems for responding to a Denial of Service (DoS) attack are provided. In some embodiments, a method includes detecting a DoS attack, migrating one or more processes that provide a service to an unaffected system; authenticating users that are authorized to use the service; and routing traffic generated by authenticated users to the unaffected system.