摘要:
An isolation approach for network users associated with elevated risk is disclosed for protecting networks. In one approach a method comprises the computer-implemented steps of determining a user identifier associated with a network device that has caused a security event in a network; causing the network device to receive a network address that is selected from a subset of addresses within a specified pool associated with suspected malicious network users; and configuring one or more security restrictions with respect to the selected network address.
摘要:
An isolation approach for network users associated with elevated risk is disclosed for protecting networks. In one approach a method comprises the computer-implemented steps of determining a user identifier associated with a network device that has caused a security event in a network; causing the network device to receive a network address that is selected from a subset of addresses within a specified pool associated with suspected malicious network users; and configuring one or more security restrictions with respect to the selected network address.
摘要:
The real time availability of a group of network elements is determined based upon both a real time availability value for each of the network elements and cooperation relationships between the network elements. The cooperation relationships reflect both the topological relationships between the network elements, i.e., how the network elements are connected, and the extent to which network elements interact with each other effectively. For relatively small groups of network elements, where the cooperation relationships are not overly complex, the real time availability is determined directly from the real time availability value for each of the network elements and cooperation relationships between the network elements. Decomposition and recombination are used to determine the real time availability of large groups of network elements based on specific formulas for basic network element topology models.
摘要:
Techniques for system (syslog) messages are provided. As syslog messages are generated a dual sequence number is maintained for each syslog message. The first sequence number is consistent for each syslog message and represents a total number of syslog messages received. The second sequence number is maintained as a total message count for a specific session for which a syslog message is assigned.
摘要:
Resource availability profiles are received, wherein each resource availability profile describes a resource associated with a server. Each resource is assigned a plurality of weights corresponding to a plurality of policies. The weights are determined by, for each of the plurality of the policies, determining a weight for each resource based a given policy and selected information in the resource availability profiles corresponding to the resources. The method further comprises determining a policy from the plurality of the policies corresponding to a given a context associated with a connection request. A first of the load-balanced servers is selected for the connection request based on the weights assigned to the plurality of resources for the policy for the given context.
摘要:
Event processing in rate limited network devices is described. An event receiver is notified of a backlog condition and may respond by increasing the rate limit for the network device. If an event queue on the network device overflows, event messages may be diverted to an event message overflow store or to a network location. Later, the messages may be retrieved after the overflow condition has cleared. As a result, critical messages or events such as Syslog messages are not lost when a rate limited network device cannot deliver the messages to a network management station.
摘要:
A method is disclosed for a method for measuring the availability of a network element or service. For each network element N, a current real availability value CRAVN and a current time value CTVN are associated with network element N. Additionally, for each network element N, an operational state value OSVN is associated with network element N. At a later time, indicated by a new time value NTVN, a new real availability value NRAVN for network element N is determined based on the current availability value CRAVN, the current time value CTVN, the new time value NTVN, and the operational state value OSVN. The new real availability value NRAVN is stored. Thus, each separate network element N may be associated with a separate real availability value that accurately reflects the availability of network element N specifically, regardless of any availability approximated for network element N's type.
摘要:
A method is disclosed for adaptively coupling processing components in a distributed system. In one aspect, a second component requests an interaction with a first component by sending a service access request to access a first service of the first component. The service access request specifies parameters relating to a proposed level of coupling between the first component and the second component. The second component receives a service response from the first component; the service response specifies counter-proposed parameters relating to a proposed level of coupling between the first component and the second component. The second component determines whether the service response indicates that the first service may be provided. If so, then an agreed-upon level of coupling is established between the first component and second component, and the components interact to receive the service. The level of coupling among the components may be re-negotiated at any time by exchanging values in a coupling context. As a result, a component can selectively and with fine granularity allow other components to access its data or services.
摘要:
Approaches are described for capturing illegal and undesired behavior for network components and for interactions between components. One approach comprise specifying one or more states and state transitions for one or more components or interactions between components, wherein at least one composite state transition is specified, and generating a notification corresponding to a specified state or state transition when the state or state transition occurs. These approaches provide a holistic view of the entire state space of a network or component or component interactions, and allow undesired or illegal states to be captured in a timely manner.
摘要:
A method and system to profile applications are provided. The system may include a capture module to capture resources consumption data for an application and a requirements generator to generate resources requirement data for the application. The resources requirement data may be generated by the requirements generator utilizing the resource consumption data. The system may further include a profile generator to generate a profile for the application. The profile may comprise the resources consumption data and the resources requirement data.