摘要:
A system and method of adaptively reconfiguring a pool of buffers are provided. The buffers are initially configured to a size (i.e., a current size). Each time data is placed in the buffers by an application program, it is determined whether the size of the data is greater than the current size of the buffers. If the size of the data is greater than the current size of the buffers, the buffers are reconfigured to the size of the data if the number of times data of that size is stored in the buffers is greater than a first threshold. If, however, the size of the data is smaller than the current size of the buffers, the buffers may be reconfigured to the size of the data if the number of times data of that size is stored in the buffers is smaller than a second threshold.
摘要:
An intrusion detection mechanism is provided for flexible, automatic, thorough, and consistent security checking and vulnerability resolution in a heterogeneous environment. The mechanism may provide a predefined number of default intrusion analysis approaches, such as signature-based, anomaly-based, scan-based, and danger theory. The intrusion detection mechanism also allows a limitless number of intrusion analysis approaches to be added on the fly. Using an intrusion detection skin, the mechanism allows various weights to be assigned to specific intrusion analysis approaches. The mechanism may adjust these weights dynamically. The score ration can be tailored to determine if an intrusion occurred and adjusted dynamically. Also, multiple security policies for any type of computing element may be enforced.
摘要:
A system, method, and computer program product for adaptively identifying unauthorized intrusions in a networked data processing system. In accordance with the method of the present invention, an intrusion detection module receives system event data that may be utilized for intrusion detection. The received system event data is processed utilizing multiple intrusion detection techniques including at least one behavior-based intrusion detection technique to generate an intrusion detection result. In response to the intrusion detection result indicating an unauthorized intrusion, at least one knowledge-based intrusion detection corpus is updated utilizing the system event data. In a preferred embodiment, the intrusion detection system/method is implemented in a network data processing environment in which the knowledge-based intrusion detection corpus is communicatively accessible by multiple elements coupled to the networked data processing system. The method preferably includes issuing a network update to update knowledge-based intrusion detection corpora associated with the multiple elements included in the network.
摘要:
A system and method of improved handling of large pages in a virtual memory system. A data memory management unit (DMMU) detects sequential access of a first sub-page and a second sub-page out of a set of sub-pages that comprise a same large page. Then, the DMMU receives a request for the first sub-page and in response to such a request, the DMMU instructs a pre-fetch engine to pre-fetch at least the second sub-page if the number of detected sequential accesses equals or exceeds a predetermined value.
摘要:
A system, apparatus and method of adaptively queueing processes for execution scheduling are provided. When a process yields its processor to another process, it is generally placed in a queue before it is re-scheduled for execution. If it is re-scheduled for execution within a longer period of time than needed, the next time it has to be placed in a queue, it will be placed in a queue or at a location in a queue where it will be scheduled for execution in a shorter amount of time. If it is re-scheduled for execution within a period of time that is shorter than needed, the next time it has to be placed in a queue, it will be placed in a queue or at a location in a queue where it will be scheduled for execution within a longer period of time.
摘要:
Method, system and computer program product for managing resources in a data processing system. Knowledge provided by each subsystem of a plurality of subsystems of an operating system regarding behavior of the subsystem is shared by other subsystems of the operating system, and the shared knowledge, together with existing functional characteristics of the subsystems is used by the operating system to more efficiently manage resources in the data processing system.
摘要:
A method and system for tracking a data processing system within a communications network are provided. According to one embodiment, a method is provided comprising receiving identity data from a data processing system via a communications network, where the data processing system comprises a security processing element associated with a secure storage element and the identity data specifies a portion of a security processing element endorsement key stored within the secure storage element. The described method embodiment further comprises identifying the data processing system utilizing the identity data and causing corresponding recovery data to be stored in response to an identification of the data processing system, where the recovery data comprises an associated network connection address.
摘要:
A method and system for controlling interrupt frequency by transferring processor load information to a peripheral adapter provides adaptive interrupt latency to improve performance in a processing system. A device driver obtains current processor load information from an operating system or directly from processor usage counters. The estimated processor load is then used to set a parameter in the adapter that controls the frequency of an interrupt generator, which may be controlled by setting an interrupt queue depth threshold, packet frequency threshold or interrupt hold-off time value. The result is that the relative frequency of interrupts is managed in conformity with the current processor load, provide reduced processing latency when the system is relatively idle, which avoids loading the processor with additional interrupt processing overhead when the processor is busy.
摘要:
A system, method, and program product for implementing logon assignments for users in a heterogeneous network are disclosed. Sets of logon assignments for a user for various platforms are defined and stored in a configuration server. The appropriate set of user logon assignments is selected, by either the configuration server or a client system, based on the user identity of the user and a software platform of the client system on which the user logs onto the heterogeneous network. The appropriate set of logon assignments is sent from the configuration server to the client system. The appropriate set of logon assignments is then implemented at the client system so that the user is able to use preferences and allocated resources specified by the set of logon assignments.
摘要:
A system, method, and program for managing users, groups, servers, and resources in a heterogeneous network environment are disclosed. The network environment includes a configuration server coupled to a number of deployment servers, which each operates under a specific platform. In response to receipt of a generic command for management of a user, group, server, or resource by the configuration server, a determination is made based on pre-assignment as to which one of the deployment servers is the appropriate deployment server that is to receive the generic command. The generic command is mapped to a specific-platform command executable under the respective specific platform of the appropriate deployment server. The specific-platform command is executed by the appropriate deployment server to complete a task for performing the generic command. In a preferred embodiment, a set of generic commands for managing the users, groups, servers, and resources in the heterogeneous networked environment is defined. The set of generic commands is correlated to sets of specific-platform commands for different specific platforms. One of the sets of specific-platform commands is determined for a respective specific platform. The specific-platform command is identified within the set of specific-platform commands that is correlated to the generic command being processed by the deployment server.