-
公开(公告)号:US20230308476A1
公开(公告)日:2023-09-28
申请号:US18314532
申请日:2023-05-09
Applicant: Google LLC
Inventor: Francois Pepin , Andre Lloyd Perlee Harder , Prajakta Joshi , Amitabha Roy , Saila Talagadadeevi , Emil Kiner , Chia-Tung Kuo , Jiayu Ye
IPC: H04L9/40 , H04L41/142
CPC classification number: H04L63/1458 , H04L41/142 , H04L63/0263 , H04L63/1416
Abstract: A method for mitigating network abuse includes obtaining a first set of network traffic messages of network traffic currently received by a network service and determining, via a first model, whether network abuse is occurring based on the first set of network traffic messages. When the network abuse is occurring, the method includes obtaining a second set of current network traffic messages. The method also includes, for each network traffic message in the second set of network traffic messages, labeling, via a second model, the network traffic message as an abusing network traffic message or a non-abusing network traffic message. The method also includes generating, via a third model, at least one network traffic rule. Each network traffic rule, when implemented, reduces an effect of the abusing network traffic messages.
-
公开(公告)号:US11368385B1
公开(公告)日:2022-06-21
申请号:US17028460
申请日:2020-09-22
Applicant: Google LLC
Inventor: Anna Berenberg , Venkat Subbaiah Naidu Kotla , Neha Pattan , Uday Ramakrishna Naik , Prajakta Joshi , Ines Envid
IPC: H04L12/803 , H04L45/02 , H04L61/5007 , H04L67/1001 , H04L67/02 , H04L67/56
Abstract: Grouping virtualized computing instances in cloud environments can be achieved utilizing groups of network endpoints, such as hardware devices, virtualized computing instances, etc. The network endpoint group (NEG) provides a logical grouping for providers of backend services that may be arranged on the network endpoints, and may be organized based on the backend service to be provided by the computing environments that operate as network endpoints. For example, the NEGs may be implemented for load balancing applications. The network endpoint groups, and the network endpoints included therein, may be managed using a framework of tools, libraries and application programming interfaces.
-
公开(公告)号:US11838199B1
公开(公告)日:2023-12-05
申请号:US17843336
申请日:2022-06-17
Applicant: Google LLC
Inventor: Anna Berenberg , Venkat Subbaiah Naidu Kotla , Neha Pattan , Uday Ramakrishna Naik , Prajakta Joshi , Ines Clara Envid Lazaro
IPC: H04L45/02 , H04L61/5007 , H04L67/1001 , H04L67/56 , H04L67/02
CPC classification number: H04L45/02 , H04L61/5007 , H04L67/1001 , H04L67/02 , H04L67/56
Abstract: Grouping virtualized computing instances in cloud environments can be achieved utilizing groups of network endpoints, such as hardware devices, virtualized computing instances, etc. The network endpoint group (NEG) provides a logical grouping for providers of backend services that may be arranged on the network endpoints, and may be organized based on the backend service to be provided by the computing environments that operate as network endpoints. For example, the NEGs may be implemented for load balancing applications. The network endpoint groups, and the network endpoints included therein, may be managed using a framework of tools, libraries and application programming interfaces.
-
公开(公告)号:US20220066811A1
公开(公告)日:2022-03-03
申请号:US17462477
申请日:2021-08-31
Applicant: Google LLC
Inventor: Zhenyu Zhao , Zachary Fewtrell , Srishti Srivastava , Prajakta Joshi , Nikhil Kothari , Nayer Naguib , Lawrence E. Greenfield , Huseyin Simitci , Gopal Ashok , Cristopher Whitton Shumate
IPC: G06F9/455
Abstract: A system including a data plane including a first virtual machine designated as a primary node and a second virtual machine designated as a secondary node, and a lock service configured to control changes in designation of the primary node and the secondary node. The first virtual machine repeatedly issues requests to the second virtual machine or lock service extending designation as the primary node for a first duration. The request is repeatedly issued within a duration shorter than the first duration. The second virtual machine receives an indication of the designation of the first virtual machine as the primary node being extended, issues a request to the lock service to change the designation of the primary node after passage the first duration of time without further indication of first virtual machine being extended as primary node, and receives confirmation from the lock service of the change in designation.
-
公开(公告)号:US20220191242A1
公开(公告)日:2022-06-16
申请号:US17120050
申请日:2020-12-11
Applicant: Google LLC
Inventor: Francois Pepin , Andre Lloyd Perlee Harder , Prajakta Joshi , Amitabha Roy , Saila Talagadadeevi , Emil Kiner , Chia- Tung Kuo , Jiayu Ye
Abstract: A method for mitigating network abuse includes obtaining a first set of network traffic messages of network traffic currently received by a network service and determining, via a first model, whether network abuse is occurring based on the first set of network traffic messages. When the network abuse is occurring, the method includes obtaining a second set of current network traffic messages. The method also includes, for each network traffic message in the second set of network traffic messages, labeling, via a second model, the network traffic message as an abusing network traffic message or a non-abusing network traffic message. The method also includes generating, via a third model, at least one network traffic rule. Each network traffic rule, when implemented, reduces an effect of the abusing network traffic messages.
-
公开(公告)号:US10812366B1
公开(公告)日:2020-10-20
申请号:US16118775
申请日:2018-08-31
Applicant: Google LLC
Inventor: Anna Berenberg , Venkat Subbaiah Naidu Kotla , Neha Pattan , Uday Ramakrishna Naik , Prajakta Joshi , Ines Envid
IPC: H04W28/08 , H04L12/751 , H04L29/12 , H04L29/08
Abstract: Grouping virtualized computing instances in cloud environments can be achieved utilizing groups of network endpoints, such as hardware devices, virtualized computing instances, etc. The network endpoint group (NEG) provides a logical grouping for providers of backend services that may be arranged on the network endpoints, and may be organized based on the backend service to be provided by the computing environments that operate as network endpoints. For example, the NEGs may be implemented for load balancing applications. The network endpoint groups, and the network endpoints included therein, may be managed using a framework of tools, libraries and application programming interfaces.
-
公开(公告)号:US12093715B2
公开(公告)日:2024-09-17
申请号:US17462477
申请日:2021-08-31
Applicant: Google LLC
Inventor: Zhenyu Zhao , Zachary Fewtrell , Srishti Srivastava , Prajakta Joshi , Nikhil Kothari , Nayer Naguib , Lawrence E. Greenfield , Huseyin Simitci , Gopal Ashok , Cristopher Whitton Shumate
IPC: G06F9/455
CPC classification number: G06F9/45558 , G06F2009/45575 , G06F2009/45583 , G06F2009/45595
Abstract: A system including a data plane including a first virtual machine designated as a primary node and a second virtual machine designated as a secondary node, and a lock service configured to control changes in designation of the primary node and the secondary node. The first virtual machine repeatedly issues requests to the second virtual machine or lock service extending designation as the primary node for a first duration. The request is repeatedly issued within a duration shorter than the first duration. The second virtual machine receives an indication of the designation of the first virtual machine as the primary node being extended, issues a request to the lock service to change the designation of the primary node after passage the first duration of time without further indication of first virtual machine being extended as primary node, and receives confirmation from the lock service of the change in designation.
-
公开(公告)号:US11671446B2
公开(公告)日:2023-06-06
申请号:US17120050
申请日:2020-12-11
Applicant: Google LLC
Inventor: Francois Pepin , Andre Lloyd Perlee Harder , Prajakta Joshi , Amitabha Roy , Saila Talagadadeevi , Emil Kiner , Chia-Tung Kuo , Jiayu Ye
IPC: H04L9/40 , H04L41/142
CPC classification number: H04L63/1458 , H04L41/142 , H04L63/0263 , H04L63/1416
Abstract: A method for mitigating network abuse includes obtaining a first set of network traffic messages of network traffic currently received by a network service and determining, via a first model, whether network abuse is occurring based on the first set of network traffic messages. When the network abuse is occurring, the method includes obtaining a second set of current network traffic messages. The method also includes, for each network traffic message in the second set of network traffic messages, labeling, via a second model, the network traffic message as an abusing network traffic message or a non-abusing network traffic message. The method also includes generating, via a third model, at least one network traffic rule. Each network traffic rule, when implemented, reduces an effect of the abusing network traffic messages.
-
-
-
-
-
-
-