摘要:
A number of requests for an alternative network location are identified, where the requests for the alternative network location are generated after failure of one or more previous requests to reach a first, previous network location as a result of a network brownout. It is determined if the number of requests for the alternative network location exceed a threshold value for a period of time, and if so, an alarm is generated.
摘要:
A number of requests for an alternative network location are identified, where the requests for the alternative network location are generated after failure of one or more previous requests to reach a first, previous network location as a result of a network brownout. It is determined if the number of requests for the alternative network location exceed a threshold value for a period of time, and if so, an alarm is generated.
摘要:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving a plurality of requests from a plurality of client devices sent to a public internet protocol address; routing the requests to one or more internal Internet protocol addresses, where the one or more internal Internet protocol addresses correspond to one or more compute nodes, and where the one or more compute nodes process the routed requests; determining a particular compute node is offline, where the particular compute node is assigned one or more internal Internet protocol addresses; in response to the determination that the particular node is offline, reassigning the one or more internal Internet protocol addresses corresponding to the particular compute node to one or more different compute nodes, where requests communicated to the reassigned internal Internet protocol addresses are communicated to the one or more different compute nodes for processing.
摘要:
A method and apparatus for the early detection of machines infected by e-mail based computer viruses advantageously employs a network behavioral analysis rather than a direct technical analysis of attached executable code. Specifically, an SMTP (Simple Mail Transfer Protocol) log associated with a mail gateway system interconnected to a plurality of machines is examined, and based on an analysis of information comprised in a plurality of log entries thereof, it may be determined that one of these machines has a possible infection by an e-mail based computer virus. Illustratively, information extracted from each entry in the SMTP log (i.e., for each incoming e-mail message) of the mail gateway includes (i) the unique identity of the sending machine; (ii) the “hello” name that the sending machine calls itself, (iii) the e-mail “From:” address; and (iv) whether the message contains a potentially virus-like (e.g., executable) attachment.
摘要:
A system and method is provided wherein, in one aspect, a currently-requested item of information is stored in a cache based on whether it has been previously requested and, if so, the time of the previous request. If the item has not been previously requested, it may not be stored in the cache. If the subject item has been previously requested, it may or may not be cached based on a comparison of durations, namely (1) the duration of time between the current request and the previous request for the subject item and (2) for each other item in the cache, the duration of time between the current request and the previous request for the other item. If the duration associated with the subject item is less than the duration of another item in the cache, the subject item may be stored in the cache.
摘要:
A system which regulates communication with a server is described. During operation, the system determines a retransmission rate of data packets during a first set of conversations between a group of users and the server via a peering link. Next, the system compares the retransmission rate and an historical retransmission rate of data packets during a second set of conversations between a second group of users and the server via the peering link. The system then adjusts a target acceptance rate of the server to requests to initiate conversations with additional users via the peering link based on the comparison of the retransmission rate and the historical retransmission rate. Additionally, the system accepts or rejects a request to initiate a conversation between another user and the server via the peering link based on an actual acceptance rate of the server to requests to initiate the conversations and the target acceptance rate.
摘要:
A method and apparatus for enhanced data storage in peer-to-peer (P2P) networks. Users subscribe to a P2P storage network that allows each user to store files on the storage network by swapping blocks of the user's files with blocks from storage of a peer, or peers, on the network. A user desiring to utilize the storage network for a certain data block must take back an equal, or substantially equal, storage block from another peer on the network thereby insuring no net change, or minimal net change, in total storage across the P2P storage network. In addition, the diffusion of data blocks throughout the storage network is employed whereby individual peers swap data blocks on a random basis thereby further enhancing the security of the swapped blocks from direct attacks.
摘要:
A system and method is provided wherein, in one aspect, a currently-requested item of information is stored in a cache based on whether it has been previously requested and, if so, the time of the previous request. If the item has not been previously requested, it may not be stored in the cache. If the subject item has been previously requested, it may or may not be cached based on a comparison of durations, namely (1) the duration of time between the current request and the previous request for the subject item and (2) for each other item in the cache, the duration of time between the current request and the previous request for the other item. If the duration associated with the subject item is less than the duration of another item in the cache, the subject item may be stored in the cache.
摘要:
A system and method is provided wherein, in one aspect, a currently-requested item of information is stored in a cache based on whether it has been previously requested and, if so, the time of the previous request. If the item has not been previously requested, it may not be stored in the cache. If the subject item has been previously requested, it may or may not be cached based on a comparison of durations, namely (1) the duration of time between the current request and the previous request for the subject item and (2) for each other item in the cache, the duration of time between the current request and the previous request for the other item. If the duration associated with the subject item is less than the duration of another item in the cache, the subject item may be stored in the cache.
摘要:
A system and method is provided wherein, in one aspect, a currently-requested item of information is stored in a cache based on whether it has been previously requested and, if so, the time of the previous request. If the item has not been previously requested, it may not be stored in the cache. If the subject item has been previously requested, it may or may not be cached based on a comparison of durations, namely (1) the duration of time between the current request and the previous request for the subject item and (2) for each other item in the cache, the duration of time between the current request and the previous request for the other item. If the duration associated with the subject item is less than the duration of another item in the cache, the subject item may be stored in the cache.