摘要:
The invention provides methods, apparatus and systems for detecting distributed denial of service (DDoS) attacks within the Internet by sampling packets at a point or points in Internet backbone connections to determine a packet metric parameter. The packet metric parameter which might comprise the volume of packets received is analysed over selected time intervals with respect to specified geographical locations in which the hosts transmitting the packets are located. The expected behaviour can be employed to identify traffic distortions revealing a DDoS attack. In a complementary aspect, the invention provides a method of authenticating packets at routers in order to elevate the QoS of authenticated packets. This method can be used to block or filter packets and can be used in conjunction with the DDoS attack detection system to defend against DDoS attacks within the Internet in a distributed manner.
摘要:
A system and method for monitoring packetized traffic flow in a network and enabling approximation of the rate information of a network flow. The method for monitoring network traffic flow includes receiving, at a network packet flow collector device, packetized traffic flow signals to be monitored; sampling said received packetized traffic flow signals in time to form an approximation of the packet flow rate in time; generating packet flow activity data comprising data representing the sampled traffic flow signals sampled in time; communicating the packet flow activity data to a network packet flow analyzer device and processing the flow activity data to form signals representing an approximate version of the network traffic flow in the network, the analyzer processing the traffic flow signals for reconstructing the rate of the netflow as a function of time. The flow analyzer then generates a compressed version of the network traffic flow signals in the network, the compressed network traffic flow signals comprising relevant approximation of the packet flow rate in time.
摘要:
One aspect of the present invention is a computer-implemented method for attributing applicable condition code(s) to a field claim. One preferred method includes inputting a text comment associated with the field claim, inputting a plurality of condition codes and at least four keyword combinations of at least two non-sequential keywords for each condition code, and for each condition code, attributing the condition code as an applicable condition code if at least one keyword combination for the condition code is included in the text comment. The applicable condition code(s) can be relied upon by individuals to at least identify failure mode(s) associated with field claims.
摘要:
A body controller is provided for an endoscopic surgical instrument having a cylindrical housing and an instrument body concentrically disposed interior of the housing and moveable between first and second positions. The controller is designed to accommodate and be activated by light grasping and, preferably, compressive application of, a finger or thumb of the human operator to a section which preferably includes a flexible dome-like or other similarly shaped portion which is substantially immediately responsive to the application of the hand of the surgeon or other operator to activate a surgical instrument carried within the housing, such as a retractable needle, or the like, to one position. By withdrawing the finger or thumb of the surgeon from the flexible means, the instrument body may be moved to a second, or original, position.
摘要:
A system and method for restricting the number of layout patterns by pattern identification, matching and classification, includes decomposing the pattern windows into a low frequency component and a high frequency component using a wavelet analysis for an integrated circuit layout having a plurality of pattern windows. Using the low frequency component as an approximation, a plurality of moments is computed for each pattern window. The pattern windows are classified using a distance computation for respective moments of the pattern windows by comparing the distance computation to an error value to determine similarities between the pattern windows.
摘要:
A video display system for a vehicle may comprise a housing coupled to a vehicle interior element and a video screen assembly coupled to the housing and moveable between a stowed position and a non-stowed position. The assembly may comprise a display screen and a wireless transmitter configured to transmit a first wireless signal.
摘要:
An endoscopic surgical instrument is manually manipulatable by a surgical operator. In one embodiment, the instrument provides an alignment between a hand-held grip and a housing whereby an acute angle is formed at the point of intersection of the axis of the housing and the axis of the grip. In another embodiment, the instrument provides a hand-held grip which includes a pivot portion through which the thumb of the operator is received and which may be pivoted laterally in relation to the housing. In another embodiment, the instrument provides up to complete axial rotation of the housing relative to an instrument body housed therein to permit ease of orientation of the housing and/or body during surgery.
摘要:
For determining a malicious workload pattern, the following steps are conducted. A training set of workload patterns is collected during a predetermined workload situation. A subset of the training set is being determined as an archetype set, the archetype set being considered to be representative of the predetermined workload situation. A threshold value dependent on the training set and the archetype set, and an evaluation value dependent on a given workload pattern and the archetype set are calculated. The given workload pattern is determined to be malicious if the evaluation value fulfils a given condition with respect to the threshold value.
摘要:
A method for configuring network device adapted to process network traffic comprising a plurality of network flows and to export network flow information. For configuring the network device, a copy of the network traffic that is processed by the network device is created. A simulation of a process of collecting the network flow information using the copy of the network traffic is performed. Based on the results of the simulation, a preferred information collection scheme is determined. The network device is then configured to collect the network flow information to be exported according to the preferred information collection scheme.