Abstract:
Disclosed herein are an apparatus and method for analyzing malicious code in a multi-core environment. The apparatus for analyzing malicious code includes a core setting unit for setting at least one monitoring core, on which malicious code is to be monitored, among cores of a multi-core Central Processing Unit (CPU), and executing a monitoring program on the monitoring core, a behavioral information collection unit for, when execution cores that are not set as the monitoring core execute analysis target code, collecting pieces of behavioral information using the monitoring program and a hardware debugging device, and a storage unit for storing the behavioral information.
Abstract:
An apparatus for virtual switching includes a queue memory configured to store at least one queue; a data memory configured to store data; a mapper configured to classify the data into flows and store a point of the data in a queue mapped with the flows; a plurality of virtual machines configured to perform a process based on the data; and a virtual switch configured to extract the data from the data memory by referring to the point stored in the queue and transfer the data to the virtual machine, wherein the virtual switch transfers the data corresponding to a single queue to a single virtual machine.
Abstract:
An apparatus for parallel processing according to an example may include a queue memory configured to store one or more queues, a data memory configured to store data, a mapper configured to classify the data into flows and store a pointer of the data in a queue mapped with the flow; a plurality of processors configured to perform a process based on the data; and a distributor configured to extract the data from the data memory by referring to the pointer stored in the queue and transmit the data to the processor, wherein the distributor transmits data corresponding to a single queue to a single processor.
Abstract:
A method and an apparatus for integrated management/control of regionally distributed micro-cloud data centers. A system for managing distributed clouds includes an apparatus for managing distributed clouds and an apparatus for managing a plurality of micro-data centers. The apparatus for managing distributed clouds manages the plurality of micro-data centers, analyzes the service inputted by a user to generate optimal virtual resource information, and transmits it to the micro-data center. The micro-data center is allocated with optimal resource according to the inputted service analysis information and resource request information.
Abstract:
Provided are a method, apparatus, and system for providing a multi-tenant cloud service, which can guarantee quality of service (QOS) in units of flows and virtual machines (VMs). A dynamic virtual flow switch includes a switch flow agent configured to receive and store virtual machine QOS information about each of a plurality of virtual machines operating in a plurality of computer servers and flow QOS information about a flow generated by the virtual machine from a virtual flow controller and a flow processing unit configured to receive the flow generated by the virtual machine and determine a QOS priority of the flow based on the stored virtual machine QOS information of the virtual machine and flow QOS information of the flow.
Abstract:
A network intrusion detection apparatus and method that perform Perl Compatible Regular Expressions (PCRE)-based pattern matching on the payloads of packets using a network processor equipped with a Deterministic Finite Automata (DFA) engine. The network intrusion detection apparatus includes a network processor core for receiving packets from a network, and transmitting payloads of the received packets to a Deterministic Finite Automata (DFA) engine. A detection rule converter converts a PCRE-based detection rule, preset to detect an attack packet, into a detection rule including a pattern to which only PCRE grammar corresponding to the DFA engine is applied. The DFA engine performs PCRE pattern matching on the payloads of the packets based on the detection rule converted by the detection rule converter.