摘要:
Containerized software discover and identification can include discovering a plurality of container remnants by electronically scanning portions of computer memory of at least one computer system of one or more of computing nodes, the portions of computer memory being allocated to persistent storage of computer data, and each container remnant containing computer data providing a record of system-generated execution attributes generated in response to execution of one or more containerized applications. One or more inactive container remnants unutilized by a currently running containerized application can be identified among the plurality of container remnants. Each inactive container remnant can be categorized, the categorizing being based on system-generated execution attributes contained in each inactive container remnant. Based on the categorizing, a previously run containerized application can be identified by reference to a database comprising data whose structures map identities of containerized applications to patterns of execution attributes.
摘要:
A method is provided for rate limiting in a network. The method comprises receiving a traffic flow from the network. In a supervised learning phase, and determining if the traffic flow matches a pretrained network flow model. If so, the method comprises designating the traffic flow as a classified traffic flow according to the pretrained network flow model. The method further comprises advancing to a grouping phase, conditioned upon the traffic flow not matching pretrained network flow models. In the unsupervised learning phase, the method comprises designating the traffic flow as a classified traffic flow. In the grouping phase that follows the supervised learning phase and the unsupervised learning phase, the method comprises using side information about the traffic flows to assign related traffic flows into traffic flow groups, identifying a particular traffic flow group from the traffic flow groups as being an offending traffic flow group.
摘要:
One or more processors receive resource type and capability information and activity information of workloads of a domain. A first model is generated and trained to map the resource information to the activity information of domain workloads. The activity information is decomposed into a set of activity core elements (ACEs). The one or more processors generate a second model, wherein the second model is trained to predict a set of resource types and resource capabilities of the respective resource types, based on an input of the first set of ACEs decomposed from the activity information of the workloads of the domain. The one or more processors receive a second set of ACEs that are decomposed from activities associated with an unprecedented workload, and the one or more processors generate a predicted set of resources to perform the second set of ACEs.
摘要:
One or more computer processors responsive to a hypervisor data request, generate an encrypted set of hypervisor data indicating hypervisor hardware details using a plurality of respective asymmetric encryption keys to tag the generated set of encrypted hypervisor data with a timestamp at a time of encryption. The one or more computer processors decrypt the tagged set of encrypted hypervisor data utilizing a software asset manager and the plurality of respective asymmetric encryption keys determined valid based on a threshold time period and the tagged timestamp. The one or more computer processors validate the set of decrypted hypervisor data utilizing corresponding checksums to determine whether the set of encrypted hypervisor data was successfully decrypted. The one or more computer processors sanitize the validated hypervisor data based on a corresponding software license.
摘要:
Identification of unmatched registry entries may be provided, by scanning a file system, discovering software, collecting first attribute values of the discovered software, receiving a plurality of filtering rules including a method and an attribute. The attribute may comprise a software-specific condition. The method may further comprise collecting native registry entries comprising second attribute values indicated by said attributes of at least one of said rule, and comparing said first attribute values of said discovered software with related ones of said second attribute values of said collected native registry entries. Then, the native registry entries may be grouped into two groups. The first group represents matched registry entries and the second group represents unmatched registry entries. The unmatched registry entries may be identified as unequivocal entries for further software discovery. Finally, the filtering rules may be applied against said collected registry entries based on said filtering method.
摘要:
A mechanism is provided for software discovery in an environment with heterogeneous machine groups may be provided. A group comprising computing systems that have similar software program installations is defined. A first scan procedure is performed by scanning each computing system of the group using a first software signature catalogue to identify installed programs. Software signatures of identified installed programs are added to a base installation software catalogue. A second scan procedure is performed by scanning the group of computing systems using the base installation software catalogue to identify installed software programs.
摘要:
A mechanism is provided for software discovery in an environment with heterogeneous machine groups may be provided. A group comprising computing systems that have similar software program installations is defined. A first scan procedure is performed by scanning each computing system of the group using a first software signature catalogue to identify installed programs. Software signatures of identified installed programs are added to a base installation software catalogue. A second scan procedure is performed by scanning the group of computing systems using the base installation software catalogue to identify installed software programs.
摘要:
A computer system for automatically creating a software catalog content that includes a plurality of software components associated with a computing system is provided. The computer system may include creating a population comprising a plurality of potential software signatures associated with the plurality of software components. The computer system may include ranking the population based on a highest ratio value. The computer system may include selecting a set of parent software signatures based on the ranking. The computer system may include creating a new population of potential software signatures based on the selected set of parent software signatures. The computer system may include performing recombination on the new population of potential software signatures. The computer system may include predicting at least one potential software signature from the new population of potential software signatures based on a comparison between the performed recombination and the created new population of potential software signatures.
摘要:
A software asset management method comprising storing URL data for each of a first plurality of software entities, obtaining, by means of a first browser plug-in, first data indicative of a URL from which a browser has obtained content, comparing, for at least one of the first plurality of software entities, the URL data of the respective software entity with the first data, and communicating the first data to a first computer other than a computer hosting the browser subject to a first condition that, for each of the first plurality of software entities, the comparing reveals that the first data does not match the URL data of the respective software entity.
摘要:
Containerized software discover and identification can include discovering a plurality of container remnants by electronically scanning portions of computer memory of at least one computer system of one or more of computing nodes, the portions of computer memory being allocated to persistent storage of computer data, and each container remnant containing computer data providing a record of system-generated execution attributes generated in response to execution of one or more containerized applications. One or more inactive container remnants unutilized by a currently running containerized application can be identified among the plurality of container remnants. Each inactive container remnant can be categorized, the categorizing being based on system-generated execution attributes contained in each inactive container remnant. Based on the categorizing, a previously run containerized application can be identified by reference to a database comprising data whose structures map identities of containerized applications to patterns of execution attributes.