摘要:
A method for controlling a denial of service attack involves receiving a plurality of packets from a network, identifying an attacking host based on a severity level of the denial of service attack from the network, wherein the attacking host is identified by an identifying attack characteristic associated with one of the plurality of packets associated with the attacking host, analyzing each of the plurality of packets by a classifier to determine to which of a plurality of temporary data structures each of the plurality of packet is forwarded, forwarding each of the plurality of packets associated with the identifying attack characteristic to one of the plurality of temporary data structures matching the severity level of the denial of service attack as determined by the classifier, requesting a number of packets from the one of the plurality of temporary data structures matching the severity level by the virtual serialization queue, and forwarding the number of packets to the virtual serialization queue.
摘要:
A method for controlling a denial of service attack involves receiving a plurality of packets from a network, identifying an attacking host based on a severity level of the denial of service attack from the network, wherein the attacking host is identified by an identifying attack characteristic associated with one of the plurality of packets associated with the attacking host, analyzing each of the plurality of packets by a classifier to determine to which of a plurality of temporary data structures each of the plurality of packet is forwarded, forwarding each of the plurality of packets associated with the identifying attack characteristic to one of the plurality of temporary data structures matching the severity level of the denial of service attack as determined by the classifier, requesting a number of packets from the one of the plurality of temporary data structures matching the severity level by the virtual serialization queue, and forwarding the number of packets to the virtual serialization queue.
摘要:
A method for controlling a denial of service attack involves receiving a plurality of packets from a network, identifying an attacking host based on a severity level of the denial of service attack from the network, wherein the attacking host is identified by an identifying attack characteristic associated with one of the plurality of packets associated with the attacking host, analyzing each of the plurality of packets by a classifier to determine to which of a plurality of temporary data structures each of the plurality of packet is forwarded, forwarding each of the plurality of packets associated with the identifying attack characteristic to one of the plurality of temporary data structures matching the severity level of the denial of service attack as determined by the classifier, requesting a number of packets from the one of the plurality of temporary data structures matching the severity level by the virtual serialization queue, and forwarding the number of packets to the virtual serialization queue.
摘要:
Incoming network data is processed according to a current hardware classification “engine” configuration. As data is propagated from a network interface to a host system, an activity of one or more components of the host system is monitored. If it is determined that a desired/optimal resource utilization of the host system and/or a desired/optimal network performance is not being achieved, the hardware classification “engine” configuration is dynamically modified.
摘要:
A method for controlling consumption of resources by a packet destination involves receiving a plurality of packets from a network, identifying the packet destination consuming greater than a pre-determined amount of resources to process the plurality of packets, analyzing each of the plurality of packets by a classifier to determine to which of a plurality of temporary data structures each of the plurality of packet is forwarded, forwarding each of the plurality of packets to one of the plurality of temporary data structures as determined by the classifier, requesting a number of packets from the one of the plurality of temporary data structures associated with the packet destination by the virtual serialization queue, wherein the number of packets is limited by an attack control parameter associated with the virtual serialization queue, and forwarding the number of packets to the virtual serialization queue.
摘要:
A method for processing a chain of packets involving obtaining the chain of packets from a network, obtaining destination information from a first packet in the chain of packets, determining whether destination information of the first packet matches destination information of a second packet in the chain of packets, aggregating the first packet and the second packet to obtain an aggregated chain of packets, if destination information of the second packet matches the destination information of the first packet, hashing destination information to obtain a hash value, and forwarding the aggregated chain of packets to at least one client using the hash value.
摘要:
A method for obtaining a capability of a network interface card (NIC). The method includes sending a first data link provider interface (DLPI) request to the NIC and sending a DLPI acknowledgement to an operating system, where the DLPI acknowledgement includes the capability of the NIC. The method further includes enabling the capability on the operating system and establishing a direct communication channel between the NIC and the operating system using the capability.
摘要:
Provided is a fluoroboron compound which is highly safe and stable and is capable of forming a cyclic ether-fused ring by the intramolecular alkoxymethylation reaction, or a salt thereof. The compound can be synthesized by the intramolecular alkoxymethylation reaction of a fluoroboron compound represented by the formula (I) or a salt thereof in the presence of a metal catalyst. (wherein the moiety represented by the formula represents an aromatic ring; L represents a substituent such as a halogen atom; R represents a substituted or unsubstituted alkylene group having 1 or 2 carbon atoms; and M represents an alkali metal cation or the like, with the proviso that L and —R—OCH2BF3M are respectively located on contiguous carbon atoms on the aromatic ring, or in the case of a fused aromatic ring, on two carbon atoms adjacent to one carbon at the fused position).
摘要:
While executing a game program, a game console determines that a user wishes to issue a voice command through a headset or other audio input/output device connected to the console. The game console switches the communication channel for the audio input/output device from the game program to a voice recognition engine without interrupting the execution of the game program on the console. The voice command is then forwarded from the audio input/output device to the voice recognition engine.
摘要:
Various approaches enable automatic communication generation based on patterned behavior in a particular context. For example, a computing device can monitor behavior of a user to determine patterns of communication behavior in certain situations. In response to detecting multiple occurrences of the certain situation, a computing device can prompt a user to perform an action corresponding to the pattern of behavior. In some embodiments, a set of speech models corresponding to a type of contact is generated. The speech models include language consistent with patterns of speech between a user and the type of contact. Based on context and on the contact, a message using language consistent with past communications between the user and contact is generated from a speech model associated with the type of contact.