CN110521171B - 用于应用性能监视和管理的流簇解析 - Google Patents

用于应用性能监视和管理的流簇解析 Download PDF

Info

Publication number
CN110521171B
CN110521171B CN201880021765.XA CN201880021765A CN110521171B CN 110521171 B CN110521171 B CN 110521171B CN 201880021765 A CN201880021765 A CN 201880021765A CN 110521171 B CN110521171 B CN 110521171B
Authority
CN
China
Prior art keywords
server
network
determining
cluster
telemetry
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201880021765.XA
Other languages
English (en)
Other versions
CN110521171A (zh
Inventor
阿修讬许·库拉什斯特哈
奥米德·迈达尼
维姆·杰亚古玛
纳温德拉·亚达夫
阿里·帕然德赫格黑比
安迪·斯隆
张凯
克哈瓦尔·迪恩
张世群
雨海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cisco Technology Inc
Original Assignee
Cisco Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cisco Technology Inc filed Critical Cisco Technology Inc
Publication of CN110521171A publication Critical patent/CN110521171A/zh
Application granted granted Critical
Publication of CN110521171B publication Critical patent/CN110521171B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q9/00Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
    • H04Q9/02Automatically-operated arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/04Processing captured monitoring data, e.g. for logfile generation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3495Performance evaluation by tracing or monitoring for systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L13/00Details of the apparatus or circuits covered by groups H04L15/00 or H04L17/00
    • H04L13/02Details not particular to receiver or transmitter
    • H04L13/04Driving mechanisms; Clutches
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • H04L41/064Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis involving time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0681Configuration of triggering conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/02Capturing of monitoring data
    • H04L43/026Capturing of monitoring data using flow identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2209/00Arrangements in telecontrol or telemetry systems
    • H04Q2209/20Arrangements in telecontrol or telemetry systems using a distributed architecture

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Medical Informatics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Environmental & Geological Engineering (AREA)

Abstract

一种应用和网络分析平台可从在网络内操作的服务器和网络设备捕获遥测。所述应用和网络分析平台可针对在所述网络中执行的应用确定应用依赖图(ADM)。使用所述ADM,所述应用和网络分析平台可将流解析成各种粒度的流簇,并且针对所述流簇确定基线度量。所述基线度量可包括用于所述流簇的传输时间、处理时间和/或数据大小。所述应用和网络分析平台可对照所述基线来比较新流簇以针对所述应用评估可用性、负载、延迟和其他性能度量。在一些实施方式中,所述应用和网络分析平台可使不可用性、负载、延迟和其他应用性能问题的修复自动化。

Description

用于应用性能监视和管理的流簇解析
技术领域
本公开的主题通常涉及计算机网络的领域,并且更具体地涉及应用性能监视和管理。
背景技术
应用性能管理或应用性能监视(APM)系统是企业可使用来评估在企业的数据中心中操作的应用的状态(诸如对于应用来说可能出现的可用性、负载、延迟和其他性能问题)的工具。一些常规网络依靠应用的内置监视实用程序,但是并非每一应用都包括这些实用程序。此外,对于具有数百或数千个应用的典型企业网络来说,采取这样的自组织方法以进行应用监视可能是站不住脚的。某些常规APM平台可能需要将代码注入到应用中以将应用与这些平台集成在一起。这是可能需要开发团队与被分派此后管理应用任务的团队之间的仔细协调的非平凡任务。这也会影响应用的性能,因为在应用的执行路径中直接地发生日志记录和其他监视特征。此方法也不适于企业不能修改的第三方应用和/或部署在外部的应用(例如,经由软件即服务(SaaS)或公用云提供商)。一些常规APM系统使用托管应用的服务器上的测量硬件和/或软件,然而其他APM系统可能依靠网络设备上的类似的工具。两种方法可负面地影响托管硬件和/或软件的性能。
此外,这些技术是不完整的,因为它们优于应用性能而忽视网络性能,或者反之亦然。
附图说明
图1图示依照实施例的用于提供应用性能监视(APM)的应用和网络分析平台的示例;
图2图示依照实施例的网络设备的专用集成电路(ASIC)的转发流水线的示例;
图3图示依照实施例的APM引擎的示例;
图4图示依照实施例的网络环境的示例;
图5图示依照实施例的请求和响应序列的示例;
图6图示依照实施例的用于将流解析成流簇以进行应用性能监视和管理的示例方法;以及
图7A和图7B图示依照一些实施例的系统的示例。
具体实施方式
概要
应用和网络分析平台可从在网络内操作的服务器(例如,物理和/或虚拟服务器)(有时也称为主机、端点、计算设备、机器等)和网络设备(例如,交换机、路由器、集线器等)捕获遥测(例如,流数据、服务器数据、进程数据、用户数据、策略数据等)。应用和网络分析平台可针对在网络中执行的一个或多个应用确定应用依赖图(ADM)。使用ADM,应用和网络分析平台可将流解析成不同粒度的流簇(flowlet),并且针对这些流簇确定基线度量。基线度量可包括用于流簇的传输时间、处理时间和/或数据大小(以分组和/或字节数为单位)。应用和网络分析平台可对照基线来比较新流簇以针对一个或多个应用评估可用性、负载、延迟和其他性能度量。在一些实施例中,应用和网络分析平台可使不可用性、负载、延迟和其他应用性能问题的修复自动化或者基本上使不可用性、负载、延迟和其他应用性能问题的修复自动化。
描述
图1图示依照实施例的应用和网络分析平台100的示例。由加利福尼亚州圣何塞的Cisco
Figure GDA0003826572970000021
公司提供的Tetration AnalyticsTM是应用和网络分析平台100的一个示例实施方式。然而,除非另外陈述,否则本领域的技术人员应理解的是,图1(以及通常在本公开中讨论的任何系统)只是应用和网络分析平台的一个可能的实施例,并且其他实施例可包括以类似的或替代次序或者并行布置的附加的、更少的或替代组件。在图1的示例中,应用和网络分析平台100包括数据收集层110、分析引擎120和呈现层140。
数据收集层110可以包括软件传感器112、硬件传感器114和客户/第三方数据源116。软件传感器112可在网络的服务器内运行,所述服务器诸如物理或裸机(bare metal)服务器;管理程序、虚拟机监视器、容器编排器或其他虚拟实体管理器;虚拟机、容器或其他虚拟实体。硬件传感器114可驻留在交换机、路由器或其他网络设备(例如,诸如独立分组监视器这样的分组捕获(pcap)器具、连接到网络设备的监视端口的设备、沿着数据中心的主干线串联连接的设备或类似的设备)的应用专用集成电路(ASIC)上。软件传感器112可从服务器捕获遥测(例如,流数据、服务器数据、进程数据、用户数据、策略数据等),而硬件传感器114可从网络设备捕获网络遥测(例如,流数据),并且将遥测发送到分析引擎120以用于进一步处理。例如,软件传感器112可嗅探通过其主机的物理或虚拟网络接口卡(NIC)发送的分组,或者每个服务器上的单独的进程可将遥测报告给软件传感器112。硬件传感器114可以线路速率从托管硬件传感器的网络设备的所有端口捕获网络遥测。
图2图示用于网络设备的ASIC的单播转发流水线200的示例,所述网络设备可以线路速率在对CPU有最小影响的情况下捕获网络遥测。在一些实施例中,一个或多个网络设备可以并入用于实现转发流水线200的
Figure GDA0003826572970000031
ASE2或ASE3ASIC。例如,某些实施例包括由Cisco/>
Figure GDA0003826572970000032
提供的利用ASE2或ASE3 ASIC或等效ASIC的一个或多个Cisco/>
Figure GDA0003826572970000033
9000系列交换机。ASIC可以具有多个分片(例如,ASE2和ASE3分别具有六个分片和两个分片),其中每个分片表示具有入口转发流水线210和出口转发流水线220两者的交换子系统。入口转发流水线210可包括输入/输出(I/O)组件、入口MAC 212;输入转发控制器214;以及输入数据路径控制器216。出口转发流水线220可包括输出数据路径控制器222、输出转发控制器224和I/O组件、出口MAC 226。这些分片可以连接到广播网络230,所述广播网络230可以提供来自每个分片的点对多点连接和各片之间的全部连接。广播网络230可提供足够的带宽以同时支持所有分片之间的全线路速率转发。当分组进入网络设备时,分组通过入口MAC 212的端口驻留在上面的分片的入口转发流水线210,遍历广播网络230以进入出口分片,然后通过出口分片的出口转发流水线220。输入转发控制器214可从入口MAC 212的端口接收分组,解析分组报头,并且执行一系列查找以确定是否转发分组以及如何将分组转发到其预定目的地。输入转发控制器214还可生成用于输入数据路径控制器216存储和排队分组的指令。在一些实施例中,网络设备可以是直通式交换机,使得网络设备在将分组存储在输入数据路径控制器216的暂停缓冲器块(未示出)中的同时执行输入转发。
如所讨论的,输入转发控制器214可以对传入分组执行若干操作,包括解析分组报头、执行L2查找、执行L3查找、处理入口访问控制列表(ACL)、对入口业务进行分类以及聚合转发结果。尽管以此顺序描述由输入转发控制器214执行的任务,然而普通技术人员应理解的是,除非另外陈述,否则在各种实施例的范围内,对于本文讨论的任何进程,可以存在以类似的或替代次序或并行执行的附加的、更少的或替代步骤。
在一些实施例中,当单播分组通过前面板端口(例如,入口MAC 212的端口)进入时,输入转发控制器214可以首先执行分组报头解析。例如,输入转发控制器214可以解析分组的前128个字节以提取并保存诸如L2报头、EtherType、L3报头和TCP IP协议这样的信息。
随着分组通过入口转发流水线210,分组可以经历L2切换和L3路由查找。输入转发控制器214可以首先检查分组的目的地MAC地址以确定是交换分组(即,L2查找)还是路由分组(即,L3查找)。例如,如果目的地MAC地址与网络设备自己的MAC地址匹配,则输入转发控制器214可执行L3路由查找。如果目的地MAC地址与网络设备的MAC地址不匹配,则输入转发控制器214可以基于目的地MAC地址来执行L2交换查找以确定虚拟LAN(VLAN)标识符。如果输入转发控制器214在MAC地址表中找到匹配,则输入转发控制器214可将分组发送到出口端口。如果对目的地MAC地址和VLAN标识符来说不存在匹配,则输入转发控制器214可将分组转发到相同VLAN中的所有端口。
在L3路由查找期间,输入转发控制器214可将目的地IP地址用于L3主机表中的搜索。此表可存储用于直连附连的主机和学习的/32主机路由的转发条目。如果目的地IP地址与主机表中的条目匹配,则该条目将提供目的地端口、下一跳MAC地址和出口VLAN。如果输入转发控制器214对于目的地IP地址在主机表中未找到匹配,则输入转发控制器214可在LPM路由表中执行最长前缀匹配(LPM)查找。
除了转发查找之外,输入转发控制器214还可以对分组执行入口ACL处理。例如,输入转发控制器214可以检查ACL三元内容可寻址存储器(TCAM)是否有入口ACL匹配。在一些实施例中,每个ASIC可以具有每分片4000个条目的入口ACL TCAM表以支持系统内部ACL和用户定义的入口ACL。这些ACL可包括端口ACL、路由ACL和VLAN ACL等。在一些实施例中,输入转发控制器214可按照分片定位ACL条目并且仅在需要的情况下对它们进行编程。
在一些实施例中,输入转发控制器214还可以支持入口业务分类。例如,从入口接口,输入转发控制器214可以基于分组报头中的地址字段、IEEE 802.1q服务类(CoS)和IP优先或差异化服务代码点对业务进行分类。在一些实施例中,输入转发控制器214可将业务指派给八个服务质量(QoS)组中的一个。随着分组遍历系统,QoS组可以在内部标识用于后续QoS进程的业务类。
在一些实施例中,输入转发控制器214可以收集在流水线中早期(例如,在分组报头解析、L2查找、L3查找、入口ACL处理、入口业务分类、转发结果生成等期间)生成的转发元数据并且通过输入数据路径控制器216将它向下游传递。例如,输入转发控制器214可将64字节内部报头连同分组一起存储在缓冲器中。此内部报头可包括16字节的iETH(内部通信协议)报头信息,当通过广播网络230将分组转移到输出数据路径控制器222时,输入转发控制器214可将所述16字节的iETH(内部通信协议)报头信息追加到分组。当分组退出出口MAC226的前面板端口时,网络设备可剥离16字节iETH报头。网络设备可以使用剩余的内部报头空间(例如,48个字节)来将元数据从输入转发队列传递到输出转发队列以供由输出转发引擎消费。
在一些实施例中,输入数据路径控制器216可执行入口计数功能、接纳功能以及用于无丢弃服务类的流控制。入口接纳控制机制可基于可用的缓冲存储器的量以及已经由入口端口使用的缓冲空间的量和业务类来确定是否接纳分组进入存储器。输入数据路径控制器216可通过广播网络230将分组转发到输出数据路径控制器222。
如所讨论的,在一些实施例中,广播网络230可包括提供ASIC的所有分片之间的连接的一组点对多点线。输入数据路径控制器216可以在网络设备的所有分片(包括它自己的分片)上具有到输出数据路径控制器222的点对多点连接。
在一些实施例中,输出数据路径控制器222可执行出口缓冲器计数、分组排队、调度和多播复制。在一些实施例中,所有端口可动态地共享出口缓冲器资源。在一些实施例中,输出数据路径控制器222还可执行分组整形。在一些实施例中,网络设备可实现简单出口排队架构。例如,在出口端口拥塞的情况下,输出数据路径控制器222可直接将分组排队在出口分片的缓冲器中。在一些实施例中,在入口分片上可以没有虚拟输出队列(VoQ)。此方法可简化系统缓冲器管理和排队。
如所讨论的,在一些实施例中,一个或多个网络设备可支持出口上多达10个业务类、通过QoS组标识符标识的8个用户定义类、CPU控制业务类和交换端口分析器(SPAN)业务类。每个用户定义类可每出口端口具有单播队列和多播队列。此方法可帮助确保单个端口将不消耗超过其缓冲存储器的公平份额并且对于其他端口引起缓冲器饥饿。
在一些实施例中,多播分组可以作为单播分组通过类似的入口和出口转发流水线,但是替代地使用多播表用于多播转发。另外,组播分组可以通过多级复制进程以便转发到多个目的地端口。在一些实施例中,ASIC可包括通过非阻塞内部广播网络互连的多个分片。当多播分组到达前面板端口时,ASIC可执行转发查找。此查找可解析与入口端口相同的分片上的本地接收端口并且提供在目的地多播组中具有接收端口的预定接收分片的列表。转发引擎可以在本地端口上复制分组,并且将分组的一个副本发送到内部广播网络,同时内部报头中的位向量被设置为指示预定接收分片。以这种方式,仅预定接收分片可以从广播网络的线接受分组。对于此组没有接收端口的分片可丢弃分组。接收分片然后可执行本地L3复制或L2扇出查找和复制以将分组的副本转发到其本地接收端口中的每一个。
在图2中,转发流水线200还包括流高速缓存240,其当与从ASIC收集的遥测的直接导出(即,数据硬件流)组合时,可使得能够以线路速率收集分组和流元数据,同时避免CPU瓶颈或开销。流高速缓存240可提供由网络设备发送和接收的分组和流的完整视图。流高速缓存240可在每分组基础上收集信息,而无需采样并且而不会增加延迟或者使网络设备的性能降级。为了实现这个,流高速缓存240可从转发流水线200中拉出信息,而不用在业务路径(即,入口转发流水线210和出口转发流水线220)中。
除了传统转发信息之外,流高速缓存240还可收集其他元数据,诸如详细的IP和TCP标志以及隧道端点标识符。在一些实施例中,流高速缓存240还可检测分组流中的反常,诸如不一致的TCP标记。流高速缓存240还可以跟踪流性能信息,诸如流的突发和延迟。通过提供这种级别的信息,流高速缓存240可产生流的健康状况的更好视图。此外,因为流高速缓存240不执行采样,所以流高速缓存240可提供对流的完全可见性。
在一些实施例中,流高速缓存240可包括用于补充反常检测的事件机制。这种可配置的机制可定义表示感兴趣分组的一组参数。当分组与这些参数匹配时,事件机制可触发关于触发了事件的元数据(而不只是累积流信息)的事件。这种能力可给予流高速缓存240对累积流信息的洞察以及对特定感兴趣事件的可见性。以这种方式,网络(诸如实现应用和网络分析平台100的网络)可更全面地捕获遥测并且不影响应用和网络性能。
返回到图1,由软件传感器112和硬件传感器114捕获的遥测可包括与单独的分组有关的元数据(例如,分组大小、源地址、源端口、目的地地址、目的地端口等);流(例如,在没有不活动的情况下在一定时间(例如,15秒)内发送/接收的或者在一定持续时间(例如,30分钟)内发送/接收的具有相同的源地址/端口、目的地地址/端口、L3协议类型、服务类、路由器/交换机接口等的分组的数量和分组的聚合大小);流簇(例如,作为原始请求或响应流的一部分而生成的子请求和子响应的流以及这些流的子流);双向流(例如,具有对应的源地址/端口、目的地地址/端口等的流的请求/响应对的流数据);流组(例如,用于与某个进程或应用、服务器、用户等相关联的流的流数据)、会话(例如,用于TCP会话的流数据);或指定粒度的其他类型的网络通信。也就是说,网络遥测通常可包括描述开放系统互连(OSI)模型的所有层上的通信的任何信息。在一些实施例中,由传感器112和114收集的网络遥测还可包括其他网络业务数据,诸如跳延迟、分组丢弃计数、端口利用率、缓冲器信息(例如,瞬时队列长度、平均队列长度、拥塞状态等)和其他网络统计。
在一些实施例中,应用和网络分析平台100可将流解析成各种粒度的流簇(即,较大请求和响应的请求和响应的序列)。例如,对到企业应用的请求的响应可以对各种后端服务(例如,认证、静态内容、数据、搜索、同步等)产生多个子请求和子响应。应用和网络分析平台100可将流入分解成其组成分量以提供对应用和网络性能的更深入洞察。应用和网络分析平台100可实时地或基本上实时地(例如,在检测到流之后不超过几分钟)执行此解析。
应用和网络分析平台100可使流与发送或者接收该流的服务器、触发该流的应用或进程、应用或进程的所有者以及适用于该流的一个或多个策略和其他遥测相关联。由软件传感器112捕获的遥测因此可包括服务器数据、进程数据、用户数据、策略数据和其他数据(例如,虚拟化信息、租户信息、传感器信息等)。服务器遥测可包括服务器名称、网络地址、CPU使用率、网络使用率、磁盘空间、端口、登录用户、调度作业、打开文件和类似的信息。在一些实施例中,服务器遥测还可包括关于服务器的文件系统的信息,诸如存储在文件系统内的文件(例如,日志文件、配置文件、设备特殊文件等)和/或目录的列表以及用于文件和目录的元数据(例如,文件和/或目录的存在、不存在或修改)。在一些实施例中,服务器遥测还可包括物理或虚拟配置信息(例如,处理器类型、随机存取存储器(RAM)的量、磁盘或存储装置的量、存储装置的类型、系统类型(例如,32位或64位)、操作系统、公用云提供商、虚拟化平台等)。
进程遥测可包括进程名称(例如,bash、httpd、netstat等)、进程标识符、父进程标识符、进程的路径(例如,/usr2/username/bin/、/usr/local/bin、/usr/bin等)、CPU利用率、存储器利用率、存储器地址、调度信息、nice值、标志、优先级、状态、开始时间、终端类型、由进程花费的CPU时间和发起了进程的命令字符串(例如,“/opt/tetration/collector/tet-collector--config_file/etc/tetration/collector/collector.config--timestamp_flow_info--logtostderr--utc_time_in_file_nametrue--max_num_ssl_sw_sensors 63000--enable_client_certificate true”)。用户遥测可包括有关进程所有者的信息,诸如用户名字、用户标识符、用户的真实名字、电子邮件地址、用户的组、终端信息、登录时间、登录的到期日期、空闲时间以及有关用户的文件和/或目录的信息。
客户/第三方数据源116可包括带外数据,诸如功率水平、温度和物理定位(例如,房间、行、机架、笼门位置等)。客户/第三方数据源116还可包括有关服务器的第三方数据,诸如服务器是否在IP监视列表或安全报告(例如,由
Figure GDA0003826572970000091
马萨诸塞州伯灵顿的
Figure GDA0003826572970000092
加利福尼亚州桑尼维尔的/>
Figure GDA0003826572970000093
公司、英国阿宾登的/>
Figure GDA0003826572970000094
集团股份有限公司、华盛顿州西雅图的/>
Figure GDA0003826572970000095
公司、纽约州纽约的/>
Figure GDA0003826572970000096
通信公司及其他公司提供)上、地理定位数据和Whois数据以及来自外部来源的其他数据。
在一些实施例中,客户/第三方数据源116可包括来自作为服务的配置管理数据库(CMDB)或配置管理系统(CMS)的数据。CMDB/CMS可以以适合的格式(例如,
Figure GDA0003826572970000097
对象表示法(JSON)、可扩展标记语言(XML)、又一种标记语言(YAML)等))发送配置数据。
分析引擎120的处理流水线122可收集并处理遥测。在一些实施例中,处理流水线122可每100ms或更快地从软件传感器112和硬件传感器114中取回遥测。因此,应用和网络分析平台100可能不会错过或者比常规系统(其通常每60秒收集遥测)更不太可能错过“鼠标”流。另外,因为遥测表刷新如此频繁,所以软件传感器112和硬件传感器114确实不会或者比常规系统更不太可能由于存储器的溢出/缺少而丢弃遥测。此方法的附加优点是应用和网络分析平台代替网络设备负责流状态跟踪。因此,各种实施方式的网络设备的ASIC可以是更简单的或者可并入其他特征。
在一些实施例中,处理流水线122可滤出无关或重复数据或者它可创建遥测的摘要。在一些实施例中,处理流水线122可以处理(并且/或者软件传感器112和硬件传感器114可以捕获)仅某些类型的遥测并且忽略其余部分。例如,处理流水线122可以处理(并且/或者传感器可以监视)仅高优先级遥测、与特定子网(例如,财务部门、人力资源部门等)相关联的遥测、与特定应用(例如,业务关键应用、合规软件、医疗保健应用等)相关联的遥测、来自面向外部的服务器的遥测等。作为另一示例,处理流水线122可以仅处理(并且/或者传感器可以捕获)仅遥测的代表性样本(例如,每第1,000个分组或其他适合的采样速率)。
从网络的多个服务器(包括在虚拟化主机的多个分区内)并且从在服务器之间操作的多个网络设备收集和/或处理遥测可提供网络行为的全面视图。从多个视角而不是仅仅在位于数据路径中(或者与数据路径中的组件通信)的单个设备捕获和/或处理遥测可允许数据从各种数据源相关联,所述各种数据源可以被分析引擎120用作附加数据点。
另外,从多个视点收集和/或处理遥测可使得能够捕获更准确的数据。例如,常规网络可以由面向外部的网络设备(例如,路由器、交换机、网络器具等)构成,使得常规网络可能无法监视东西业务,包括针对同一主机上的VM到VM或容器到容器通信的遥测。作为另一示例,常规网络可以在那些分组遍历并入传感器的网络设备之前丢弃一些分组。处理流水线122可通过从多个潜在故障点捕获并处理遥测来基本上减轻或者消除这些问题。此外,处理流水线122可对照彼此来针对流(例如,来自源(物理服务器、管理程序、容器编排器、其他虚拟实体管理器、VM、容器和/或其他虚拟实体)、一个或多个网络设备和目的地的遥测)验证数据的多个实例。
在一些实施例中,处理流水线122可针对由多个传感器捕获的单个流来评估遥测的准确度并且利用来自单个传感器的被确定为最准确和/或完整的遥测。准确度可基于诸如网络拓扑这样的因素(例如,更靠近源的传感器可能更可能比更靠近目的地的传感器更准确)、传感器或托管该传感器的服务器的状态(例如,受损的传感器/服务器与未受损的传感器/服务器相比可以具有不太准确的遥测)或遥测量(例如,捕获较大量遥测的传感器可能比捕获较小量遥测的传感器更准确)。
在一些实施例中,处理流水线122可组装来自多个传感器的最准确的遥测。例如,沿着数据路径的第一传感器可以捕获流的第一分组的数据但是可以遗漏流的第二分组的数据,然而沿着数据路径的第二传感器可以发生相反情形。处理流水线122可组装来自由第一传感器捕获的第一分组和由第二传感器捕获的第二分组的流的数据。
在一些实施例中,处理流水线122还可将流拆开或者分解成各种粒度的请求和响应流簇的序列(例如,较大请求或响应的请求和响应的序列)。例如,对企业应用的请求的响应可以对各种后端服务(例如,认证、静态内容、数据、搜索、同步等)产生多个子请求和子响应。处理流水线122可将流分解成其组成分量以提供对应用和网络性能的更深入洞察。处理流水线122可实时地或基本上实时地(例如,在检测到流之后不超过几分钟)执行此解析。
处理流水线122可将遥测存储在数据湖(未示出)中,所述数据湖是通过用于各种类型的数据的大容量存储、巨大处理能力以及处理几乎无限的并发任务或作业的能力来表征的大规模储存库。在一些实施例中,分析引擎120可以使用来自马里兰州森林山的
Figure GDA0003826572970000111
软件基金会的/>
Figure GDA0003826572970000112
分布式文件系统(HDFSTM)来部署数据湖的至少一部分。HDFSTM是可缩放到数千个集群节点、数百万个文件和数千兆字节数据的高度可扩展和分布式文件系统。HDFSTM的特征是其针对批处理的优化,诸如通过协调对数据所位于的地方的数据计算。HDFSTM的另一特征是其对用于整个集群在一次写入、多次读取访问模型中实现数据一致性的单个命名空间的利用。典型的HDFSTM实施方式将文件分成块,所述块的大小通常是64MB并且在多个数据节点中被复制。客户端可直接地从数据节点访问数据。
处理流水线122可将经处理的数据传播到分析引擎120的一个或多个引擎、监视器和其他组件(并且/或者这些组件可从数据湖中取回数据),诸如应用依赖映射(ADM)引擎124、清单监视器126、流监视器128和应用性能监视(APM)引擎130。
ADM引擎124可确定在网络中运行的应用的依赖性,即,不同服务器上的进程如何彼此交互以执行应用的功能。业务的特定模式可以与特定应用相关。ADM引擎124可评估由处理流水线122处理的遥测以确定应用的互连性或依赖性以生成应用的图形(即,应用依赖映射)。例如,在用于web应用的常规三层架构中,web层的第一服务器、应用层的第二服务器和数据层的第三服务器组成web应用。根据流数据,ADM引擎124可以确定存在与超文本转移协议(HTTP)请求和响应相对应的在第一服务器的端口80上在外部服务器之间流动的第一业务。流数据还可以指示与应用服务器请求和响应相对应的第一服务器的第一端口与第二服务器的第二端口之间的第二业务以及与数据库请求和响应相对应的在第二服务器的第三端口与第三服务器的第四端口之间流动的第三业务。ADM引擎124可以将此应用的应用依赖映射或图形定义为包括含有第一服务器的第一端点组(EPG)(即,用于实现转发和策略逻辑的应用层或集群、应用和/或应用组件的分组)、含有第二服务器的第二EPG和含有第三服务器的第三EPG的三层应用。
清单监视器126可基于由处理流水线122处理的遥测来连续地跟踪网络的资产(例如,服务器、网络设备、应用等)。在一些实施例中,清单监视器126可以指定间隔(例如,每1分钟)评估网络的状态。也就是说,清单监视器126可周期性地拍摄网络的应用、服务器、网络设备和/或其他元件的状态的快照。在其他实施例中,清单监视器126可在发生感兴趣事件时捕获快照,所述感兴趣事件诸如应用经历超过应用延迟阈值的延迟;网络经历超过网络延迟阈值的延迟;服务器、网络设备或其他网络元件的故障;以及类似的情况。快照可包括与网络元件相关联的各种遥测。例如,服务器的快照可表示在捕获时在服务器上执行的进程、由每个进程利用的CPU的量(例如,作为时间的量和/或相对百分比)、由每个进程利用的存储器的量(例如,以字节为单位和/或作为相对百分比)、由每个进程利用的磁盘的量(例如,以字节为单位或者作为相对百分比)以及离一个或多个其他网络元件的距离(物理的和/或逻辑的、相对的和/或绝对的)。
在一些实施例中,在网络的变化(例如,服务器更新其操作系统或者运行新进程;服务器在新端口上通信;VM、容器或其他虚拟化实体迁移到不同的主机和/或子网、VLAN、VxLAN或其他网段;等)时,清单监视器126可向APM引擎130报警以确保应用和网络鉴于数据中心的变化保持像预期那样执行。
流监视器128可分析流以检测它们是否与反常或恶意业务相关联。在一些实施例中,流监视器128可以接收被确定为按预期表现(即,流到达网络设备或目的地的时间长度在阈值时间长度内)或者表现低于预期(即,流到达网络设备和/或目的地的时间长度超过阈值时间长度)的过去流的示例。流监视器128可利用机器学习来分析由处理流水线122处理的遥测并且基于与过去流的相似性来对每个当前流进行分类。在检测到反常流(诸如从源到目的地花费比指定时间范围更短或更长的持续时间的流、大小小于或大于指定量的流或先前被分类为网络攻击的流)时,流监视器128可以向APM引擎130和/或向呈现层140发送警报。在一些实施例中,网络可以在可信环境中操作持续一段时间,使得分析引擎120可建立正常操作的基线。
APM引擎130可负责监视并管理在网络内运行的应用。例如,APM引擎130可以在网络的变化时接收到来自清单监视器126的警报或者在流监视器128检测到反常流时接收到来自流监视器的警报。APM引擎130可评估遥测以精确定位性能降级的根本原因。在一些实施例中,APM引擎130还可执行修复任务,诸如负载平衡、将应用组件迁移得(在物理上和/或在逻辑上)更靠近在一起、使新服务器实例实例化(在专用网络和/或公用云中)以及对于有问题的服务器禁用网络连接及其他操作。
图3图示表示APM引擎130的许多可能的实施方式中的一个的应用性能监视(APM)引擎300的示例。APM引擎300可包括一个或多个性能前端进程(PFE)310、协调器集群320和遥测暂存器330。虽然APM引擎300在此示例中包括具体组件,但是本领域的普通技术人员应理解的是,APM引擎300的配置是一个可能的配置并且具有更多或更少组件的其他配置也是可能的。
图3示出与传感器302通信的PFE 310。传感器302表示图1的软件传感器112和/或硬件传感器114的许多可能的实施方式中的一个。在安装在数据中心的服务器和/或网络设备上之后,每个传感器302可经由与PFE310中的一个或多个进行通信来向协调器集群320注册。在成功注册后,传感器302可以开始捕获遥测,包括流数据、主机数据、进程数据、用户数据、策略数据等。传感器302可以不时地接收新配置信息,诸如以捕获用于诊断目的或者用于软件升级的附加遥测。在一些实施例中,APM引擎300可以以高级平台无关格式对配置信息进行编码。在一些实施例中,每个传感器302可确定其服务器的操作环境,将高级配置信息转换成平台特定配置信息,并且基于操作环境来应用某些平台特定优化。在其他实施例中,APM引擎300可以在分发之前从传感器302远程地将高级配置信息转化为平台特定格式。
在一些实施例中,PFE 310可负责将平台无关配置信息存储在存储器中、处理传感器302的注册、监视对配置信息的更新、将更新分发到传感器302并且收集由传感器302捕获的遥测。在图3的示例中,PFE 310可充当传感器302与协调器集群320之间的媒介。这可在服务器与APM引擎300之间添加一层安全性。例如,传感器302可在信任仅协调器集群320而不信任PFE 310的最小特权原则下操作。传感器302和PFE 310必须对它们之间的所有事务(包括配置和注册)进行签名和认证。
协调器集群320可作为用于APM引擎300的控制器来操作。在图3的示例中,协调器集群320实现高可用性方案(例如,ZooKeeper、doozerd和etcd),其中集群选举一个协调器实例主控而剩余协调器实例用作备用实例。协调器集群320可管理传感器302到PFE 310的指派。在一些实施例中,每个传感器302可以最初向最靠近(在物理上和/或在逻辑上)传感器的主机的PFE 310注册,但是例如为了负载平衡和/或在PFE 310中的一个或多个发生故障的情况下,协调器集群320可以将传感器重新指派给不同的PFE。在一些实施例中,协调器集群320可以将分片(sharding)用于负载平衡并且为PFE 310提供高可用性。
遥测暂存器330可维护由传感器302捕获的传感器数据。在一些实施例中,APM引擎可在更容易可访问的数据暂存器(例如,固态设备(SSD)、优化的硬盘驱动器(HDD)等)中维护最近捕获和/或访问的遥测并且将较旧的遥测迁移到不太可访问的数据暂存器(例如,商品HDD、磁带等)。在一些实施例中,APM引擎300可以使用
Figure GDA0003826572970000151
或其他关系数据库平台来实现遥测暂存器330。在其他实施例中,APM引擎300可以使用由纽约州纽约的/>
Figure GDA0003826572970000152
公司提供的软件或其他NoSQL数据库来实现遥测暂存器330。
在一些实施例中,协调器集群320还可以负责使PFE 310负载平衡、确保PFE 310对传感器302的高可用性并且在遥测暂存器330中接收和存储遥测。在其他实施例中,APM引擎300可集成PFE和协调器的功能性或者将PFE和协调器的功能性进一步划分成附加组件。
返回到图1,呈现层140可包括web图形用户界面(GUI)142、API端点144和基于事件的通知系统146。在一些实施例中,应用和网络分析平台100可以使用Ruby on RailsTM作为web应用框架来实现web GUI 142。Ruby on RailsTM是为数据库、web服务和web页面提供默认结构的模型-视图-控制器(MVC)框架。Ruby on RailsTM依靠诸如用于数据转移的JSON或XML这样的web标准以及用于显示和用户对接的超文本标记语言(HTML)、级联样式表(CSS)和
Figure GDA0003826572970000153
在一些实施例中,应用和网络分析平台100可暴露应用编程接口(API)端点(例如,诸如基于简单对象访问协议(SOAP)、面向服务架构(SOA)、代表性状态转移(REST)架构、面向资源架构(ROA)等的那些)以用于监视在网络中执行的应用和网络它本身的性能。在一些实施例中,应用和网络分析平台100可以使用来自
Figure GDA0003826572970000154
的/>
Figure GDA0003826572970000155
Hive用于后端并且使用来自加利福尼亚州红木滩的/>
Figure GDA0003826572970000156
公司的/>
Figure GDA0003826572970000157
数据库连接(JDBC)作为API层来实现API端点144。Hive是提供数据摘要和自组织查询的数据仓库基础设施。Hive提供用于使用称作HiveQL的结构化查询语言(SQL)的变体来查询数据的机制。JDBC是用于编程语言/>
Figure GDA0003826572970000158
的应用编程接口(API),其定义客户端如何可以访问数据库。
在一些实施例中,应用和网络分析平台100可以使用
Figure GDA0003826572970000161
Kafka来实现基于事件的通知系统。Kafka是支持分割和复制的分布式消息传送系统。Kafka使用主题的构思。主题是具体类别中的消息的馈源。在一些实施例中,Kafka可将原始分组捕获和遥测信息视为输入,并且将消息输出到安全信息和事件管理(SIEM)平台,所述SIEM平台给用户提供用于搜索、监视并分析机器生成的数据的能力。
在一些实施例中,网络中的每个服务器可以包括软件传感器并且每个网络设备可以包括硬件传感器114。在其他实施例中,软件传感器112和硬件传感器114可驻留在网络的服务器和网络设备的一部分上。在一些实施例中,软件传感器112和/或硬件传感器114可以在全可见性模式或有限可见性模式下操作,在所述全可见性模式下传感器从每一分组和每一流收集遥测,在所述有限可见性模式下传感器仅提供应用洞察和策略生成所需要的对话视图。
图4图示网络环境400的示例。普通技术人员应领会的是,对于网络环境400和本公开中讨论的任何环境,可在类似的或替代配置中存在附加或更少的节点、设备、链路、网络或组件。其他实施例可以具有不同数量和/或类型的客户端、网络、节点、云组件、服务器、软件组件、设备、虚拟或物理资源、配置、拓扑、服务、器具、部署或网络设备。进一步地,网络环境400可包括可由客户端或租户访问并利用的任何数量或类型的资源。
网络环境400可包括客户端计算设备402、广域网(WAN)404和局域网(LAN)410。尽管在这里出于简单和简洁的目的未示出,然而典型的数据中心还可以包括位于边缘网络设备406b与web服务器412之间的防火墙、负载平衡器和/或附加边缘路由器。客户端402可以是能够通过网络进行通信的任何种类的计算设备(即,具有不同的类型、能力、操作系统等),诸如服务器(物理的或虚拟的)、台式计算机、膝上型电脑、平板、智能电话或可穿戴设备(例如,手表;眼镜、遮阳板、头戴式显示器或通常穿戴在用户的眼睛上方的其他设备;耳机、耳塞或通常穿戴在用户的耳朵中或上方的其他设备;等等)。客户端402还可以是“信息娱乐系统”(即,与运输工具集成在一起的计算设备)、“智能”家庭设备或物联网(IoT)设备(例如,电视、机顶盒、数字视频记录器(DVR)、数字视频盘(DVD)播放器或其他媒体播放器、视频游戏控制台等)或其他电子设备。
WAN 404可包括一个或多个网络和/或网络设备,诸如网络设备406a和406b,以用于互连客户端402和LAN 410。WAN可通过长距离通信链路连接地理上分散的节点,所述长距离通信链路诸如公共载波电话线、光学光路、同步光网络(SONET)或同步数字体系(SDH)链路。LAN和WAN可包括L2和/或L3网络和服务器。互联网是连接全世界不同的网络从而提供各种网络上的节点之间的全球通信的WAN的示例。节点通常通过根据预定义协议(诸如传输控制协议/网际协议(TCP/IP))交换数据的离散帧或分组来通过网络通信。在此上下文中,协议可指代定义节点如何彼此交互的一组规则。WAN 404也可以是专用网络,诸如全球企业网络,其使用与公用互联网类似或相同的技术来操作。
LAN可通过位于相同的一般物理定位(诸如建筑物或校园)中的专用私密通信链路来连接节点。在图4的示例中,LAN 410可以是包括单个简单web应用的数据中心。典型的数据中心可包括数百或数千个更简单或更复杂的应用。Web应用包括连接到网络设备414(例如,集线器、交换机、路由器等)以便与认证服务器416、内容服务器418和数据服务器420进行通信的web服务器412。数据服务器420可直接地或间接地连接到数据库422。尽管图4可以看起来示出web服务器412、认证服务器416、内容服务器418和数据服务器420作为单独的元件,然而服务器或服务器的各种组合可作为虚拟机、容器或其他虚拟实体驻留在单个物理机器上。类似地,网络设备414可以是一个或多个物理网络设备、虚拟网络设备,或各种配置(例如,叶脊、三层(即,包括核心、聚合和访问级别)、胖树、网格、总线、集中星型等)中的物理和虚拟网络设备的各种组合。
在图4的示例中,web应用可以是与一个或多个用户账户相关联的简单网站。用户可以登录到其账户并访问其个人信息和其他内容。用户可以从客户端设备402(例如,经由独立客户端应用、web浏览器、插件等)访问她的与网站/web应用相关联的账户。客户端设备402可以通过WAN404(例如,互联网、企业网络等)与位于LAN 410中的网站/web应用进行通信以便用户以任何数量的方式与她的账户交互,诸如更新特权信息(例如,名字、电子邮件地址、登录密码等)、查看内容、创建内容等。每个交互可构成对网站/web应用的请求并且该请求的结果可以是响应。然而,每个请求可以包括一个或多个附加子请求和子响应。同样地,每个响应可包括一个或多个子请求和子响应。子请求和子响应的数量可主要取决于应用的复杂性。但是甚至诸如图4中图示的简单web应用/网站也可包括许多子请求和子响应。
图5图示针对与图4的网站/web应用的交互的请求和响应的时间序列500的示例。普通技术人员应理解的是,对于本文讨论的任何序列,除非另外陈述否则在各种实施例的范围内,可能存在以类似的或替代次序或者并行执行的附加的、更少的或替代步骤。用户交互可以是用户登录到网站/web应用中、点击以查看某些内容、在网站/web应用中搜索内容以及任何数量的可能性。在时间序列500中,垂直轴线对应于时间并且水平轴线示出网站/web应用的各个组件之间的通信。
在图5的示例中,客户端402可以发送对网站/web应用的特定页面或其他内容的始发请求(即,在点A处)。在遍历WAN 404之后,始发请求可以在持续时间AB之后到达web服务器412。如上面所讨论的,始发请求可以包括通过WAN 404、数据中心的边缘网络设备中的一个或多个、防火墙、负载平衡器以及其他软件和硬件组件的段,但是图5为了简洁和清楚而排除那些段。Web服务器412可以花费一些时间BC处理请求以确定请求是对需要认证的个人内容的请求。因此,web服务器412可以向认证服务器416发送认证请求(即,在点C处)以验证用户的登录名字和密码与由网站/web应用存储的用户的信息匹配。为了发送认证请求,web服务器412可以首先将认证请求转发到网络设备414持续持续时间CD。网络设备414可接收认证请求,花费一定量的时间DE来处理认证请求的分组并且将请求转发到认证服务器416持续持续时间EF。认证服务器416可以处理认证请求并且准备认证响应(即,在点G处)持续时间FG并且将认证请求转发到网络设备414持续时间GH。网络设备414可花费时间HI来确定在哪里将认证请求转发到web服务器412,这时网络设备414可以在持续时间IJ期间将响应转发到web服务器412。
Web服务器412可以根据认证响应确认用户的认证并且开始取回内容以提供对始发请求的响应。响应可以是网站/web应用的页面,其包括来自内容服务器418的内容和来自数据服务器420的个人信息。Web服务器412可以占去时间JK以准备对内容服务器418的请求并且占去时间KS以准备对数据服务器420的请求。Web服务器412可以在时间KL期间向网络设备414发送内容请求,这时网络设备414可以花费时间LM来将转发对内容服务器418的请求持续持续时间MN。内容服务器418可以接收内容请求,花费时间NO来处理该请求,并且在时间OP期间向网络设备414发送内容响应。网络设备414可处理内容响应持续时间PQ并且将内容响应转发到web服务器,此后经过QR时间。
与对内容服务器418的请求/响应并行或在时间上非常接近地,web服务器412可以将数据请求发送到网络设备414持续时间ST。网络设备可处理数据请求持续时间TU并且在时间段UV期间转发数据请求。数据服务器420可以具有这样的架构,即它必须从数据库422中取回所请求的数据,并且因此必须执行一些时间VW处理数据请求并且准备数据库请求(即,在点W处)。数据库请求可以花费时间WX到达数据库422。在持续时间XY期间可以发生取出所请求的数据,并且在时间YZ期间可以发生将数据(即,在点Y处)发送回到数据服务器420。在时间αβ期间将数据响应发送回到网络设备414之前,数据服务器可以在时间Zα内处理数据库响应。网络设备可以处理数据响应持续时间βγ并且在时间γδ期间转发数据响应。Web服务器412可以在时间εζ期间将对始发请求的响应发送到客户端402之前在时间δε期间组装从内容服务器418取回到的内容和从数据服务器420取回到的数据。
在图5的示例中,从BC开始至εζ的段可表示用于将对始发请求的web服务器响应发送到web服务器的总延迟。总响应延迟因此可包括由于web服务器412而导致的延迟、由于认证服务器416而导致的延迟以及由于内容服务器418而导致的延迟与由于数据服务器420而导致的延迟之间的最大值(假定对内容服务器418和数据服务器420的请求并行或基本上并行)。一些常规数据中心可以能够导出这些延迟中的一些。例如,依靠来自网络设备(例如,网络设备414)的网络遥测的数据中心可以能够经由认证请求流簇和认证响应流簇的时间戳来计算web服务器延迟。同样地,可能的是数据中心可以依靠来自服务器的遥测来根据指示web服务器412何时将认证请求流簇发送到认证服务器416并且web服务器何时从认证服务器416接收到认证响应流簇的web服务器日志来计算web服务器延迟。各种实施例可通过计算更多粒度的延迟来在这些常规方法上改进。例如,应用和网络分析平台100可将用于提供对认证请求的响应的总延迟解析成包括表示从web服务器412到网络设备414的网络延迟的段CD、表示网络设备延迟的段DE(但在一些实施例中是可忽略的并被忽视)、表示从网络设备414到认证服务器416的网络延迟的段EF、表示认证服务器延迟的段FG、表示从认证服务器416到网络设备414的网络延迟的段GH、表示网络设备延迟的段HI以及表示从网络设备414到web服务器412的网络延迟的段IJ。常规数据中心不能以这种粒度级别确定延迟,但是本技术的各种实施例可通过从web服务器412、网络设备414和认证服务器416获得遥测来以这种粒度级别确定延迟。在一定时间段期间,依照一些实施例的应用和分析框架可以为web服务器412与认证服务器416之间的网络延迟(即,段CD、(有时DE)、EF)、认证服务器延迟(即、段FG)以及认证服务器416与web服务器412之间的网络延迟(即,段GH、(有时HI)和IJ)建立基线度量。当用户经历延迟时,管理员可以基于将流分解成流簇的这种方式快速地确定问题是由于服务器延迟还是网络延迟而导致的。
如图5中所示,单个用户与简单应用的交互可包括不止十几个请求和响应。典型的企业网络可包括数百或数千个更复杂的应用,其中数百或数千个用户可能每天执行数百万或数十亿个操作。人类用户将不可能处理并分析这种数据量。图5还演示仅依靠来自服务器或网络设备中的一个的遥测的数据中心的不完整性。例如,在仅可从网络设备414获得遥测的第一数据中心中并且在网络设备试图与数据服务器420进行通信异常慢或者失败的情形下,第一APM平台不能诊断问题是由于应用不可用性还是负载而出现的。另外,第一数据中心可能无法提供关于问题存在于数据服务器420、数据库422还是数据服务器与数据库之间的连接中的洞察。例如,在数据请求中,第一数据中心可以仅恢复ST和UV,但是可能无法恢复VW、WX、XY、YZ和Zα,因为第一数据中心可能不知道数据服务器420对数据库422有依赖。
仅依靠来自服务器的遥测的第二数据中心也可能遭受各种缺陷。这样的系统可以能够检测web服务器412与数据服务器420之间的通信中的反常(或无)响应时间,但是可能无法探知延迟或故障是由于web服务器412、网络设备414、数据服务器420、数据库422还是数据服务器与数据库之间的连接而导致的。例如,在数据请求中,第二数据中心可以具有数据请求和数据响应的视图,但是ST、TU、UV、VW、WX、XY、YZ、Zα、αβ、βγ和γδ可以是黑盒子。各种实施例可以通过沿着数据路径的多个点捕获遥测、将流解析成流簇、为流簇建立基线并且对照基线来评估新业务以更精确地诊断应用和网络性能降级的根本原因来克服现有技术的数据中心的这些和其他缺陷。
图6图示用于将一个或多个流解析成流簇以进行应用性能监视和管理的方法600的示例。普通技术人员应理解的是,对于本文讨论的任何方法,除非另外陈述否则在各种实施例的范围内,可以存在以类似的或替代次序或并行执行的附加的、更少的或替代步骤。网络以及特别是应用和网络分析平台(例如,图1的应用和网络分析平台100)、分析引擎(例如,图1的分析引擎120)、APM引擎(例如,图1的APM引擎130)、网络操作系统、虚拟实体管理器或类似的系统可执行方法600。
在图6的示例中,方法600可以在步骤602处开始,在所述步骤602中传感器(例如,图1的软件传感器112和硬件传感器114)在第一时间段期间从网络的服务器和网络设备捕获遥测(例如,流数据、主机数据、进程数据、用户数据、策略数据等)以为应用和网络性能建立基线。在一些实施例中,应用和网络分析平台还可以收集虚拟化信息、网络拓扑信息和应用信息(例如,配置信息、先前生成的应用依赖映射、应用策略等)。另外,应用和网络分析平台还可以收集带外数据(例如,功率水平、温度和物理定位)和客户/第三方数据(例如,CMDB或CMS即服务、Whois、地理坐标等)。如所讨论的,软件传感器112和硬件传感器114可从多个视角收集所捕获的数据以提供网络行为的全面视图。软件传感器112可以沿着数据路径的多个点(例如,网络设备、物理或裸机服务器)并在物理主机的多个分区(例如,管理程序、容器编排器、虚拟实体管理器、VM、容器、其他虚拟实体等)内包括传感器。
在收集网络遥测和相关数据之后,方法600可以继续到步骤604,其中应用和网络分析平台可为在网络中执行的一个或多个应用生成应用依赖图(ADM)。在一些实施例中,ADM的节点可表示服务器和进程(或应用层、应用、应用组件或其他实施例中的其他应用粒度)的配对或级联,并且ADM图的边缘可表示应用和网络分析框架检测节点之间的流。节点的集群(即,在彼此的相似性阈值内的主机-进程配对)可表示应用组件,并且ADM的每个连接图可表示应用。
在一些实施例中,生成ADM可涉及通过级联服务器(例如,遥测将服务器标识为分组/流的分组报头元数据中的源或目的地)和应用/应用组件(例如,遥测标识生成分组/流的进程)来确定ADM的节点。生成ADM还可包括通过检测ADM的节点之间的一个或多个流来确定ADM的边缘。生成ADM还可包括确定节点的特征向量。每个节点的特征向量可以包括服务器特征、进程特征和/或其他特征的级联。服务器特征可包括服务器名字、网络地址、操作系统、CPU使用率、网络使用率、磁盘空间、端口、登录用户、调度作业、打开文件以及有关存储在服务器上的文件和/或目录的信息。进程特征可包括进程名字、进程标识符、父进程标识符、进程路径、CPU利用率、存储器利用率、存储器地址、调度信息、nice值、标志、优先级、状态、开始时间、终端类型、由进程花费的CPU时间、启动了进程的命令字符串和进程所有者(例如,用户名字、用户标识符、用户的真实名字、电子邮件地址,用户的组)、终端信息、登录时间、登录的到期日期、空闲时间以及有关用户的文件和/或目录的信息。在一些实施例中,特征向量还可包括从客户/第三方数据(例如,CMDB或CMS即服务、Whois、地理坐标等)中提取的特征。
用于检测ADM的节点之间的流的遥测可以包括诸如源地址、源端口、目的地地址、目的地端口、协议类型、服务类等这样的分组报头字段和/或诸如流开始时间、流结束时间、流的分组数、流的字节数、流的TCP标志的并集等这样的聚合分组数据。
生成ADM还可涉及通过比较其特征向量来确定ADM的节点之间的相似性。相似性可以是两个节点相对于其他节点有多相似的量度或两个节点与其他节点相比彼此不太遥远的量度。在一些实施例中,应用和网络分析平台可使用欧几里德距离、曼哈顿距离、闵可夫斯基距离、余弦相似性、杰卡德相似性等中的一个或多个作为相似性/距离量度。在一些实施例中,确定ADM还可包括设置相似性阈值以便集群指定关于在网络中执行的应用的视图的粒度级别。例如,将相似性阈值设置为非常粗程度的相似性可导致多个集群将数据中心表示为单片应用。另一方面,将相似性阈值设置为非常细程度的相似性可对于网络中的每个主机-进程配对产生单独集群。设置相似性阈值可能主要取决于在网络中执行的应用的数量和类型以及手头任务所期望的粒度级别。在大多数情形下,相似性阈值可以位于非常粗与非常细之间某处。如所讨论的,集群可表示应用组件,并且连接图可表示应用。
在生成ADM之后,方法600可进行到步骤606,其中应用和网络分析平台可将流移交到一个或多个流簇中。也就是说,应用和网络分析平台可通过跟踪从源到目的地的流来将流分解成一系列子请求和子响应。请求流可包括遍及从源到目的地的网络设备的跳以及由网络设备对流的处理。响应流可包括遍及网络设备的跳、由网络设备对流的处理以及被执行来生成对始发请求流的响应的对中间端点的子请求和子响应(包括遍及网络设备的跳和由这些网络设备进行的处理)。例如,在图5中,应用和网络分析平台可以将web服务器412对来自客户端的始发请求的响应分解为包括段BC、CD、DE、EF、FG、GH、HI、IJ、JK、KL、LM、MN、NO、OP、PQ、QR、ST、TU、UV、WX、XY、YZ、Zα、αβ、βγ、γδ、δε和εζ的序列。
方法600可以继续到步骤608,其中应用和网络分析平台可确定用于流簇的基线度量,诸如用于发送和/或处理每个流簇的时间长度的平均值或范围和/或在每个流簇内发送和/或处理的数据量(例如,以分组和/或字节数为单位)的平均数据量或范围。例如,应用和网络分析平台可使用由服务器的软件传感器捕获的网络遥测和相关数据来检测与在服务器上执行的应用相关联的请求流,诸如通过拍摄在服务器上执行的进程在服务器生成了流时的快照并且使流与进程中的一个相关联。应用和网络分析平台可跟踪从服务器到一个或多个网络设备的请求流(即,网络设备可以对应于流的一个或多个跳)并且确定服务器与网络设备之间的传输时间(以及有时是发送的数据量)以及由网络设备基于由网络设备的硬件传感器捕获的网络遥测来处理流所花费的时间。应用和网络分析平台可基于由这些附加设备的传感器捕获的网络遥测和相关数据来跟踪响应流作为对其他服务器的子请求和子响应的传输和/或处理(以及由网络设备沿着子请求和响应的数据路径进行的传输和/或处理)并且确定与发送和/或处理子请求和子响应相关联的时间量(和/或在一些实施例中为数据量)。应用和网络分析平台可以通过聚合在指定时间段内检测到的流簇的观察结果来确定用于流簇的基线度量。
在步骤610处,应用和网络分析平台可在第二时间段期间通过对照新流簇的对应基线来比较它们来评估网络遥测和相关数据。在一些实施例中,应用和网络分析平台可以使用机器学习和模式识别算法来对每个新流簇进行分类。机器学习可涉及接收“训练的”样本(即,与预定分类相关联的流簇)、确定特定分类的样本可以彼此有共同点并且可能与其他分类没有共同点的特征(有时加权的)并且使用这些(有时加权的)特征来对新流簇进行分类。机器学习和模式识别算法可包括判定树、随机森林、基于规则的分类器、支持向量机(SVM)分类器、神经网络分类器、最近邻分类器等。
判定树使用底层数据和不同特征的分层划分。数据的分层划分创建按其类分布偏倚的类分区。对于流簇之间的给定差异集,流簇最可能属于的分区是该流簇的分类。
随机森林依靠判定树的组合,其中每个树取决于独立地采样并且对于森林中的所有树具有相同分布的随机向量的值。实施者可针对许多树T通过在放回的条件下随机对训练数据的n个案例进行采样以创建训练数据的子集来训练随机森林。在每个节点处,分类器可从所有特征的集合中随机选择数量m个特征,并且可最终选择提供最佳分割来在该节点上做二进制分割的特征。在下一个节点处,分类器随机选择另一数量m个特征并且重复该过程。
基于规则的分类器确定定义不同类的模式(例如,正则表达式)。这些类型的分类器定义一组规则,其中左手侧对应于模式,而右手侧对应于类标签。规则确定分类。
SVM分类器试图使用不同类之间的线性或非线性描绘来分割底层数据。这些分类器的前提是为了确定不同类之间的最佳边界并且将这些边界用于分类的目的。
神经网络分类器利用使用连接方法来处理信息的一组互连的函数或分类器。神经网络在训练期间改变其结构,诸如通过在一个网络内合并重叠检测并且训练仲裁网络以组合来自不同网络的结果。
最近邻分类器将训练数据中的k-最近邻居确定为流簇之间的特定差异集,并且来自k个邻居的多数类确定分类。
在判定点612处,如果新流簇不偏离其基线,诸如通过在指定时间范围内发生并且/或者在数据大小的指定范围内发送/处理一定量的数据,则应用和网络分析平台可以继续分析新流簇。
然而,如果应用和网络分析平台确定新流簇偏离其基线,则在步骤614处,应用和网络分析平台可执行某些修复任务以解决偏差。在一些实施例中,修复可包括诸如经由基于事件的通知系统(例如,图1的基于事件的通知系统146)生成警报。在一些情况下,网络管理员可以分析反常流簇并且确定应用和网络的性能符合预期或者确定流簇指示应用和网络性能的问题。应用和网络分析平台可将这个作为输入(即,训练样本)接收以改进机器学习。
如所讨论的,在一些实施例中,应用和网络分析平台可确定网络内的服务器的物理和/或逻辑定位(例如,CMDB/CMS、地理坐标、IP地址等)。应用和网络分析可使用定位信息来确定依赖于彼此的应用组件的最佳放置和配置,使得组件在物理上和/或在逻辑上更靠近在一起。例如,应用和网络分析平台可以确定反常流对特定应用来说是瓶颈并且可定位用于应用组件的不同定位。作为另一示例,应用和网络分析平台可以具有数据中心中的应用和网络活动的全面视图并且可确定用于应用组件的使带宽和延迟最小化的定位。因此,在一些实施例中,修复可包括自动地将具有应用依赖的虚拟实体迁移得在物理上和/或在逻辑上更靠近在一起以解决应用和网络性能问题。在一些实施例中,修复还可包括生成关于要在物理上和/或在逻辑上更靠近在一起的应用组件的物理放置或配置的推荐以减少延迟和其他性能降级。
图7A和图7B图示依照各种实施例的系统。当实践各种实施例时,更适当的系统对于本领域的普通技术人员而言将是显而易见的。本领域的普通技术人员也将容易地领会的是,其他系统也可能的。
图7A图示用于常规总线计算系统700的示例架构,其中系统的组件使用总线705来彼此电通信。计算系统700可包括处理单元(CPU或处理器)710和系统总线705,所述系统总线705可以将包括系统存储器715(诸如图7B中所示的存储设备770中的只读存储器(ROM)和随机存取存储器(RAM)775)的各种系统组件耦合到处理器710。计算系统700可包括直接地与处理器710连接、与处理器710极为接近或者作为处理器710的一部分集成的高速存储器的高速缓存712。计算系统700可将数据从存储器715和/或存储设备730复制到高速缓存712以供由处理器710快速访问。以这种方式,高速缓存712可提供在等待数据的同时避免处理器延迟的性能提升。这些和其他模块可控制处理器710以执行各种动作。其他系统存储器715也可以用于使用。存储器715可包括具有不同性能特性的多种不同类型的存储器。处理器710可包括被配置为控制处理器710的任何通用处理器和硬件模块或软件模块(诸如存储在存储设备730中的模块1:732、模块2:734和模块3:736)以及专用处理器,其中软件指令被并入到实际的处理器设计中。处理器710可以基本上是完全自备的计算系统,包含多个核心或处理器、总线、存储器控制器、高速缓存等。多核心处理器可以是对称的或不对称的。
为了使得能实现用户与计算系统700的交互,输入设备745可表示任何数量的输入机制,诸如用于语音的麦克风、用于手势或图形输入的触摸保护屏幕、键盘、鼠标、动作输入、语音等。输出设备735也可以是为本领域的技术人员已知的许多输出机制中的一种或多种。在一些情况下,多模态系统可使得用户能够提供多种类型的输入来与计算系统700进行通信。通信接口740可支配并管理用户输入和系统输出。可能对在任何特定硬件布置上操作没有限制,并且各种其他实施例可以在这里取代基本特征以得到改进的硬件或固件布置。
存储设备730可以是非易失性存储器并且可以是可存储可由计算机访问的数据的硬盘或其他类型的计算机可读介质,诸如磁带盒、闪速存储器卡、固态存储器设备、数字通用盘、磁盒、随机存取存储器(RAM)725、只读存储器(ROM)720及其混合物。
存储设备730可包括用于控制处理器710的软件模块732、734、736。各种实施例可以利用其他硬件或软件模块。存储设备730可连接到系统总线705。在一个方面中,执行特定功能的硬件模块可连同必要的硬件组件(诸如处理器710、总线705、输出设备735等)一起包括存储在计算机可读介质中的软件组件,以执行该功能。
图7B图示依照实施例的可被使用的用于常规芯片组计算系统750的示例架构。计算系统750可包括表示能够执行被配置为执行标识的计算的软件、固件和硬件的任何数量的在物理上和/或在逻辑上根本不同的资源的处理器755。处理器755可与芯片组760进行通信,所述芯片组760可控制到处理器755的输入和来自处理器755的输出。在此示例中,芯片组760可将信息输出到输出设备765,诸如显示器,并且可以读取信息并将信息写入到存储设备770,所述存储设备770可包括例如磁介质和固态介质。芯片组760还可从RAM 775读取数据并且将数据写入到RAM 775。用于连接各种用户接口组件785的桥接器780可与芯片组760对接。用户接口组件785可包括键盘、麦克风、触摸检测和处理电路、指点设备(诸如鼠标)等。对计算系统750的输入可来自各种源(机器生成的和/或人类生成的)中的任一个。
芯片组760还可与可具有不同物理接口的一个或多个通信接口790对接。通信接口790可包括用于有线和无线LAN、用于宽带无线网络以及个人区域网络的接口。本文公开的用于生成、显示并使用GUI的方法的一些应用可包括通过物理接口接收有序数据集或者由机器它本身通过处理器755分析存储在存储设备770或RAM 775中的数据来生成。进一步地,计算系统750可经由用户接口组件785从用户接收输入并且通过使用处理器755来解释这些输入而执行适当的功能,诸如浏览功能。
应领会的是,计算系统700和750分别可具有多于一个处理器710和755,或者是联网在一起以提供更大处理能力的计算设备的组或集群的一部分。
为了说明的清楚,在一些情况下各种实施例可以被呈现为包括单独的功能块,包括含有设备、设备组件、用软件或硬件和软件的组合加以具体实现的方法中的步骤或例行程序的功能块。
在一些实施例中,计算机可读存储设备、介质和存储器可包括包含比特流等的电缆或无线信号。然而,当被提及时,非暂态计算机可读存储介质明确地排除诸如能量、载波信号、电磁波和信号本身这样的介质。
可使用被存储或者可其他方式从计算机可读介质获得的计算机可执行指令来实现根据上述示例的方法。这样的指令可包括例如使或者以其他方式将通用计算机、专用计算机或专用处理设备配置成执行某个功能或一组功能的指令和数据。可通过网络访问使用的计算机资源的各部分。计算机可执行指令可以是例如二进制文件、诸如汇编语言这样的中间格式指令、固件或源代码。可以用于存储指令、使用的信息和/或在根据描述的示例的方法期间创建的信息的计算机可读介质的示例包括磁盘或光盘、闪速存储器、设置有非易失性存储器的USB设备、联网存储设备等。
实现根据这些公开的方法的设备可包括硬件、固件和/或软件,并且可采取各种形状因数中的任一种。这样的形状因数的典型示例包括膝上型电脑、智能电话、小形状因数个人计算机、个人数字助理、机架安装设备、独立设备等。其他实施例可以在外围设备或附加卡中实现本公开中描述的功能性。作为另一示例,各种实施例还可以在不同芯片当中的电路板或在单个设备中执行的不同进程上实现此功能性。
指令、用于输送这样的指令的介质、用于执行它们的计算资源以及用于支持这样的计算资源的其他结构是用于提供这些公开中描述的功能的手段。
尽管本公开使用各种示例和其他信息来说明所附权利要求的范围内的各方面,但是本领域的普通技术人员应理解不应将权利要求限于这样的示例中的特定特征或布置,因为普通技术人员可使用这些示例来导出各式各样的实施方式。进一步地,尽管本公开用特定于结构特征和/或方法步骤的示例的语言来描述某个主题,然而普通技术人员应理解的是,所附权利要求中限定的主题不一定限于这些描述的特征或行为。例如,这样的功能性可不同地分布或者在除本文标识的那些以外的组件中被执行。相反,本公开将描述的特征和步骤作为所附权利要求的范围内的系统和方法的组件的示例来提供。

Claims (17)

1.一种用于确定反常流簇的方法,所述方法包括:
在第一时间段期间从网络的至少第一服务器和第一网络设备捕获第一遥测;
通过级联服务器特征和进程特征来确定与所述第一遥测相关联的应用依赖图的多个节点;
基于所述第一遥测来确定所述应用依赖图的多个边缘,所述第一遥测包括指示所述多个节点中的节点对之间的一个或多个流的流信息;
针对所述多个节点中的第一节点确定第一特征向量;
基于所述第一特征向量与所述多个节点中的第二节点的第二特征向量之间的相似性度量满足相似性阈值,来确定包括所述第一节点和所述第二节点的集群;
基于所述应用依赖图来针对由所述第一服务器生成并且将所述第一网络设备作为一跳来包括的至少一个流,确定第一多个流簇;
针对所述第一多个流簇中的至少一个第一流簇,确定基线度量;以及
通过将所述基线度量与至少一个第二流簇的对应度量相比较,来确定至少一个反常流簇,其中,所述至少一个第二流簇与在第二时间段期间从至少所述第一服务器和所述第一网络设备捕获的第二遥测相关联。
2.根据权利要求1所述的方法,还包括:
确定所述相似性阈值以生成多个集群。
3.根据权利要求1所述的方法,还包括:
执行机器学习进程以确定所述相似性度量。
4.根据权利要求3所述的方法,还包括:
接收针对所述反常流簇的分类;以及
使用所述分类来更新所述机器学习进程。
5.根据权利要求1至4中的任一项所述的方法,还包括:
通过跟踪从所述第一服务器到所述第一网络设备的所述至少一个流,来确定所述第一多个流簇中的第一流簇。
6.根据权利要求1至4中的任一项所述的方法,还包括:
通过跟踪对所述网络的一个或多个第二服务器的一个或多个子请求和子响应,来确定所述第一多个流簇中的第一流簇。
7.根据权利要求1至4中的任一项所述的方法,还包括:
确定与所述第一服务器相关联的第一定位;并且
确定第二定位,所述第二定位减小所述网络中与所述至少一个反常流簇相关联的第二服务器与所述第一服务器之间的距离。
8.根据权利要求7所述的方法,还包括:
将所述第一服务器从所述第一定位迁移到所述第二定位。
9.根据权利要求1至4中的任一项所述的方法,还包括:
将所述基线度量确定为包括用于将所述第一流簇发送到所述第一网络设备的时间和由所述第一网络设备对所述第一流簇的处理时间的和。
10.根据权利要求1至4中的任一项所述的方法,还包括:
将所述基线度量确定为以下各项中的至少一项:用于所述第一服务器生成对所述网络的第二服务器的至少一个子请求的时间、用于将所述至少一个子请求从所述第一服务器发送到所述第二服务器的时间、用于由所述第二服务器处理所述至少一个子请求的时间、用于由所述第二服务器生成子响应的时间、或用于将所述至少一个子响应从所述第二服务器发送到所述第一服务器的时间。
11.一种用于确定反常流簇的系统,所述系统包括:
处理器;以及
存储器,所述存储器包括指令,所述指令在被所述处理器执行时,使所述系统:
在第一时间段期间从网络的至少第一服务器和第一网络设备捕获第一遥测;
通过级联服务器特征和进程特征来确定与所述第一遥测相关联的应用依赖图的多个节点;
基于所述第一遥测来确定所述应用依赖图的多个边缘,所述第一遥测包括指示所述多个节点中的节点对之间的一个或多个流的流信息;
针对所述多个节点中的第一节点确定第一特征向量;
基于所述第一特征向量与所述多个节点中的第二节点的第二特征向量之间的相似性度量满足相似性阈值,来确定包括所述第一节点和所述第二节点的集群;
基于所述应用依赖图来针对由所述第一服务器生成并且将所述第一网络设备作为一跳来包括的至少一个流,确定第一多个流簇;
针对所述第一多个流簇中的至少一个第一流簇,确定基线度量;并且
通过将所述基线度量与至少一个第二流簇的对应度量相比较,来确定至少一个反常流簇,所述至少一个第二流簇与在第二时间段期间从至少所述第一服务器和所述第一网络设备捕获的第二遥测相关联。
12.根据权利要求11所述的系统,其中,所述指令在被执行时进一步使所述系统:
以线路速率从嵌入在所述第一网络设备的专用集成电路ASIC中的硬件传感器捕获所述第一遥测的至少一部分。
13.根据权利要求11或12所述的系统,其中,所述指令在被执行时进一步使所述系统:
从驻留在所述网络的裸机服务器内的软件传感器捕获所述第一遥测的至少一部分。
14.根据权利要求11或12所述的系统,其中,所述指令在被执行时进一步使所述系统:
从驻留在所述网络的同一物理服务器的多个虚拟实体内的多个软件传感器捕获所述第一遥测的至少一部分。
15.一种具有指令的非暂态计算机可读介质,所述指令在被处理器执行时,使所述处理器:
在第一时间段期间从网络的至少第一服务器和第一网络设备捕获第一遥测;
通过级联服务器特征和进程特征来确定与所述第一遥测相关联的应用依赖图的多个节点;
基于所述第一遥测来确定所述应用依赖图的多个边缘,所述第一遥测包括指示所述多个节点中的节点对之间的一个或多个流的流信息;
针对所述多个节点中的第一节点确定第一特征向量;
基于所述第一特征向量与所述多个节点中的第二节点的第二特征向量之间的相似性度量满足相似性阈值,来确定包括所述第一节点和所述第二节点的集群;
基于所述应用依赖图来针对由所述第一服务器生成并且将所述第一网络设备作为一跳来包括的至少一个流,确定第一多个流簇;
针对所述第一多个流簇中的至少一个第一流簇,确定基线度量;并且
通过将所述基线度量与至少一个第二流簇的对应度量相比较,来确定至少一个反常流簇,所述至少一个第二流簇与在第二时间段期间从至少所述第一服务器和所述第一网络设备捕获的第二遥测相关联。
16.根据权利要求15所述的非暂态计算机可读介质,其中,所述指令进一步使所述处理器:
执行机器学习进程以确定所述相似性度量;
接收针对所述反常流簇的分类;并且
使用所述分类来更新所述机器学习进程。
17.根据权利要求15至16中的任一项所述的非暂态计算机可读介质,其中,所述指令进一步使所述处理器:
通过跟踪从所述第一服务器到所述第一网络设备的所述至少一个流来确定所述第一多个流簇中的第一流簇;并且
通过跟踪对所述网络的一个或多个第二服务器的一个或多个子请求和子响应来确定所述第一多个流簇中的第二流簇。
CN201880021765.XA 2017-03-28 2018-03-28 用于应用性能监视和管理的流簇解析 Active CN110521171B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US15/471,183 2017-03-28
US15/471,183 US10873794B2 (en) 2017-03-28 2017-03-28 Flowlet resolution for application performance monitoring and management
PCT/US2018/024730 WO2018183422A1 (en) 2017-03-28 2018-03-28 Flowlet resolution for application performance monitoring and management

Publications (2)

Publication Number Publication Date
CN110521171A CN110521171A (zh) 2019-11-29
CN110521171B true CN110521171B (zh) 2023-03-24

Family

ID=63671057

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880021765.XA Active CN110521171B (zh) 2017-03-28 2018-03-28 用于应用性能监视和管理的流簇解析

Country Status (4)

Country Link
US (4) US10873794B2 (zh)
EP (1) EP3602968A1 (zh)
CN (1) CN110521171B (zh)
WO (1) WO2018183422A1 (zh)

Families Citing this family (86)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10454714B2 (en) 2013-07-10 2019-10-22 Nicira, Inc. Method and system of overlay flow control
US10135789B2 (en) 2015-04-13 2018-11-20 Nicira, Inc. Method and system of establishing a virtual private network in a cloud service for branch networking
US10498652B2 (en) 2015-04-13 2019-12-03 Nicira, Inc. Method and system of application-aware routing with crowdsourcing
US20180219765A1 (en) 2017-01-31 2018-08-02 Waltz Networks Method and Apparatus for Network Traffic Control Optimization
US10992568B2 (en) 2017-01-31 2021-04-27 Vmware, Inc. High performance software-defined core network
US11706127B2 (en) 2017-01-31 2023-07-18 Vmware, Inc. High performance software-defined core network
US20200036624A1 (en) 2017-01-31 2020-01-30 The Mode Group High performance software-defined core network
US10778528B2 (en) 2017-02-11 2020-09-15 Nicira, Inc. Method and system of connecting to a multipath hub in a cluster
US10523539B2 (en) 2017-06-22 2019-12-31 Nicira, Inc. Method and system of resiliency in cloud-delivered SD-WAN
US10885393B1 (en) * 2017-09-28 2021-01-05 Architecture Technology Corporation Scalable incident-response and forensics toolkit
US10778466B2 (en) 2017-10-02 2020-09-15 Vmware, Inc. Processing data messages of a virtual network that are sent to and received from external service machines
US10999100B2 (en) 2017-10-02 2021-05-04 Vmware, Inc. Identifying multiple nodes in a virtual network defined over a set of public clouds to connect to an external SAAS provider
US11115480B2 (en) 2017-10-02 2021-09-07 Vmware, Inc. Layer four optimization for a virtual network defined over public cloud
US11223514B2 (en) 2017-11-09 2022-01-11 Nicira, Inc. Method and system of a dynamic high-availability mode based on current wide area network connectivity
US10944723B2 (en) * 2017-11-17 2021-03-09 ShieldX Networks, Inc. Systems and methods for managing endpoints and security policies in a networked environment
US10671621B2 (en) * 2017-12-08 2020-06-02 Microsoft Technology Licensing, Llc Predictive scaling for cloud applications
US10789158B2 (en) * 2018-03-21 2020-09-29 Sap Se Adaptive monitoring of applications
US10951693B2 (en) 2018-04-02 2021-03-16 T-Mobile Usa, Inc. Data prioritization and scheduling system
US10834181B2 (en) * 2018-04-02 2020-11-10 T-Mobile Usa, Inc. Load balancing and data prioritization system
US11483313B2 (en) * 2018-06-28 2022-10-25 Intel Corporation Technologies for updating an access control list table without causing disruption
US10887329B2 (en) * 2018-07-26 2021-01-05 A10 Networks, Inc. Cluster-based precision mitigation of network attacks
JP6992697B2 (ja) * 2018-07-27 2022-01-13 日本電信電話株式会社 ネットワークシステム、情報取得装置、情報取得方法およびプログラム
US11165694B2 (en) * 2018-07-31 2021-11-02 Mcafee, Llc Methods, systems, articles of manufacture and apparatus to identify applications
WO2020047426A1 (en) 2018-08-30 2020-03-05 Rigetti & Co, Inc. Low-latency, high-performance hybrid computing
JP7348797B2 (ja) * 2018-11-09 2023-09-21 日本放送協会 パケットフロー監視装置
US10467360B1 (en) * 2019-01-02 2019-11-05 Fmr Llc System and method for dynamically determining availability of a computing resource
US10665251B1 (en) * 2019-02-27 2020-05-26 International Business Machines Corporation Multi-modal anomaly detection
US11489613B2 (en) * 2019-05-14 2022-11-01 Infinera Corporation Out-of-band communication channel for subcarrier-based optical communication systems
US10915428B2 (en) 2019-06-27 2021-02-09 Capital One Services, Llc Intelligent services and training agent for application dependency discovery, reporting, and management tool
US10521235B1 (en) 2019-06-27 2019-12-31 Capital One Services, Llc Determining problem dependencies in application dependency discovery, reporting, and management tool
US10747544B1 (en) 2019-06-27 2020-08-18 Capital One Services, Llc Dependency analyzer in application dependency discovery, reporting, and management tool
US11093378B2 (en) 2019-06-27 2021-08-17 Capital One Services, Llc Testing agent for application dependency discovery, reporting, and management tool
US11354222B2 (en) * 2019-06-27 2022-06-07 Capital One Services, Llc Discovery crawler for application dependency discovery, reporting, and management tool
US10642719B1 (en) 2019-06-27 2020-05-05 Capital One Services, Llc Intelligent services for application dependency discovery, reporting, and management tool
US11379292B2 (en) * 2019-06-27 2022-07-05 Capital One Services, Llc Baseline modeling for application dependency discovery, reporting, and management tool
TWI714184B (zh) * 2019-07-25 2020-12-21 中華電信股份有限公司 多階層網路樣式比對方法
US11121985B2 (en) 2019-08-27 2021-09-14 Vmware, Inc. Defining different public cloud virtual networks for different entities based on different sets of measurements
US11063833B2 (en) 2019-09-23 2021-07-13 Capital One Services, Llc Dependency tracking using application layer and network layer information
US11611507B2 (en) 2019-10-28 2023-03-21 Vmware, Inc. Managing forwarding elements at edge nodes connected to a virtual network
US11134023B2 (en) 2019-10-28 2021-09-28 Microsoft Technology Licensing, Llc Network path redirection
US20210126847A1 (en) * 2019-10-29 2021-04-29 Microsoft Technology Licensing, Llc Repository for telemetry data
CN112887119B (zh) * 2019-11-30 2022-09-16 华为技术有限公司 故障根因确定方法及装置、计算机存储介质
CN111010313B (zh) * 2019-12-05 2021-03-19 深圳联想懂的通信有限公司 一种批量处理的状态监控方法、服务器及存储介质
US11489783B2 (en) 2019-12-12 2022-11-01 Vmware, Inc. Performing deep packet inspection in a software defined wide area network
US11394640B2 (en) 2019-12-12 2022-07-19 Vmware, Inc. Collecting and analyzing data regarding flows associated with DPI parameters
US11438789B2 (en) 2020-01-24 2022-09-06 Vmware, Inc. Computing and using different path quality metrics for different service classes
US11233704B2 (en) 2020-01-29 2022-01-25 Salesforce.Com, Inc. Machine learning based end to end system for tcp optimization
US11271840B2 (en) 2020-01-29 2022-03-08 Salesforce.Com, Inc. Estimation of network quality metrics from network request data
US11824876B2 (en) 2020-01-31 2023-11-21 Extreme Networks, Inc. Online anomaly detection of vector embeddings
US11128540B1 (en) * 2020-02-13 2021-09-21 Sprint Communications Company L.P. Augmented reality electronic equipment maintenance user interface
CN111459775B (zh) * 2020-02-21 2023-08-08 北京数立得科技有限公司 Web系统功能评估方法、装置、电子设备及可读存储介质
US11165721B1 (en) * 2020-04-09 2021-11-02 Arista Networks, Inc. Reprogramming multicast replication using real-time buffer feedback
US11245641B2 (en) 2020-07-02 2022-02-08 Vmware, Inc. Methods and apparatus for application aware hub clustering techniques for a hyper scale SD-WAN
US11533243B2 (en) * 2020-07-16 2022-12-20 Citrix Systems, Inc. Method for computing environment specific baselines for metrics of user experience
CN111831340B (zh) * 2020-07-20 2024-03-05 北京简单一点科技有限公司 一种持续集成多流水线编排方法
US11272007B2 (en) * 2020-07-21 2022-03-08 Servicenow, Inc. Unified agent framework including push-based discovery and real-time diagnostics features
US11709710B2 (en) 2020-07-30 2023-07-25 Vmware, Inc. Memory allocator for I/O operations
CN112269660B (zh) * 2020-10-28 2023-04-11 浙江纺织服装职业技术学院 一种海量数据处理并发任务自适应测控方法及系统
US11575591B2 (en) 2020-11-17 2023-02-07 Vmware, Inc. Autonomous distributed forwarding plane traceability based anomaly detection in application traffic for hyper-scale SD-WAN
US11880347B2 (en) * 2020-11-23 2024-01-23 Microsoft Technology Licensing, Llc. Tuning large data infrastructures
US11575600B2 (en) 2020-11-24 2023-02-07 Vmware, Inc. Tunnel-less SD-WAN
CN112445863B (zh) * 2020-11-30 2024-06-18 永辉云金科技有限公司 一种数据实时同步方法及系统
US11929903B2 (en) 2020-12-29 2024-03-12 VMware LLC Emulating packet flows to assess network links for SD-WAN
CN116783874A (zh) 2021-01-18 2023-09-19 Vm维尔股份有限公司 网络感知的负载平衡
US11418586B2 (en) 2021-01-19 2022-08-16 Servicenow, Inc. Load balancing of discovery agents across proxy servers
US11979325B2 (en) 2021-01-28 2024-05-07 VMware LLC Dynamic SD-WAN hub cluster scaling with machine learning
US11509571B1 (en) 2021-05-03 2022-11-22 Vmware, Inc. Cost-based routing mesh for facilitating routing through an SD-WAN
US12009987B2 (en) 2021-05-03 2024-06-11 VMware LLC Methods to support dynamic transit paths through hub clustering across branches in SD-WAN
US11729065B2 (en) 2021-05-06 2023-08-15 Vmware, Inc. Methods for application defined virtual network service among multiple transport in SD-WAN
US11757888B2 (en) 2021-06-15 2023-09-12 Fortinet, Inc. Systems and methods for fine grained forward testing for a ZTNA environment
US12015536B2 (en) 2021-06-18 2024-06-18 VMware LLC Method and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics of types of resource elements in the public clouds
US11489720B1 (en) 2021-06-18 2022-11-01 Vmware, Inc. Method and apparatus to evaluate resource elements and public clouds for deploying tenant deployable elements based on harvested performance metrics
US12047282B2 (en) 2021-07-22 2024-07-23 VMware LLC Methods for smart bandwidth aggregation based dynamic overlay selection among preferred exits in SD-WAN
US11943146B2 (en) 2021-10-01 2024-03-26 VMware LLC Traffic prioritization in SD-WAN
US12088610B2 (en) * 2021-10-27 2024-09-10 Hewlett Packard Enterprise Development Lp Platform for privacy preserving decentralized learning and network event monitoring
WO2023079757A1 (ja) * 2021-11-08 2023-05-11 日本電信電話株式会社 分析装置、分析方法及び分析プログラム
US12088465B2 (en) * 2022-01-11 2024-09-10 Pensando Systems Inc. Methods and systems for upgrading a control plane and a data plane of a network appliance
US11627061B1 (en) * 2022-02-24 2023-04-11 Microsoft Technology Licensing, Llc Packet capture using VXLAN encapsulation
US20230308470A1 (en) * 2022-03-25 2023-09-28 Cisco Technology, Inc. Systems and Methods for Deriving Application Security Signals from Application Performance Data
US11909815B2 (en) 2022-06-06 2024-02-20 VMware LLC Routing based on geolocation costs
US11743280B1 (en) * 2022-07-29 2023-08-29 Intuit Inc. Identifying clusters with anomaly detection
US20240064079A1 (en) * 2022-08-17 2024-02-22 Cisco Technology, Inc. Diagnosing poor application experience in hybrid work environments
US12068907B1 (en) * 2023-01-31 2024-08-20 PagerDuty, Inc. Service dependencies based on relationship network graph
US12034587B1 (en) 2023-03-27 2024-07-09 VMware LLC Identifying and remediating anomalies in a self-healing network
US12057993B1 (en) 2023-03-27 2024-08-06 VMware LLC Identifying and remediating anomalies in a self-healing network
CN118573598A (zh) * 2024-07-30 2024-08-30 国家计算机网络与信息安全管理中心 一种多出口环境下异常flow日志的识别和纠正方法及系统

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105847069A (zh) * 2012-06-06 2016-08-10 瞻博网络公司 针对虚拟网络分组流的物理路径确定

Family Cites Families (645)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5086385A (en) 1989-01-31 1992-02-04 Custom Command Systems Expandable home automation system
US5400246A (en) 1989-05-09 1995-03-21 Ansan Industries, Ltd. Peripheral data acquisition, monitor, and adaptive control system via personal computer
DE69132280T2 (de) 1990-09-17 2001-01-18 Cabletron Systems, Inc. System und Verfahren zur Modellierung eines Computer-Netzwerks
US5319754A (en) 1991-10-03 1994-06-07 Compaq Computer Corporation Data transfer system between a computer and a host adapter using multiple arrays
US6850252B1 (en) 1999-10-05 2005-02-01 Steven M. Hoffberg Intelligent electronic appliance system and method
EP0592079A2 (en) 1992-09-20 1994-04-13 Sun Microsystems, Inc. Automated software installation and operating environment configuration on a computer system
US5742829A (en) 1995-03-10 1998-04-21 Microsoft Corporation Automatic software installation on heterogeneous networked client computer systems
IT1285179B1 (it) 1995-04-24 1998-06-03 Motorola Inc Procedimento ed apparecchio di controllo di indirizzamento sensibile per sistemi di comunicazioni.
US5726644A (en) 1995-06-30 1998-03-10 Philips Electronics North America Corporation Lighting control system with packet hopping communication
US5822731A (en) 1995-09-15 1998-10-13 Infonautics Corporation Adjusting a hidden Markov model tagger for sentence fragments
US6249241B1 (en) 1995-09-21 2001-06-19 The United States Of America As Represented By The Secretary Of The Navy Marine vessel traffic system
US5831848A (en) 1995-11-17 1998-11-03 Phoenix Controls Corporation Distributed environmental process control system
US6151643A (en) 1996-06-07 2000-11-21 Networks Associates, Inc. Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer
US6144962A (en) 1996-10-15 2000-11-07 Mercury Interactive Corporation Visualization of web sites and hierarchical data structures
US6085243A (en) 1996-12-13 2000-07-04 3Com Corporation Distributed remote management (dRMON) for networks
US5964841A (en) 1997-03-03 1999-10-12 Cisco Technology, Inc. Technique for handling forwarding transients with link state routing protocol
US6247058B1 (en) 1998-03-30 2001-06-12 Hewlett-Packard Company Method and apparatus for processing network packets using time stamps
US6141595A (en) 1998-04-03 2000-10-31 Johnson Controls Technology Company Common object architecture supporting application-centric building automation systems
US6012096A (en) 1998-04-23 2000-01-04 Microsoft Corporation Method and system for peer-to-peer network latency measurement
US6185566B1 (en) 1998-05-05 2001-02-06 Robert A. Adams Network management system having an embedded network database
WO1999059059A1 (en) 1998-05-13 1999-11-18 Glaxo Group Limited Remote installation of computer operating systems
US6157955A (en) 1998-06-15 2000-12-05 Intel Corporation Packet processing system including a policy engine having a classification unit
US6353775B1 (en) 1998-07-28 2002-03-05 Honeywell International Inc. Multiple instance single value identifiers environmental control communication method and system
US6628304B2 (en) 1998-12-09 2003-09-30 Cisco Technology, Inc. Method and apparatus providing a graphical user interface for representing and navigating hierarchical networks
US6330562B1 (en) 1999-01-29 2001-12-11 International Business Machines Corporation System and method for managing security objects
US20070162420A1 (en) 2004-01-21 2007-07-12 Oracle International Corporation Techniques for automatically discovering a database device on a network
US6484315B1 (en) 1999-02-01 2002-11-19 Cisco Technology, Inc. Method and system for dynamically distributing updates in a network
US6239699B1 (en) 1999-03-03 2001-05-29 Lucent Technologies Inc. Intelligent alarm filtering in a telecommunications network
US8272875B1 (en) 1999-03-09 2012-09-25 Realityworks, Inc. Educational device for simulating addictive behavior and method of using
US6546420B1 (en) 1999-03-31 2003-04-08 Cisco Technology, Inc. Aggregating information about network message flows
US6801878B1 (en) 1999-04-08 2004-10-05 George Mason University System and method for managing sensors of a system
US8179809B1 (en) 1999-08-23 2012-05-15 Oracle America, Inc. Approach for allocating resources to an apparatus based on suspendable resource requirements
US6611896B1 (en) 1999-08-25 2003-08-26 Emc Corporation Dynamic mirror service policy with seek adjustment in a non-physical mirrored storage environment
US6848106B1 (en) 1999-10-05 2005-01-25 Veritas Operating Corporation Snapshot restore of application chains and applications
US7797367B1 (en) 1999-10-06 2010-09-14 Gelvin David C Apparatus for compact internetworked wireless integrated network sensors (WINS)
US6728779B1 (en) 1999-12-01 2004-04-27 Lucent Technologies Inc. Method and apparatus for exchanging routing information in a packet-based data network
GB2357390B (en) 1999-12-16 2002-09-25 3Com Corp Ethernet units adapted for loop configuration and method of operating same
US7203740B1 (en) 1999-12-22 2007-04-10 Intel Corporation Method and apparatus for allowing proprietary forwarding elements to interoperate with standard control elements in an open architecture for network devices
US6871284B2 (en) 2000-01-07 2005-03-22 Securify, Inc. Credential/condition assertion verification optimization
US7120934B2 (en) 2000-03-30 2006-10-10 Ishikawa Mark M System, method and apparatus for detecting, identifying and responding to fraudulent requests on a network
EP1146766A1 (en) 2000-04-11 2001-10-17 Alcatel Connection control module
US7024468B1 (en) 2000-04-27 2006-04-04 Hewlett-Packard Development Company, L.P. Internet usage data recording system and method with configurable data collector system
US6925490B1 (en) 2000-05-31 2005-08-02 International Business Machines Corporation Method, system and program products for controlling system traffic of a clustered computing environment
US6847993B1 (en) 2000-05-31 2005-01-25 International Business Machines Corporation Method, system and program products for managing cluster configurations
US6816461B1 (en) 2000-06-16 2004-11-09 Ciena Corporation Method of controlling a network element to aggregate alarms and faults of a communications network
US7693976B2 (en) 2000-07-11 2010-04-06 Ciena Corporation Granular management of network resources
US20020103793A1 (en) 2000-08-02 2002-08-01 Daphne Koller Method and apparatus for learning probabilistic relational models having attribute and link uncertainty and for performing selectivity estimation using probabilistic relational models
US7181769B1 (en) 2000-08-25 2007-02-20 Ncircle Network Security, Inc. Network security system having a device profiler communicatively coupled to a traffic monitor
US6745011B1 (en) * 2000-09-01 2004-06-01 Telephia, Inc. System and method for measuring wireless device and network usage and performance metrics
US8010469B2 (en) 2000-09-25 2011-08-30 Crossbeam Systems, Inc. Systems and methods for processing data flows
US9800608B2 (en) 2000-09-25 2017-10-24 Symantec Corporation Processing data flows with a data flow processor
US7080161B2 (en) 2000-10-17 2006-07-18 Avaya Technology Corp. Routing information exchange
US20030097439A1 (en) 2000-10-23 2003-05-22 Strayer William Timothy Systems and methods for identifying anomalies in network data streams
US8875116B2 (en) 2000-11-17 2014-10-28 Hewlett-Packard Development Company, L.P. Network for updating firmware and / or software in wireless communication devices
US7133923B2 (en) 2000-12-11 2006-11-07 Acme Packet, Inc. System and method for assisting in controlling real-time transport protocol flow through multiple networks via screening
US6973023B1 (en) 2000-12-30 2005-12-06 Cisco Technology, Inc. Method for routing information over a network employing centralized control
US7065569B2 (en) 2001-01-09 2006-06-20 Turin Networks, Inc. System and method for remote traffic management in a communication network
US20040213221A1 (en) 2001-01-16 2004-10-28 Seyhan Civanlar System and method for soft bandwidth
US6938122B2 (en) 2001-01-23 2005-08-30 Emc Corporation Remote mirroring in a switched environment
US7444404B2 (en) 2001-02-05 2008-10-28 Arbor Networks, Inc. Network traffic regulation including consistency based detection and filtering of packets with spoof source addresses
FI20010596A0 (fi) 2001-03-22 2001-03-22 Ssh Comm Security Oyj Turvallisuusjärjestelmä tietoliikenneverkkoa varten
US7139242B2 (en) 2001-03-28 2006-11-21 Proficient Networks, Inc. Methods, apparatuses and systems facilitating deployment, support and configuration of network routing policies
US7096273B1 (en) 2001-04-25 2006-08-22 Cisco Technology, Inc. DHCP over mobile IP
US20030023601A1 (en) 2001-05-08 2003-01-30 Fortier Joseph W. System and method for intercommunication among disparate communication networks
US6738933B2 (en) 2001-05-09 2004-05-18 Mercury Interactive Corporation Root cause analysis of server system performance degradations
US6525658B2 (en) 2001-06-11 2003-02-25 Ensco, Inc. Method and device for event detection utilizing data from a multiplicity of sensor sources
US7162643B1 (en) 2001-06-15 2007-01-09 Informatica Corporation Method and system for providing transfer of analytic application data over a network
WO2003003210A2 (en) 2001-06-27 2003-01-09 Arbor Networks Method and system for monitoring control signal traffic over a computer network
US6958998B2 (en) 2001-07-09 2005-10-25 International Business Machines Corporation Traffic management in packet-based networks
US7096368B2 (en) 2001-08-01 2006-08-22 Mcafee, Inc. Platform abstraction layer for a wireless malware scanning engine
US9836424B2 (en) 2001-08-24 2017-12-05 Intel Corporation General input/output architecture, protocol and related methods to implement flow control
US7111055B2 (en) 2001-08-30 2006-09-19 Sun Microsystems, Inc. Method and apparatus to facilitate automated software installation on remote computers over a network
US7633942B2 (en) 2001-10-15 2009-12-15 Avaya Inc. Network traffic generation and monitoring systems and methods for their use in testing frameworks for determining suitability of a network for target applications
EP1442372B1 (en) 2001-11-07 2015-03-04 Sap Se Providing isolation through process attachable virtual machines
US7603440B1 (en) 2001-11-09 2009-10-13 Persystent Technology Corporation System and method for management of end user computing devices
US7437762B2 (en) 2001-11-29 2008-10-14 International Business Machines Corporation Method, computer program element and a system for processing alarms triggered by a monitoring system
US6996817B2 (en) 2001-12-12 2006-02-07 Valve Corporation Method and system for upgrading and rolling back versions
US20030126242A1 (en) 2001-12-28 2003-07-03 Chang Albert H. Network boot system and method using remotely-stored, client-specific boot images created from shared, base snapshot image
US20030151513A1 (en) 2002-01-10 2003-08-14 Falk Herrmann Self-organizing hierarchical wireless network for surveillance and control
JP3963728B2 (ja) 2002-01-22 2007-08-22 富士通株式会社 スパニングツリーのバイパス方法および装置
US7743415B2 (en) 2002-01-31 2010-06-22 Riverbed Technology, Inc. Denial of service attacks characterization
US7349761B1 (en) 2002-02-07 2008-03-25 Cruse Mike B System and method for distributed facility management and operational control
US8370936B2 (en) 2002-02-08 2013-02-05 Juniper Networks, Inc. Multi-method gateway-based network security systems and methods
US7693947B2 (en) 2002-03-08 2010-04-06 Mcafee, Inc. Systems and methods for graphically displaying messaging traffic
US7346672B2 (en) 2002-03-12 2008-03-18 Hewlett-Packard Development Company, L.P. Automatic TFTP firmware download
US20040243533A1 (en) 2002-04-08 2004-12-02 Wsi Corporation Method for interactively creating real-time visualizations of traffic information
US7747729B2 (en) 2002-06-14 2010-06-29 Hanoch Levy Determining client latencies over a network
EP1383261A1 (en) 2002-07-15 2004-01-21 Alcatel Protection method and system for traffic of different service classes
US7337206B1 (en) 2002-07-15 2008-02-26 Network Physics Method for detecting congestion in internet traffic
JP2004056604A (ja) 2002-07-23 2004-02-19 Fujitsu Ltd ネットワーク運用監視装置
US6983323B2 (en) 2002-08-12 2006-01-03 Tippingpoint Technologies, Inc. Multi-level packet screening with dynamically selected filtering criteria
US20040039728A1 (en) * 2002-08-23 2004-02-26 Diring Software Method and system for monitoring distributed systems
US7185103B1 (en) 2002-09-10 2007-02-27 Juniper Networks, Inc. Rate-controlled transmission of traffic flow information
US7370092B2 (en) 2002-09-12 2008-05-06 Computer Sciences Corporation System and method for enhanced software updating and revision
US8407798B1 (en) 2002-10-01 2013-03-26 Skybox Secutiry Inc. Method for simulation aided security event management
US8191136B2 (en) 2002-11-04 2012-05-29 Riverbed Technology, Inc. Connection based denial of service detection
US7340674B2 (en) 2002-12-16 2008-03-04 Xerox Corporation Method and apparatus for normalizing quoting styles in electronic mail messages
US9818136B1 (en) 2003-02-05 2017-11-14 Steven M. Hoffberg System and method for determining contingent relevance
EP1450511A1 (en) 2003-02-18 2004-08-25 Alcatel Device and method for simulating network traffic treatments of a network using policy rules
WO2004084471A2 (en) 2003-03-19 2004-09-30 Home Data Source, Llc Relative timing mechanism for event sequencing without clock synchronization
US7360072B1 (en) 2003-03-28 2008-04-15 Cisco Technology, Inc. iSCSI system OS boot configuration modification
US8171551B2 (en) 2003-04-01 2012-05-01 Mcafee, Inc. Malware detection using external call characteristics
US7895649B1 (en) 2003-04-04 2011-02-22 Raytheon Company Dynamic rule generation for an enterprise intrusion detection system
US8209680B1 (en) 2003-04-11 2012-06-26 Vmware, Inc. System and method for disk imaging on diverse computers
US7317693B1 (en) 2003-05-12 2008-01-08 Sourcefire, Inc. Systems and methods for determining the network topology of a network
US7281126B2 (en) 2003-05-30 2007-10-09 Sun Microsystems, Inc. Method of installing an image on a client over a network securely using a wanboot binary and a kernel to install the image
US7420931B2 (en) 2003-06-05 2008-09-02 Nvidia Corporation Using TCP/IP offload to accelerate packet filtering
US7827602B2 (en) 2003-06-30 2010-11-02 At&T Intellectual Property I, L.P. Network firewall host application identification and authentication
US8296847B2 (en) 2003-07-25 2012-10-23 Hewlett-Packard Development Company, L.P. Method of managing utilization of network intrusion detection systems in a dynamic data center
US7266754B2 (en) 2003-08-14 2007-09-04 Cisco Technology, Inc. Detecting network denial of service attacks
US7568107B1 (en) 2003-08-20 2009-07-28 Extreme Networks, Inc. Method and system for auto discovery of authenticator for network login
US7522596B2 (en) 2003-08-25 2009-04-21 Alcatel Lucent Enhanced DVMRP for destination-based forwarding of multicast data
US7483384B2 (en) 2003-09-22 2009-01-27 Hewlett-Packard Development Company, L.P. System and method for monitoring network traffic
US20050182681A1 (en) 2003-09-25 2005-08-18 Bruskotter Thomas P. Money dispensing system
JPWO2005034446A1 (ja) 2003-10-03 2006-12-14 富士通株式会社 ポリシールール適用ネットワークシステム
US20050177829A1 (en) 2003-10-10 2005-08-11 Vipul Vishwanath Method of applying constraints against discovered attributes in provisioning computers
US20050198629A1 (en) 2003-10-10 2005-09-08 Vipul Vishwanath Method and system for provisioning servers based on a policy and rule hierarchy
US8560671B1 (en) 2003-10-23 2013-10-15 Netapp, Inc. Systems and methods for path-based management of virtual servers in storage network environments
US20050108331A1 (en) 2003-10-31 2005-05-19 Osterman Lawrence W. Presence tracking for datagram based protocols with search
US7885197B2 (en) 2003-11-17 2011-02-08 Intel Corporation System and method for measuring per node packet loss in a wireless network
US7802084B2 (en) 2003-11-26 2010-09-21 Hewlett-Packard Development Company, L.P. System and method for management and installation of operating system images for computers
US7975035B2 (en) 2003-12-01 2011-07-05 International Business Machines Corporation Method and apparatus to support application and network awareness of collaborative applications using multi-attribute clustering
US7385605B2 (en) 2003-12-04 2008-06-10 International Business Machines Corporation Computer display system for dynamically modifying stacked area line graphs to change the order or presence of a set of stacked areas in the graph respectively representative of the proportions contributed to a total by each of a set of time dependent variables
US20050138157A1 (en) 2003-12-23 2005-06-23 Ken-Ju Jung Network device discovery system and method thereof
US7930540B2 (en) 2004-01-22 2011-04-19 Mcafee, Inc. Cryptographic policy enforcement
US8990430B2 (en) 2004-02-19 2015-03-24 Cisco Technology, Inc. Interface bundles in virtual network devices
AU2005215043A1 (en) 2004-02-19 2005-09-01 Georgia Tech Research Corporation Systems and methods for parallel communication
US7466681B2 (en) 2004-03-19 2008-12-16 Nortel Networks Limited Method and apparatus for sensor network routing
US8584239B2 (en) 2004-04-01 2013-11-12 Fireeye, Inc. Virtual machine with dynamic data flow analysis
US20050240799A1 (en) * 2004-04-10 2005-10-27 Manfredi Charles T Method of network qualification and testing
EP1589716A1 (en) 2004-04-20 2005-10-26 Ecole Polytechnique Fédérale de Lausanne (EPFL) Method of detecting anomalous behaviour in a computer network
US7484237B2 (en) 2004-05-13 2009-01-27 Hewlett-Packard Development Company, L.P. Method and apparatus for role-based security policy management
US7961637B2 (en) 2004-06-07 2011-06-14 Spirent Communications Of Rockville, Inc. Method and apparatus for monitoring latency, jitter, packet throughput and packet loss ratio between two points on a network
US20050289244A1 (en) 2004-06-28 2005-12-29 Himansu Sahu Method for service chaining in a communication network
KR100608821B1 (ko) 2004-07-22 2006-08-08 엘지전자 주식회사 휴대단말기의 왕복지연시간 측정장치 및 방법
WO2006012610A2 (en) 2004-07-23 2006-02-02 Citrix Systems, Inc. Systems and methods for optimizing communications between network nodes
CN1728715A (zh) * 2004-07-27 2006-02-01 邓里文 一种用于因特网与波分复用系统融合的适配方法
JP4529144B2 (ja) 2004-08-11 2010-08-25 日本電気株式会社 仮想lanシステムおよびノード装置
US8572734B2 (en) 2004-08-12 2013-10-29 Verizon Patent And Licensing Inc. Geographical intrusion response prioritization mapping through authentication and flight data correlation
US7475424B2 (en) 2004-09-02 2009-01-06 International Business Machines Corporation System and method for on-demand dynamic control of security policies/rules by a client computing device
US7490235B2 (en) 2004-10-08 2009-02-10 International Business Machines Corporation Offline analysis of packets
US7760653B2 (en) 2004-10-26 2010-07-20 Riverbed Technology, Inc. Stackable aggregation for connection based anomaly detection
US7644438B1 (en) 2004-10-27 2010-01-05 Arcsight, Inc. Security event aggregation at software agent
US7610375B2 (en) 2004-10-28 2009-10-27 Cisco Technology, Inc. Intrusion detection in a data center environment
US7681131B1 (en) 2004-11-10 2010-03-16 InternetPerils, Inc. Method and apparatus for aggregating, condensing, supersetting, and displaying network topology and performance data
US9489496B2 (en) 2004-11-12 2016-11-08 Apple Inc. Secure software updates
US7496575B2 (en) 2004-11-22 2009-02-24 Verdasys, Inc. Application instrumentation and monitoring
US9160755B2 (en) 2004-12-21 2015-10-13 Mcafee, Inc. Trusted communication network
US20060173912A1 (en) 2004-12-27 2006-08-03 Eric Lindvall Automated deployment of operating system and data space to a server
US7395195B2 (en) 2004-12-27 2008-07-01 Sap Aktiengesellschaft Sensor network modeling and deployment
US7398382B2 (en) 2004-12-29 2008-07-08 Intel Corporation Method and apparatus to enhance platform boot efficiency
US7657942B2 (en) 2005-01-11 2010-02-02 International Business Machines Corporation Method of assuring enterprise security standards compliance
US7729284B2 (en) 2005-01-19 2010-06-01 Emulex Design & Manufacturing Corporation Discovery and configuration of devices across an Ethernet interface
US7657536B2 (en) 2005-02-28 2010-02-02 International Business Machines Corporation Application of resource-dependent policies to managed resources in a distributed computing system
US7808897B1 (en) 2005-03-01 2010-10-05 International Business Machines Corporation Fast network security utilizing intrusion prevention systems
US8589530B2 (en) 2005-03-28 2013-11-19 Riverbed Technology, Inc. Method and system for managing a distributed network of network monitoring devices
US20060274659A1 (en) 2005-05-06 2006-12-07 Battelle Memorial Institute Method and system for generating synthetic digital network traffic
US20070097976A1 (en) 2005-05-20 2007-05-03 Wood George D Suspect traffic redirection
US20060272018A1 (en) 2005-05-27 2006-11-30 Mci, Inc. Method and apparatus for detecting denial of service attacks
US7609625B2 (en) 2005-07-06 2009-10-27 Fortinet, Inc. Systems and methods for detecting and preventing flooding attacks in a network environment
US7580351B2 (en) 2005-07-12 2009-08-25 Cisco Technology, Inc Dynamically controlling the rate and internal priority of packets destined for the control plane of a routing device
US7874001B2 (en) 2005-07-15 2011-01-18 Microsoft Corporation Detecting user-mode rootkits
US9871767B2 (en) 2005-07-18 2018-01-16 Mutualink, Inc. Enabling ad hoc trusted connections among enclaved communication communities
US7567805B2 (en) 2005-08-01 2009-07-28 Cisco Technology, Inc. Method and system for dynamic assignment of wireless LAN access point identity
KR100716620B1 (ko) 2005-08-17 2007-05-09 고려대학교 산학협력단 평행 좌표계를 이용한 네트워크 감시 장치 및 방법
US8429630B2 (en) 2005-09-15 2013-04-23 Ca, Inc. Globally distributed utility computing cloud
US8001610B1 (en) 2005-09-28 2011-08-16 Juniper Networks, Inc. Network defense system utilizing endpoint health indicators and user identity
US20110314148A1 (en) 2005-11-12 2011-12-22 LogRhythm Inc. Log collection, structuring and processing
US7930752B2 (en) 2005-11-18 2011-04-19 Nexthink S.A. Method for the detection and visualization of anomalous behaviors in a computer network
EP1788752A1 (en) 2005-11-21 2007-05-23 Alcatel Lucent Network node with control plane processor overload protection
US7600005B2 (en) 2005-11-23 2009-10-06 Sun Microsystems, Inc. Method and apparatus for provisioning heterogeneous operating systems onto heterogeneous hardware systems
WO2007070711A2 (en) 2005-12-15 2007-06-21 Malloy Patrick J Interactive network monitoring and analysis
KR100772394B1 (ko) 2006-02-09 2007-11-01 삼성전자주식회사 IPSec에서의 재전송 방지 윈도우 갱신 방법 및 장치
US20070195729A1 (en) 2006-02-17 2007-08-23 Hongbing Li System and method for self-configuring adaptive wireless router network
US7873025B2 (en) 2006-02-23 2011-01-18 Cisco Technology, Inc. Network device that determines application-level network latency by monitoring option values in a transport layer message
JP4634320B2 (ja) 2006-02-28 2011-02-16 株式会社日立製作所 対異常通信防御を行うための装置とネットワークシステム
US8266697B2 (en) 2006-03-04 2012-09-11 21St Century Technologies, Inc. Enabling network intrusion detection by representing network activity in graphical form utilizing distributed data sensors to detect and transmit activity data
US7546450B2 (en) 2006-03-07 2009-06-09 Sun Microsystems, Inc. Method and apparatus for operating system deployment
GB2435980A (en) 2006-03-09 2007-09-12 Agilent Technologies Inc Optimizing routing of demands in a network
US7530105B2 (en) 2006-03-21 2009-05-05 21St Century Technologies, Inc. Tactical and strategic attack detection and prediction
US7610330B1 (en) 2006-03-30 2009-10-27 Packeteer, Inc. Multi-dimensional computation distribution in a packet processing device having multiple processing architecture
US20070230415A1 (en) 2006-03-31 2007-10-04 Symbol Technologies, Inc. Methods and apparatus for cluster management using a common configuration file
KR20070099201A (ko) 2006-04-03 2007-10-09 삼성전자주식회사 휴대형 무선 기기의 보안 관리 방법 및 이를 이용한 보안관리 장치
US20080082662A1 (en) 2006-05-19 2008-04-03 Richard Dandliker Method and apparatus for controlling access to network resources based on reputation
US8966018B2 (en) 2006-05-19 2015-02-24 Trapeze Networks, Inc. Automated network device configuration and network deployment
US8429746B2 (en) 2006-05-22 2013-04-23 Neuraliq, Inc. Decoy network technology with automatic signature generation for intrusion detection and intrusion prevention systems
US7873074B1 (en) 2006-06-01 2011-01-18 Avaya Inc. Adaptive selection of bandwidth parameters to meet a service provider pricing model
US7592906B1 (en) 2006-06-05 2009-09-22 Juniper Networks, Inc. Network policy evaluation
US7783457B2 (en) 2006-06-15 2010-08-24 Oracle America, Inc. Sensor localization using lateral inhibition
KR100799302B1 (ko) 2006-06-21 2008-01-29 한국전자통신연구원 시스템 이벤트 정보를 이용한 은닉 프로세스 탐지 시스템및 방법
US8151337B2 (en) 2006-06-30 2012-04-03 Microsoft Corporation Applying firewalls to virtualized environments
US8365286B2 (en) 2006-06-30 2013-01-29 Sophos Plc Method and system for classification of software using characteristics and combinations of such characteristics
US8239915B1 (en) 2006-06-30 2012-08-07 Symantec Corporation Endpoint management using trust rating data
US7894434B2 (en) 2006-07-03 2011-02-22 Hewlett-Packard Development Company, L.P. Method, apparatus, and system for capturing traffic statistics between two sites of MPLS based VPN
US7748000B2 (en) 2006-07-27 2010-06-29 International Business Machines Corporation Filtering a list of available install items for an install program based on a consumer's install policy
JP4126707B2 (ja) 2006-07-28 2008-07-30 インターナショナル・ビジネス・マシーンズ・コーポレーション 情報システムの状態を解析する技術
US7788250B2 (en) 2006-08-04 2010-08-31 Mohammad Salman Flexible request and response communications interfaces
US7957934B2 (en) 2007-05-15 2011-06-07 Dynatrace Software Gmbh Method and system for processing application performance data ouside of monitored applications to limit overhead caused by monitoring
US8345561B2 (en) 2006-08-22 2013-01-01 Rueters America Inc. Time monitor
KR100793057B1 (ko) 2006-09-01 2008-01-10 한국전자통신연구원 이기종 센서 네트워크 기반의 정보 서비스 생성을 위한usn 미들웨어 장치 및 그 방법과, 그를 이용한 정보서비스 제공 시스템
US8056134B1 (en) 2006-09-10 2011-11-08 Ogilvie John W Malware detection and identification via malware spoofing
US9258203B1 (en) * 2006-09-29 2016-02-09 Amazon Technologies, Inc. Monitoring computer performance metrics utilizing baseline performance metric filtering
US8407164B2 (en) 2006-10-02 2013-03-26 The Trustees Of Columbia University In The City Of New York Data classification and hierarchical clustering
US7743242B2 (en) 2006-10-16 2010-06-22 Scalent Systems Inc. Method and system for automatic generation of operating system boot images
CN1937623A (zh) 2006-10-18 2007-03-28 华为技术有限公司 一种控制网络业务的方法及系统
US7768921B2 (en) 2006-10-30 2010-08-03 Juniper Networks, Inc. Identification of potential network threats using a distributed threshold random walk
US7774498B1 (en) 2006-11-06 2010-08-10 Cisco Technology, Inc. Methods and apparatus for trusted application centric QoS provisioning
US7861933B2 (en) 2006-11-06 2011-01-04 Ikan Technologies Inc. Methods and systems for network configuration
US8181248B2 (en) 2006-11-23 2012-05-15 Electronics And Telecommunications Research Institute System and method of detecting anomaly malicious code by using process behavior prediction technique
US8769120B2 (en) 2006-11-28 2014-07-01 Sap Ag Method and system to monitor parameters of a data flow path in a communication system
WO2008069439A1 (en) 2006-12-05 2008-06-12 Electronics And Telecommunications Research Institute Method for grouping sensor nodes in heterogeneous wireless sensor networks
US9280337B2 (en) 2006-12-18 2016-03-08 Adobe Systems Incorporated Secured distribution of software updates
US8312115B2 (en) 2006-12-21 2012-11-13 1E Limited Network booting apparatus and method
US8250657B1 (en) 2006-12-29 2012-08-21 Symantec Corporation Web site hygiene-based computer security
US8640086B2 (en) 2006-12-29 2014-01-28 Sap Ag Graphical user interface system and method for presenting objects
US7788477B1 (en) 2007-01-31 2010-08-31 Hewlett-Packard Development Company, L.P. Methods, apparatus and articles of manufacture to control operating system images for diskless servers
US8762951B1 (en) 2007-03-21 2014-06-24 Oracle America, Inc. Apparatus and method for profiling system events in a fine grain multi-threaded multi-core processor
US8572735B2 (en) 2007-03-29 2013-10-29 George Mason Research Foundation, Inc. Attack resistant continuous network service trustworthiness controller
US9083712B2 (en) 2007-04-04 2015-07-14 Sri International Method and apparatus for generating highly predictive blacklists
US8005935B2 (en) 2007-04-05 2011-08-23 International Business Machines Corporation Methods and computer program products for managing application performance on a network
US8706914B2 (en) 2007-04-23 2014-04-22 David D. Duchesneau Computing infrastructure
US9405585B2 (en) 2007-04-30 2016-08-02 International Business Machines Corporation Management of heterogeneous workloads
US8256003B2 (en) 2007-05-10 2012-08-28 Microsoft Corporation Real-time network malware protection
US8209738B2 (en) 2007-05-31 2012-06-26 The Board Of Trustees Of The University Of Illinois Analysis of distributed policy rule-sets for compliance with global policy
WO2008151321A2 (en) 2007-06-08 2008-12-11 The Trustees Of Columbia University In The City Of New York Systems, methods, and media for enforcing a security policy in a network including a plurality of components
CN101682443B (zh) 2007-06-14 2013-07-10 皇家飞利浦电子股份有限公司 供在网络中使用的网络装置
US7934248B1 (en) 2007-06-27 2011-04-26 Emc Corporation Network policy enforcement dashboard views
JP2009016906A (ja) 2007-06-29 2009-01-22 Toshiba Corp 情報処理装置、情報処理装置の再生方法
US9014047B2 (en) 2007-07-10 2015-04-21 Level 3 Communications, Llc System and method for aggregating and reporting network traffic data
US8645527B1 (en) 2007-07-25 2014-02-04 Xangati, Inc. Network monitoring using bounded memory data structures
KR100862971B1 (ko) 2007-07-26 2008-10-13 강릉대학교산학협력단 무선 센서 네트워크의 노드들에 대한 펌웨어 업데이트 방법
US8291495B1 (en) 2007-08-08 2012-10-16 Juniper Networks, Inc. Identifying applications for intrusion detection systems
US20090059934A1 (en) 2007-08-30 2009-03-05 Motorola, Inc. Method and device for providing a bridge in a network
US8613084B2 (en) 2007-09-18 2013-12-17 Mcafee, Inc. System, method, and computer program product for detecting at least potentially unwanted activity based on execution profile monitoring
DE602007003733D1 (de) 2007-09-28 2010-01-21 Zimory Gmbh Verfahren und System zur automatischen Remote-Bereitstellung eines Servers über virtuelle Geräteanwendungen
US8248928B1 (en) 2007-10-09 2012-08-21 Foundry Networks, Llc Monitoring server load balancing
US8442073B2 (en) 2007-10-25 2013-05-14 Siemens Aktiengesellschaft Method and an apparatus for analyzing a communication network
KR101394338B1 (ko) 2007-10-31 2014-05-30 삼성전자주식회사 무선 센서 네트워크의 토폴로지 정보 표시 방법 및 장치 및이를 위한 시스템
US8305896B2 (en) 2007-10-31 2012-11-06 Cisco Technology, Inc. Selective performance enhancement of traffic flows
KR100938672B1 (ko) 2007-11-20 2010-01-25 한국전자통신연구원 악성 코드에 의해 삽입된 동적 연결 라이브러리 검출 장치 및 방법
KR100974888B1 (ko) 2007-11-26 2010-08-11 한국전자통신연구원 비정상 트래픽 탐지 장치 및 방법
US7970946B1 (en) 2007-11-27 2011-06-28 Google Inc. Recording and serializing events
US8775577B1 (en) 2007-12-18 2014-07-08 Amazon Technologies, Inc. System and method for configuration management service
US20090168648A1 (en) 2007-12-29 2009-07-02 Arbor Networks, Inc. Method and System for Annotating Network Flow Information
US20090182818A1 (en) 2008-01-11 2009-07-16 Fortinet, Inc. A Delaware Corporation Heuristic detection of probable misspelled addresses in electronic communications
JP2009171194A (ja) 2008-01-16 2009-07-30 Oki Electric Ind Co Ltd パケットサンプリング方法、パケットサンプリング装置、ネットワーク監視装置
WO2009096970A1 (en) 2008-01-31 2009-08-06 Hewlett-Packard Development Company, L.P. Automated application dependency mapping
US8719936B2 (en) 2008-02-01 2014-05-06 Northeastern University VMM-based intrusion detection system
US9240945B2 (en) 2008-03-19 2016-01-19 Citrix Systems, Inc. Access, priority and bandwidth management based on application identity
US8793117B1 (en) 2008-04-16 2014-07-29 Scalable Network Technologies, Inc. System and method for virtualization of networking system software via emulation
US7844744B2 (en) 2008-04-25 2010-11-30 International Business Machines Corporation Providing server security via a security sensor application shared by multiple operating system partitions
US8024861B2 (en) * 2008-05-16 2011-09-27 Delphi Technologies, Inc. External stroke/flow setting method for fuel injectors
US8224936B2 (en) 2008-05-21 2012-07-17 Cisco Technology, Inc. Configuration file override
US9152789B2 (en) 2008-05-28 2015-10-06 Zscaler, Inc. Systems and methods for dynamic cloud-based malware behavior analysis
US9270477B2 (en) 2008-05-28 2016-02-23 Airmagnet, Inc. Method and apparatus of measuring and reporting data gap from within an analysis tool
US8713177B2 (en) 2008-05-30 2014-04-29 Red Hat, Inc. Remote management of networked systems using secure modular platform
US8255972B2 (en) 2008-06-06 2012-08-28 International Business Machines Corporation Method to automatically map business function level policies to it management policies
US8160063B2 (en) 2008-06-09 2012-04-17 Microsoft Corporation Data center interconnect and traffic engineering
US9369299B2 (en) 2008-06-10 2016-06-14 Bradford Networks, Inc. Network access control system and method for devices connecting to network using remote access control methods
EP2134057B1 (en) 2008-06-12 2013-05-01 Alcatel Lucent Method for protecting a packet-based network from attacks, as well as security border node
US8630316B2 (en) 2008-06-19 2014-01-14 Microsoft Corporation Clock synchronization using correlation events
US8930828B2 (en) 2008-06-22 2015-01-06 Microsoft Corporation Distinguishing conference participants
US8856926B2 (en) 2008-06-27 2014-10-07 Juniper Networks, Inc. Dynamic policy provisioning within network security devices
JP5590825B2 (ja) 2008-06-30 2014-09-17 キヤノン株式会社 通信装置及びラウンドトリップ時間を求める方法
US8046443B2 (en) 2008-08-21 2011-10-25 Red Hat, Inc. Rapid deployment remote network monitor
US7904420B2 (en) 2008-08-26 2011-03-08 Raytheon Company Identification and verification of common cluster files residing on nodes in a cluster
US8752042B2 (en) 2008-08-27 2014-06-10 Cardinalcommerce Corporation Intelligent server routing
US8023504B2 (en) 2008-08-27 2011-09-20 Cisco Technology, Inc. Integrating security server policies with optimized routing control
US8755396B2 (en) 2008-09-11 2014-06-17 Juniper Networks, Inc. Methods and apparatus related to flow control within a data center switch fabric
US9495538B2 (en) 2008-09-25 2016-11-15 Symantec Corporation Graduated enforcement of restrictions according to an application's reputation
US8572717B2 (en) 2008-10-09 2013-10-29 Juniper Networks, Inc. Dynamic access control policy with port restrictions for a network security appliance
CN102265269A (zh) 2008-10-28 2011-11-30 惠普开发有限公司 数据中心管理器
US7902973B2 (en) 2008-11-17 2011-03-08 Cisco Technology, Inc. Alarm reordering to handle alarm storms in large networks
US8775578B2 (en) 2008-11-28 2014-07-08 Red Hat, Inc. Providing hardware updates in a software environment
JP4629768B2 (ja) 2008-12-03 2011-02-09 インターナショナル・ビジネス・マシーンズ・コーポレーション 並列化処理方法、システム、及びプログラム
US8462212B1 (en) 2008-12-04 2013-06-11 Stoplift, Inc. Correlating detected events with image data
US8589582B2 (en) 2008-12-08 2013-11-19 Telefonaktiebolaget L M Ericsson (Publ) Broadband network access
US8566571B2 (en) 2008-12-12 2013-10-22 Novell, Inc. Pre-boot securing of operating system (OS) for endpoint evaluation
US9258217B2 (en) 2008-12-16 2016-02-09 At&T Intellectual Property I, L.P. Systems and methods for rule-based anomaly detection on IP network flow
CN101770551A (zh) 2008-12-30 2010-07-07 中国科学院软件研究所 一种基于硬件模拟器的处理隐藏进程的方法
WO2010082091A2 (en) 2009-01-16 2010-07-22 Mainline Net Holdings Limited Maximizing bandwidth utilization in networks with high latencies and packet drops using transmission control protocol
US20100306180A1 (en) 2009-01-28 2010-12-02 Digitiliti, Inc. File revision management
US8866821B2 (en) 2009-01-30 2014-10-21 Microsoft Corporation Depth map movement tracking via optical flow and velocity prediction
US7864707B2 (en) 2009-02-24 2011-01-04 International Business Machines Corporation Determination of network topology using flow-based traffic information
EP2224357A1 (en) 2009-02-27 2010-09-01 BRITISH TELECOMMUNICATIONS public limited company Video segmentation
US8667096B2 (en) 2009-02-27 2014-03-04 Red Hat, Inc. Automatically generating system restoration order for network recovery
US7787480B1 (en) 2009-03-04 2010-08-31 Juniper Networks, Inc. Routing frames in a trill network using service VLAN identifiers
US20100235915A1 (en) 2009-03-12 2010-09-16 Nasir Memon Using host symptoms, host roles, and/or host reputation for detection of host infection
US8838804B2 (en) 2009-03-12 2014-09-16 Novell, Inc. Securing a network connection by way of an endpoint computing device
US8904520B1 (en) 2009-03-19 2014-12-02 Symantec Corporation Communication-based reputation system
US8667121B2 (en) 2009-03-25 2014-03-04 Mcafee, Inc. System and method for managing data and policies
US8381289B1 (en) 2009-03-31 2013-02-19 Symantec Corporation Communication-based host reputation system
US8516590B1 (en) 2009-04-25 2013-08-20 Dasient, Inc. Malicious advertisement detection and remediation
EP2249525B1 (en) 2009-05-06 2012-10-31 Alcatel Lucent Traffic-engineered connection establishment across resource domains for data transport
US8918531B2 (en) 2009-05-07 2014-12-23 Cisco Technology, Inc. Automated network device provisioning using dynamic host configuration protocol
US8588422B2 (en) 2009-05-28 2013-11-19 Novell, Inc. Key management to protect encrypted data of an endpoint computing device
US8040822B2 (en) 2009-06-04 2011-10-18 Alcatel Lucent Configuring communication services using policy groups
US9778953B2 (en) 2009-06-16 2017-10-03 International Business Machines Corporation Process and system for comprehensive IT discovery without credentials
US9210050B2 (en) 2009-07-09 2015-12-08 Centurylink Intellectual Property Llc System and method for a testing vector and associated performance map
US20110029658A1 (en) 2009-07-24 2011-02-03 Theodore Werth System and methods for providing a multi-device, multi-service platform via a client agent
US8832013B1 (en) 2009-07-24 2014-09-09 Decision Lens, Inc. Method and system for analytic network process (ANP) total influence analysis
KR101548021B1 (ko) 2009-08-06 2015-08-28 주식회사 케이티 네트워크 관리 방법
US8700765B2 (en) 2009-08-14 2014-04-15 Blue Stripe Software, Inc. Methods and computer program products for monitoring and reporting network application performance
CN101998629B (zh) 2009-08-28 2014-05-21 国际商业机器公司 搜索虚拟资源的位置的方法、装置和系统
WO2011027352A1 (en) 2009-09-03 2011-03-10 Mcafee, Inc. Network access control
US10230611B2 (en) * 2009-09-10 2019-03-12 Cisco Technology, Inc. Dynamic baseline determination for distributed business transaction
US9049617B2 (en) 2009-09-23 2015-06-02 At&T Intellectual Property I, L.P. Signaling-less dynamic call setup and teardown by utilizing observed session state information
US8489717B2 (en) 2009-09-24 2013-07-16 Hitachi, Ltd. Accelerated cable modem restart service
US20110082936A1 (en) 2009-10-05 2011-04-07 Vss Monitoring, Inc. Method, apparatus and system for transmission of captured network traffic through a stacked topology of network captured traffic distribution devices
JP4931978B2 (ja) 2009-10-06 2012-05-16 インターナショナル・ビジネス・マシーンズ・コーポレーション 並列化処理方法、システム、及びプログラム
US8572739B1 (en) 2009-10-27 2013-10-29 Trend Micro Incorporated Detection of malicious modules injected on legitimate processes
JP5214035B2 (ja) 2009-10-30 2013-06-19 三菱電機株式会社 ゲートウェイ装置、通信システムおよび通信方法
TWI507985B (zh) 2009-11-02 2015-11-11 Wistron Corp 可自動化連續安裝作業系統的電子裝置及其相關方法與系統
US8621460B2 (en) 2009-11-02 2013-12-31 International Business Machines Corporation Endpoint-hosted hypervisor management
US8442048B2 (en) 2009-11-04 2013-05-14 Juniper Networks, Inc. Methods and apparatus for configuring a virtual network switch
US20110126197A1 (en) 2009-11-25 2011-05-26 Novell, Inc. System and method for controlling cloud and virtualized data centers in an intelligent workload management system
US8965981B2 (en) 2009-11-25 2015-02-24 At&T Intellectual Property I, L.P. Method and apparatus for botnet analysis and visualization
US20110145885A1 (en) 2009-12-10 2011-06-16 Bank Of America Corporation Policy Adherence And Compliance Model
US20110153811A1 (en) 2009-12-18 2011-06-23 Hyun Cheol Jeong System and method for modeling activity patterns of network traffic to detect botnets
US20110153039A1 (en) 2009-12-23 2011-06-23 Viktor Gvelesiani System and method for providing diagnostic information and graphical user interface therefor
US8310950B2 (en) 2009-12-28 2012-11-13 Oracle America, Inc. Self-configuring networking devices for providing services in a nework
US8774232B2 (en) 2010-01-08 2014-07-08 Ciena Corporation Systems and methods of measuring latency and routing thereon in optical networks
US8291258B2 (en) 2010-01-08 2012-10-16 Juniper Networks, Inc. High availability for network security devices
US8819826B2 (en) 2010-01-27 2014-08-26 Mcafee, Inc. Method and system for detection of malware that connect to network destinations through cloud scanning and web reputation
US20110196957A1 (en) 2010-02-05 2011-08-11 International Business Machines Corporation Real-Time Policy Visualization by Configuration Item to Demonstrate Real-Time and Historical Interaction of Policies
US9160737B2 (en) 2010-02-26 2015-10-13 Microsoft Technology Licensing, Llc Statistical security for anonymous mesh-up oriented online services
US8869138B2 (en) 2011-11-11 2014-10-21 Wyse Technology L.L.C. Robust firmware update with recovery logic
US9413649B2 (en) 2010-03-12 2016-08-09 Force10 Networks, Inc. Virtual network device architecture
US20110228696A1 (en) 2010-03-19 2011-09-22 Navneet Agarwal Dynamic directed acyclic graph (dag) topology reporting
US8489765B2 (en) 2010-03-19 2013-07-16 Cisco Technology, Inc. Dynamic directed acyclic graph (DAG) adjustment
US8560658B2 (en) 2010-03-23 2013-10-15 Juniper Networks, Inc. Managing distributed address pools within network devices
KR101122650B1 (ko) 2010-04-28 2012-03-09 한국전자통신연구원 정상 프로세스에 위장 삽입된 악성코드 탐지 장치, 시스템 및 방법
US8281397B2 (en) 2010-04-29 2012-10-02 Telcordia Technologies, Inc. Method and apparatus for detecting spoofed network traffic
US9270663B2 (en) 2010-04-30 2016-02-23 T-Central, Inc. System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US8549650B2 (en) 2010-05-06 2013-10-01 Tenable Network Security, Inc. System and method for three-dimensional visualization of vulnerability and asset data
WO2011137935A1 (en) 2010-05-07 2011-11-10 Ulysses Systems (Uk) Limited System and method for identifying relevant information for an enterprise
US20110283277A1 (en) 2010-05-11 2011-11-17 International Business Machines Corporation Virtualization and dynamic resource allocation aware storage level reordering
WO2011143542A1 (en) 2010-05-13 2011-11-17 Ramakant Pandrangi Systems and methods for identifying malicious domains using internet-wide dns lookup patterns
US8745188B2 (en) 2010-06-07 2014-06-03 Novell, Inc. System and method for managing changes in a network datacenter
US8433790B2 (en) 2010-06-11 2013-04-30 Sourcefire, Inc. System and method for assigning network blocks to sensors
EP2583211B1 (en) 2010-06-15 2020-04-15 Oracle International Corporation Virtual computing infrastructure
US8832461B2 (en) 2010-06-25 2014-09-09 Microsoft Corporation Trusted sensors
US8570861B1 (en) 2010-06-29 2013-10-29 Amazon Technologies, Inc. Reputation-based networking
US9384112B2 (en) 2010-07-01 2016-07-05 Logrhythm, Inc. Log collection, structuring and processing
US8588081B2 (en) 2010-07-14 2013-11-19 Cisco Technology, Inc. Monitoring a flow set to detect faults
US8489775B2 (en) 2010-07-21 2013-07-16 Dell Products L.P. System-wide time synchronization across power management interfaces and sensor data
US8849926B2 (en) 2010-08-06 2014-09-30 Simon Fraser University System and method for self-calibrating, self-organizing and localizing sensors in wireless sensor networks
CN102387169B (zh) 2010-08-26 2014-07-23 阿里巴巴集团控股有限公司 分布式缓存的对象删除方法、系统及删除服务器
US8661544B2 (en) 2010-08-31 2014-02-25 Cisco Technology, Inc. Detecting botnets
US8683389B1 (en) 2010-09-08 2014-03-25 The New England Complex Systems Institute, Inc. Method and apparatus for dynamic information visualization
US8413235B1 (en) 2010-09-10 2013-04-02 Symantec Corporation Malware detection using file heritage data
US8707275B2 (en) 2010-09-14 2014-04-22 Microsoft Corporation Simulation environment for distributed programs
EP2712144A1 (en) 2010-09-24 2014-03-26 VeriSign, Inc. IP address confidence scoring system and method
US8351430B2 (en) 2010-09-30 2013-01-08 Microsoft Corporation Routing using global address pairs
US8838830B2 (en) 2010-10-12 2014-09-16 Sap Portals Israel Ltd Optimizing distributed computer networks
US20120102361A1 (en) 2010-10-25 2012-04-26 Computer Associates Think, Inc. Heuristic policy analysis
US20120102543A1 (en) 2010-10-26 2012-04-26 360 GRC, Inc. Audit Management System
US20150222939A1 (en) 2010-10-28 2015-08-06 Avvasi Inc. System for monitoring a video network and methods for use therewith
US8832835B1 (en) 2010-10-28 2014-09-09 Symantec Corporation Detecting and remediating malware dropped by files
JP5568776B2 (ja) 2010-11-05 2014-08-13 株式会社日立製作所 計算機のモニタリングシステム及びモニタリング方法
TWI453624B (zh) 2010-11-09 2014-09-21 Inst Information Industry 資訊安全防護主機
US9117075B1 (en) 2010-11-22 2015-08-25 Trend Micro Inc. Early malware detection by cross-referencing host data
JP5907983B2 (ja) 2010-11-23 2016-05-11 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation マイグレーション方法、コンピュータ・プログラム、およびシステム
KR20120057066A (ko) 2010-11-26 2012-06-05 한국전자통신연구원 네트워크 보안관제 시스템 및 방법, 네트워크 보안관제를 위한 보안 이벤트 처리 장치 및 시각화 처리 장치
US20120137278A1 (en) 2010-11-30 2012-05-31 International Business Machines Corporation Generating a customized set of tasks for migration of a deployed software solution
US9660940B2 (en) 2010-12-01 2017-05-23 Juniper Networks, Inc. Methods and apparatus for flow control associated with a switch fabric
US9128803B2 (en) 2010-12-15 2015-09-08 Microsoft Technology Licensing, Llc Application model for implementing composite applications
US8499348B1 (en) 2010-12-28 2013-07-30 Amazon Technologies, Inc. Detection of and responses to network attacks
US9225793B2 (en) 2011-01-28 2015-12-29 Cisco Technology, Inc. Aggregating sensor data
US20120197856A1 (en) 2011-01-28 2012-08-02 Cisco Technology, Inc. Hierarchical Network for Collecting, Aggregating, Indexing, and Searching Sensor Data
US20120195198A1 (en) 2011-01-31 2012-08-02 Joseph Regan Method and apparatus providing protocol policing
US20120198541A1 (en) 2011-02-02 2012-08-02 Reeves Randall E Methods and apparatus for preventing network intrusion
US9292329B2 (en) 2011-02-10 2016-03-22 Microsoft Technology Licensing, Llc Virtual switch interceptor
JP6332970B2 (ja) 2011-02-11 2018-05-30 シーメンス・ヘルスケア・ダイアグノスティックス・インコーポレーテッドSiemens Healthcare Diagnostics Inc. 安全なソフトウェアの更新のためのシステム及び方法
US9112830B2 (en) 2011-02-23 2015-08-18 Mcafee, Inc. System and method for interlocking a host and a gateway
US8665883B2 (en) 2011-02-28 2014-03-04 Alcatel Lucent Generalized multi-homing for virtual private LAN services
US8538926B2 (en) 2011-03-08 2013-09-17 Rackspace Us, Inc. Massively scalable object storage system for storing object replicas
US20120233473A1 (en) 2011-03-08 2012-09-13 Cisco Technology, Inc. Power Management in Networks
US9118637B2 (en) 2011-03-09 2015-08-25 Arris Enterprises, Inc. Dual-mode download manager
JP5678751B2 (ja) 2011-03-18 2015-03-04 株式会社リコー 検疫ネットワークシステム
US9122877B2 (en) 2011-03-21 2015-09-01 Mcafee, Inc. System and method for malware and network reputation correlation
US20120246303A1 (en) 2011-03-23 2012-09-27 LogRhythm Inc. Log collection, structuring and processing
US20120254109A1 (en) 2011-03-28 2012-10-04 Microsoft Corporation Distributed component runtime
US9571354B2 (en) 2011-03-28 2017-02-14 Citrix Systems, Inc. Systems and methods for tracking application layer flow via a multi-connection intermediary device
US9170917B2 (en) 2011-04-01 2015-10-27 Paypal, Inc. Flow tracing though diverse logical and physical application and infrastructure layers/dependencies
US9465589B2 (en) 2011-04-05 2016-10-11 Microsoft Technology Licensing, Llc Stateful component authoring and execution
US9071575B2 (en) 2011-04-21 2015-06-30 Robert K. Lemaster Method and system for abuse route aggregation and distribution
US8612169B2 (en) 2011-04-26 2013-12-17 International Business Machines Corporation Method and system for detecting anomalies in a bipartite graph
US9270572B2 (en) 2011-05-02 2016-02-23 Brocade Communications Systems Inc. Layer-3 support in TRILL networks
WO2012150602A1 (en) 2011-05-03 2012-11-08 Yogesh Chunilal Rathod A system and method for dynamically monitoring, recording, processing, attaching dynamic, contextual & accessible active links & presenting of physical or digital activities, actions, locations, logs, life stream, behavior & status
US9396327B2 (en) 2011-05-16 2016-07-19 D2L Corporation Systems and methods for security verification in electronic learning systems and other systems
US8966625B1 (en) 2011-05-24 2015-02-24 Palo Alto Networks, Inc. Identification of malware sites using unknown URL sites and newly registered DNS addresses
US20120300628A1 (en) 2011-05-26 2012-11-29 Dan Prescott Method and apparatus to passively determine the state of a flow including determining flow state in the event of missing data on one or both sides of the flow
US9465696B2 (en) 2011-06-03 2016-10-11 Apple Inc. Methods and apparatus for multi-phase multi-source backup
US8719835B2 (en) 2011-06-07 2014-05-06 Telefonaktiebolaget L M Ericsson (Publ) Ranking service units to provide and protect highly available services using the Nway redundancy model
US9450873B2 (en) 2011-06-28 2016-09-20 Microsoft Technology Licensing, Llc Performance isolation for clouds
US8370407B1 (en) 2011-06-28 2013-02-05 Go Daddy Operating Company, LLC Systems providing a network resource address reputation service
US9407533B2 (en) 2011-06-28 2016-08-02 Brocade Communications Systems, Inc. Multicast in a trill network
US9116968B2 (en) 2011-06-30 2015-08-25 Bmc Software, Inc. Methods and apparatus related to graph transformation and synchronization
US9250918B2 (en) 2011-06-30 2016-02-02 Bmc Software, Inc. Server management with dynamic construction of pre-boot images
US9185127B2 (en) 2011-07-06 2015-11-10 Nominum, Inc. Network protection service
US8726379B1 (en) 2011-07-15 2014-05-13 Norse Corporation Systems and methods for dynamic protection from electronic attacks
US20140165207A1 (en) 2011-07-26 2014-06-12 Light Cyber Ltd. Method for detecting anomaly action within a computer network
US9571508B2 (en) 2011-07-29 2017-02-14 Hewlett Packard Enterprise Development Lp Systems and methods for distributed rule-based correlation of events
US8719452B1 (en) 2011-07-29 2014-05-06 Google Inc. Correction of client-assigned timestamps
US20130038358A1 (en) 2011-08-10 2013-02-14 David M. Cook Wireless sensor node and method
US8881258B2 (en) 2011-08-24 2014-11-04 Mcafee, Inc. System, method, and computer program for preventing infections from spreading in a network environment using dynamic application of a firewall policy
EP2751682A4 (en) 2011-08-29 2015-01-07 Fiberlink Comm Corp PLATFORM FOR USE AND DISTRIBUTION OF MODULES TO END POINTS
WO2013030830A1 (en) 2011-08-31 2013-03-07 Daniel Levy Automatic ranking of entities based on interactions therebetween
US9916538B2 (en) 2012-09-15 2018-03-13 Z Advanced Computing, Inc. Method and system for feature detection
US8311973B1 (en) 2011-09-24 2012-11-13 Zadeh Lotfi A Methods and systems for applications for Z-numbers
US20130085889A1 (en) 2011-09-29 2013-04-04 Sears Brands, Llc Systems and methods for managing returns or exchanges made via a computer network
US8694644B2 (en) 2011-09-29 2014-04-08 Nec Laboratories America, Inc. Network-aware coordination of virtual machine migrations in enterprise data centers and clouds
US8677487B2 (en) 2011-10-18 2014-03-18 Mcafee, Inc. System and method for detecting a malicious command and control channel
CN102387608B (zh) 2011-10-21 2014-12-10 大唐移动通信设备有限公司 WiFi接入点接入方法、WiFi接入点及WiFi系统
US9148381B2 (en) 2011-10-21 2015-09-29 Qualcomm Incorporated Cloud computing enhanced gateway for communication networks
US8773999B2 (en) 2011-10-26 2014-07-08 International Business Machines Corporation Distributed chassis architecture having integrated service appliances
CN103095597B (zh) 2011-10-28 2017-04-26 华为技术有限公司 一种用于负载均衡的方法和装置
US8812447B1 (en) 2011-11-09 2014-08-19 Access Sciences Corporation Computer implemented system for accelerating electronic file migration from multiple sources to multiple destinations
US8447851B1 (en) 2011-11-10 2013-05-21 CopperEgg Corporation System for monitoring elastic cloud-based computing systems as a service
US9003141B2 (en) 2011-11-14 2015-04-07 Ca, Inc. Enhanced software application platform
US9015823B2 (en) 2011-11-15 2015-04-21 Nicira, Inc. Firewalls in logical networks
CN103946804B (zh) 2011-11-18 2017-11-21 汤姆逊许可公司 包括用于终端用户装置的远程管理的发布/订阅代理及相应的终端用户装置的系统
CN102521537B (zh) 2011-12-06 2015-05-20 北京航空航天大学 基于虚拟机监控器的隐藏进程检测方法和装置
WO2013086221A1 (en) 2011-12-07 2013-06-13 Huawei Technologies Co., Ltd. Method to carry fcoe frames over a trill based network
US8887238B2 (en) 2011-12-07 2014-11-11 Time Warner Cable Enterprises Llc Mechanism for establishing reputation in a network environment
US8881145B2 (en) 2011-12-15 2014-11-04 Industrial Technology Research Institute System and method for generating application-level dependencies in one or more virtual machines
US8914497B1 (en) 2011-12-15 2014-12-16 Amazon Technologies, Inc. System and method for throttling service requests having non-uniform workloads
EP2605453B1 (en) 2011-12-16 2014-11-12 Alcatel Lucent Method and apparatus for monitoring transmission characteristics in a network
US8966021B1 (en) 2011-12-20 2015-02-24 Amazon Technologies, Inc. Composable machine image
US9130825B2 (en) 2011-12-27 2015-09-08 Tektronix, Inc. Confidence intervals for key performance indicators in communication networks
US8973147B2 (en) 2011-12-29 2015-03-03 Mcafee, Inc. Geo-mapping system security events
US9083741B2 (en) 2011-12-29 2015-07-14 Architecture Technology Corporation Network defense system and framework for detecting and geolocating botnet cyber attacks
US10514937B2 (en) 2012-01-05 2019-12-24 Vmware, Inc. Auto-discovery service and method of discovering applications within a virtual network
US9575809B2 (en) 2012-01-10 2017-02-21 Microsoft Technology Licensing, Llc Distributed stochastic clustering for automated formation of connected networks of agents
CN107370629A (zh) 2012-01-16 2017-11-21 诺基亚通信公司 供应商特定的基站自动配置框架
US10091218B2 (en) * 2012-01-23 2018-10-02 Hrl Laboratories, Llc System and method to detect attacks on mobile wireless networks based on network controllability analysis
US9246702B1 (en) 2012-01-31 2016-01-26 Cisco Technology, Inc. System and method for configuring service appliances as virtual line cards in a network environment
US9612814B2 (en) 2012-02-02 2017-04-04 Sungard Availability Services, Lp Network topology-aware recovery automation
US9088517B2 (en) 2012-02-08 2015-07-21 Cisco Technology, Inc. Stitching multicast trees
US9372213B2 (en) 2012-02-15 2016-06-21 Alpha and Omega, Inc. Sensors for electrical connectors
US8640239B2 (en) 2012-02-20 2014-01-28 International Business Machines Corporation Network intrusion detection in a network that includes a distributed virtual switch fabric
CN104106240B (zh) 2012-02-24 2017-10-10 华为技术有限公司 覆盖网络中转发和地址解析的平衡
US8997227B1 (en) 2012-02-27 2015-03-31 Amazon Technologies, Inc. Attack traffic signature generation using statistical pattern recognition
US9052961B2 (en) 2012-03-02 2015-06-09 Vmware, Inc. System to generate a deployment plan for a cloud infrastructure according to logical, multi-tier application blueprint
US9281940B2 (en) 2012-03-02 2016-03-08 Sony Corporation Information processing apparatus, information processing method, and program
RU2486588C1 (ru) 2012-03-14 2013-06-27 Закрытое акционерное общество "Лаборатория Касперского" Система и способ эффективного лечения компьютера от вредоносных программ и последствий их работы
US8789164B2 (en) 2012-03-16 2014-07-22 International Business Machines Corporation Scalable virtual appliance cloud (SVAC) and devices usable in an SVAC
US8825848B1 (en) 2012-03-20 2014-09-02 Emc Corporation Ordering of event records in an electronic system for forensic analysis
US8832831B2 (en) 2012-03-21 2014-09-09 Radware, Ltd. Method and system for detecting and mitigating attacks performed using cryptographic protocols
US9621413B1 (en) 2012-03-29 2017-04-11 Arris Enterprises, Inc. Displaying dynamic host configuration protocol (DHCP) transaction states using a DHCP relay agent
US8931043B2 (en) 2012-04-10 2015-01-06 Mcafee Inc. System and method for determining and using local reputations of users and hosts to protect information in a network environment
US9608881B2 (en) 2012-04-13 2017-03-28 International Business Machines Corporation Service compliance enforcement using user activity monitoring and work request verification
US9210180B2 (en) 2012-04-18 2015-12-08 Radware Ltd. Techniques for separating the processing of clients' traffic to different zones in software defined networks
US8850588B2 (en) 2012-05-01 2014-09-30 Taasera, Inc. Systems and methods for providing mobile security based on dynamic attestation
US9674589B2 (en) 2012-05-04 2017-06-06 Itron, Inc. Coordinated collection of metering data
US8867367B2 (en) 2012-05-10 2014-10-21 Telefonaktiebolaget L M Ericsson (Publ) 802.1aq support over IETF EVPN
US20130304900A1 (en) 2012-05-14 2013-11-14 Sap Ag Reputation management using evolving reputation scores
US9503463B2 (en) 2012-05-14 2016-11-22 Zimperium, Inc. Detection of threats to networks, based on geographic location
US8812725B2 (en) 2012-05-18 2014-08-19 Cisco Technology Inc. System and method for latency reduction in a network environment
US10116696B2 (en) 2012-05-22 2018-10-30 Sri International Network privilege manager for a dynamically programmable computer network
CN102722563B (zh) 2012-05-31 2014-12-03 优视科技有限公司 页面显示方法及装置
WO2013184099A1 (en) 2012-06-05 2013-12-12 Empire Technology Development, Llc Cross-user correlation for detecting server-side multi-target intrusion
US9501744B1 (en) 2012-06-11 2016-11-22 Dell Software Inc. System and method for classifying data
US9647938B2 (en) 2012-06-11 2017-05-09 Radware, Ltd. Techniques for providing value-added services in SDN-based networks
US9779260B1 (en) 2012-06-11 2017-10-03 Dell Software Inc. Aggregation and classification of secure data
US8989049B2 (en) 2012-06-15 2015-03-24 Cisco Technology, Inc. System and method for virtual portchannel load balancing in a trill network
US20130347103A1 (en) 2012-06-21 2013-12-26 Mark Veteikis Packet capture for error tracking
US8959325B2 (en) 2012-06-21 2015-02-17 Breakingpoint Systems, Inc. Systems and methods for booting devices using assigned servers in a multiple-card computing system
US9038178B1 (en) 2012-06-25 2015-05-19 Emc Corporation Detection of malware beaconing activities
US9213590B2 (en) 2012-06-27 2015-12-15 Brocade Communications Systems, Inc. Network monitoring and diagnostics
US9686169B2 (en) 2012-07-02 2017-06-20 Ixia Real-time highly accurate network latency measurement with low generated traffic or data requirements
US8861331B2 (en) * 2012-07-03 2014-10-14 King Fahd University Of Petroleum And Minerals Least movement WSAN topology repair method
US9792320B2 (en) 2012-07-06 2017-10-17 Box, Inc. System and method for performing shard migration to support functions of a cloud-based service
US8868030B2 (en) 2012-07-30 2014-10-21 General Motors Llc Automated vehicle intrusion device
US9852073B2 (en) 2012-08-07 2017-12-26 Dell Products L.P. System and method for data redundancy within a cache
WO2014025472A1 (en) 2012-08-09 2014-02-13 Itron, Inc. Interface for clustered utility nodes
US9548908B2 (en) 2012-08-21 2017-01-17 Cisco Technology, Inc. Flow de-duplication for network monitoring
US8792380B2 (en) 2012-08-24 2014-07-29 Accedian Networks Inc. System for establishing and maintaining a clock reference indicating one-way latency in a data network
US8984331B2 (en) 2012-09-06 2015-03-17 Triumfant, Inc. Systems and methods for automated memory and thread execution anomaly detection in a computer network
US20150067786A1 (en) 2013-09-04 2015-03-05 Michael Stephen Fiske Visual image authentication and transaction authorization using non-determinism
US10194284B2 (en) 2012-09-12 2019-01-29 Digit International Inc. Embedded communication in message based transports
US20140089494A1 (en) 2012-09-27 2014-03-27 Hewlett-Packard Development Company, L.P. Managing compliance across information technology components
US9164965B2 (en) 2012-09-28 2015-10-20 Oracle International Corporation Interactive topological views of combined hardware and software systems
US9231820B2 (en) 2012-09-28 2016-01-05 Juniper Networks, Inc. Methods and apparatus for controlling wireless access points
EP2932667A4 (en) 2012-10-03 2016-09-28 Distrix Networks Ltd SYSTEMS AND METHODS FOR ADAPTIVE LOAD BALANCING COMMUNICATIONS, ROUTING, FILTERING AND ACCESS CONTROL IN DISTRIBUTED NETWORKS
US9253042B2 (en) 2012-10-05 2016-02-02 Nec Laboratories America, Inc. Network management
US9083613B2 (en) 2012-10-16 2015-07-14 Cisco Technology, Inc. Detection of cabling error in communication network
US9438488B2 (en) 2012-11-09 2016-09-06 Citrix Systems, Inc. Systems and methods for appflow for datastream
US9178912B2 (en) 2012-11-15 2015-11-03 Cisco Technology, Inc. Virtual device context (VDC) integration for network services
CN103023970B (zh) 2012-11-15 2015-07-22 中国科学院计算机网络信息中心 一种物联网海量数据存储方法及系统
US9171151B2 (en) 2012-11-16 2015-10-27 Microsoft Technology Licensing, Llc Reputation-based in-network filtering of client event information
US9253140B2 (en) 2012-11-20 2016-02-02 Cisco Technology, Inc. System and method for optimizing within subnet communication in a network environment
US9535871B2 (en) 2012-11-27 2017-01-03 Red Hat Israel, Ltd. Dynamic routing through virtual appliances
US9960974B2 (en) 2012-11-30 2018-05-01 International Business Machines Corporation Dependency mapping among a system of servers, analytics and visualization thereof
US9313096B2 (en) 2012-12-04 2016-04-12 International Business Machines Corporation Object oriented networks
US9742877B2 (en) 2012-12-04 2017-08-22 International Business Machines Corporation Clustering support across geographical boundaries
US9183033B2 (en) * 2012-12-06 2015-11-10 Industrial Technology Research Institute Method and system for analyzing root causes of relating performance issues among virtual machines to physical machines
US20140173623A1 (en) 2012-12-17 2014-06-19 Mediatek Inc. Method for controlling task migration of task in heterogeneous multi-core system based on dynamic migration threshold and related computer readable medium
US8813236B1 (en) 2013-01-07 2014-08-19 Narus, Inc. Detecting malicious endpoints using network connectivity and flow information
WO2014111922A1 (en) 2013-01-21 2014-07-24 B.G. Negev Technologies And Applications Ltd. Method and system for protecting computerized systems from malicious code
WO2014116888A1 (en) 2013-01-25 2014-07-31 REMTCS Inc. Network security system, method, and apparatus
US9191402B2 (en) 2013-01-25 2015-11-17 Opendns, Inc. Domain classification based on client request behavior
US20140215573A1 (en) 2013-01-31 2014-07-31 Desire2Learn Incorporated System and method for application accounts
US9130836B2 (en) 2013-02-04 2015-09-08 Cisco Technology, Inc. Provisoning of a new node joining an existing cluster in a data center environment
US9369431B1 (en) 2013-02-07 2016-06-14 Infoblox Inc. Security device controller
US9080707B2 (en) 2013-02-12 2015-07-14 Bayer Medical Care Inc. Intelligent contrast warmer and contrast holder
US9286047B1 (en) 2013-02-13 2016-03-15 Cisco Technology, Inc. Deployment and upgrade of network devices in a network environment
WO2014128253A1 (en) 2013-02-22 2014-08-28 Adaptive Mobile Security Limited System and method for embedded mobile (em)/machine to machine (m2m) security, pattern detection, mitigation
US9143582B2 (en) 2013-03-08 2015-09-22 International Business Machines Corporation Interoperability for distributed overlay virtual environments
US9378068B2 (en) 2013-03-13 2016-06-28 International Business Machines Corporation Load balancing for a virtual networking system
US9237111B2 (en) 2013-03-14 2016-01-12 International Business Machines Corporation Credit-based flow control in lossless ethernet networks
US8848744B1 (en) 2013-03-15 2014-09-30 Extrahop Networks, Inc. Resynchronization of passive monitoring of a flow based on hole detection
US9407519B2 (en) 2013-03-15 2016-08-02 Vmware, Inc. Virtual network flow monitoring
US9721086B2 (en) 2013-03-15 2017-08-01 Advanced Elemental Technologies, Inc. Methods and systems for secure and reliable identity-based computing
US9043912B2 (en) 2013-03-15 2015-05-26 Mehdi Mahvi Method for thwarting application layer hypertext transport protocol flood attacks focused on consecutively similar application-specific data packets
US9477500B2 (en) 2013-03-15 2016-10-25 Avi Networks Managing and controlling a distributed network service platform
US9380066B2 (en) 2013-03-29 2016-06-28 Intel Corporation Distributed traffic pattern analysis and entropy prediction for detecting malware in a network environment
US9369368B2 (en) 2013-04-06 2016-06-14 Citrix Systems, Inc. Systems and methods for capturing and consolidating packet tracing in a cluster system
EP2797291A1 (en) 2013-04-22 2014-10-29 Telefonaktiebolaget L M Ericsson (publ) Traffic analysis for http user agent based device category mapping
KR101394424B1 (ko) 2013-04-22 2014-05-13 한국인터넷진흥원 하이퍼바이저 기반 침입 방지 플랫폼 및 가상화 네트워크 침입 방지 시스템
US9015716B2 (en) 2013-04-30 2015-04-21 Splunk Inc. Proactive monitoring tree with node pinning for concurrent node comparisons
US9392022B2 (en) 2013-05-03 2016-07-12 Vmware, Inc. Methods and apparatus to measure compliance of a virtual computing environment
US9294483B2 (en) 2013-05-03 2016-03-22 John Wong Method and system for mitigation of distributed denial of service (DDOS) attacks
US10977229B2 (en) 2013-05-21 2021-04-13 Facebook, Inc. Database sharding with update layer
US20140348182A1 (en) 2013-05-22 2014-11-27 Iii Holdings 2, Llc Time synchronization between nodes of a switched interconnect fabric
US20140351415A1 (en) 2013-05-24 2014-11-27 PacketSled Inc. Selective packet capture
US9246945B2 (en) 2013-05-29 2016-01-26 International Business Machines Corporation Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance
US9191400B1 (en) 2013-06-12 2015-11-17 The United States Of America, As Represented By The Secretary Of The Navy Cyphertext (CT) analytic engine and method for network anomaly detection
US9769174B2 (en) 2013-06-14 2017-09-19 Catbird Networks, Inc. Systems and methods for creating and modifying access control lists
US11196636B2 (en) 2013-06-14 2021-12-07 Catbird Networks, Inc. Systems and methods for network data flow aggregation
US9197654B2 (en) 2013-06-28 2015-11-24 Mcafee, Inc. Rootkit detection by using HW resources to detect inconsistencies in network traffic
US20150006714A1 (en) 2013-06-28 2015-01-01 Microsoft Corporation Run-time verification of middlebox routing and traffic processing
US20150009840A1 (en) 2013-07-03 2015-01-08 Niksun, Inc. Packet time stamp processing methods, systems, and apparatus
IL227598B (en) 2013-07-22 2018-05-31 Verint Systems Ltd Systems and methods for identifying malicious hosts
US9246773B2 (en) 2013-07-30 2016-01-26 Draios Inc. System, method, and graphical user interface for application topology mapping in hosted computing environments
US9319293B2 (en) 2013-07-31 2016-04-19 Calix, Inc. Methods and apparatuses for network flow analysis and control
US20150039751A1 (en) 2013-08-02 2015-02-05 PacketSled Inc. Dynamic parallel coordinates visualization of network flows
US9450810B2 (en) 2013-08-02 2016-09-20 Cisco Technoogy, Inc. Policy-driven automatic redundant fabric placement mechanism for virtual data centers
US20150046882A1 (en) 2013-08-07 2015-02-12 Siemens Product Lifecycle Management Software Inc. User interaction and display of tree hierarchy data on limited screen space
CN104424013B (zh) 2013-08-26 2018-03-09 国际商业机器公司 在计算环境中部署虚拟机的方法和设备
US9197666B2 (en) 2013-08-26 2015-11-24 Verizon Patent And Licensing Inc. Method and apparatus for mitigating distributed denial of service attacks
US9811435B2 (en) 2013-09-03 2017-11-07 Cisco Technology, Inc. System for virtual machine risk monitoring
US9607146B2 (en) 2013-09-18 2017-03-28 Qualcomm Incorporated Data flow based behavioral analysis on mobile devices
US20160212021A1 (en) 2013-09-18 2016-07-21 Jolata, Inc. Highly probable identification of related messages using sparse hash function sets
US9385959B2 (en) 2013-09-26 2016-07-05 Acelio, Inc. System and method for improving TCP performance in virtualized environments
US9418222B1 (en) 2013-09-27 2016-08-16 Symantec Corporation Techniques for detecting advanced security threats
US9507847B2 (en) 2013-09-27 2016-11-29 International Business Machines Corporation Automatic log sensor tuning
US9369435B2 (en) 2013-09-30 2016-06-14 Cisco Technology, Inc. Method for providing authoritative application-based routing and an improved application firewall
WO2015050488A1 (en) 2013-10-03 2015-04-09 Telefonaktiebolaget Lm Ericsson (Publ) Method, system, computer program and computer program product for monitoring data packet flows between virtual machines, vms, within a data centre
EP2860912A1 (en) 2013-10-11 2015-04-15 Telefonica Digital España, S.L.U. A method for correlating network traffic data from distributed systems and computer program thereof
US9330156B2 (en) 2013-10-18 2016-05-03 Cisco Technology, Inc. System and method for software defined network aware data replication
US20150142936A1 (en) 2013-10-21 2015-05-21 Nyansa, Inc. System and method for observing and controlling a programmable network using time varying data collection
US9405903B1 (en) 2013-10-31 2016-08-02 Palo Alto Networks, Inc. Sinkholing bad network domains by registering the bad network domains on the internet
US9973534B2 (en) 2013-11-04 2018-05-15 Lookout, Inc. Methods and systems for secure network connections
US9502111B2 (en) 2013-11-05 2016-11-22 Cisco Technology, Inc. Weighted equal cost multipath routing
US9634938B2 (en) 2013-11-05 2017-04-25 International Business Machines Corporation Adaptive scheduling of data flows in data center networks for efficient resource utilization
US9513938B2 (en) 2013-11-07 2016-12-06 Sap Se Virtual appliance integration with cloud management software
US9088598B1 (en) 2013-11-14 2015-07-21 Narus, Inc. Systematic mining of associated server herds for uncovering malware and attack campaigns
US9819551B2 (en) 2013-11-20 2017-11-14 Big Switch Networks, Inc. Systems and methods for testing networks with a controller
US9454324B1 (en) 2013-12-18 2016-09-27 Emc Corporation Methods and apparatus for data lifecycle analysis
US9507686B2 (en) 2013-12-20 2016-11-29 Netapp, Inc. System, method, and computer program product for monitoring health of computer system assets
EP2887595B8 (en) 2013-12-23 2019-10-16 Rohde & Schwarz GmbH & Co. KG Method and node for retransmitting data packets in a tcp connection
EP3087526A4 (en) 2013-12-27 2017-06-21 McAfee, Inc. Segregating executable files exhibiting network activity
US9563517B1 (en) 2013-12-30 2017-02-07 EMC IP Holding Company LLC Cloud snapshots
CN103716137B (zh) 2013-12-30 2017-02-01 上海交通大学 一种识别ZigBee传感器网络丢包原因的方法及其系统
US10142259B2 (en) 2014-03-03 2018-11-27 Ericsson Ab Conflict detection and resolution in an ABR network
US9294486B1 (en) 2014-03-05 2016-03-22 Sandia Corporation Malware detection and analysis
KR101889500B1 (ko) 2014-03-07 2018-09-20 한국전자통신연구원 네트워크 플로우 데이터를 이용한 네트워크 연결 체인 역추적 방법 및 시스템
US9886521B2 (en) 2014-03-13 2018-02-06 International Business Machines Corporation Adaptive sampling schemes for clustering streaming graphs
US20150261842A1 (en) 2014-03-15 2015-09-17 International Business Machines Corporation Conformance specification and checking for hosting services
US10263836B2 (en) 2014-03-24 2019-04-16 Microsoft Technology Licensing, Llc Identifying troubleshooting options for resolving network failures
US9853997B2 (en) 2014-04-14 2017-12-26 Drexel University Multi-channel change-point malware detection
US9762443B2 (en) 2014-04-15 2017-09-12 Splunk Inc. Transformation of network data at remote capture agents
US9319384B2 (en) 2014-04-30 2016-04-19 Fortinet, Inc. Filtering hidden data embedded in media files
US9659079B2 (en) 2014-05-30 2017-05-23 Wal-Mart Stores, Inc. Shard determination logic for scalable order and inventory management architecture with a sharded transactional database
US9531589B2 (en) 2014-05-30 2016-12-27 Cisco Technology, Inc. Automating monitoring using configuration event triggers in a network environment
WO2016004075A1 (en) 2014-06-30 2016-01-07 Amazon Technologies, Inc. Interactive interfaces for machine learning model evaluations
WO2016003332A1 (en) 2014-07-01 2016-01-07 Telefonaktiebolaget L M Ericsson (Publ) Methods and nodes for congestion control
CN104065518A (zh) 2014-07-07 2014-09-24 北京市博汇科技股份有限公司 一种网络数据包丢失位置的确定方法及装置
US9645892B1 (en) 2014-07-08 2017-05-09 EMC IP Holding Company LLC Recording file events in change logs while incrementally backing up file systems
US9887886B2 (en) 2014-07-15 2018-02-06 Sap Se Forensic software investigation
US10659478B2 (en) 2014-07-21 2020-05-19 David Paul Heilig Identifying stealth packets in network communications through use of packet headers
AU2015296248B2 (en) 2014-07-30 2018-01-18 Forward Networks, Inc. Systems and methods for network management
US20160036837A1 (en) 2014-08-04 2016-02-04 Microsoft Corporation Detecting attacks on data centers
CN105517668B (zh) 2014-08-06 2019-05-28 华为技术有限公司 识别网络传输拥塞的方法及装置
US20160050132A1 (en) 2014-08-18 2016-02-18 Telefonaktiebolaget L M Ericsson (Publ) Method and system to dynamically collect statistics of traffic flows in a software-defined networking (sdn) system
US9992225B2 (en) 2014-09-12 2018-06-05 Topspin Security Ltd. System and a method for identifying malware network activity using a decoy environment
US9537841B2 (en) 2014-09-14 2017-01-03 Sophos Limited Key management for compromised enterprise endpoints
US9935854B2 (en) 2014-09-23 2018-04-03 Uila Networks, Inc. Infrastructure performance monitoring
US10091174B2 (en) 2014-09-29 2018-10-02 Dropbox, Inc. Identifying related user accounts based on authentication data
US10270658B2 (en) 2014-09-30 2019-04-23 Cisco Technology, Inc. Zero touch configuration and synchronization of a service appliance in a network environment
US9524173B2 (en) 2014-10-09 2016-12-20 Brocade Communications Systems, Inc. Fast reboot for a switch
US11159599B2 (en) 2014-10-10 2021-10-26 Dynatrace Llc Method and system for real-time modeling of communication, virtualization and transaction execution related topological aspects of monitored software applications and hardware entities
US9781004B2 (en) 2014-10-16 2017-10-03 Cisco Technology, Inc. Discovering and grouping application endpoints in a network environment
US10171318B2 (en) 2014-10-21 2019-01-01 RiskIQ, Inc. System and method of identifying internet-facing assets
US9762490B2 (en) 2014-10-27 2017-09-12 Telefonaktiebolaget L M Ericsson (Publ) Content filtering for information centric networks
US9832213B2 (en) 2014-10-31 2017-11-28 Cyber Crucible Inc. System and method for network intrusion detection of covert channels based on off-line network traffic
US9417985B2 (en) 2014-11-14 2016-08-16 Semmle Limited Distributed analysis and attribution of source code
US9904584B2 (en) 2014-11-26 2018-02-27 Microsoft Technology Licensing, Llc Performance anomaly diagnosis
US9495193B2 (en) 2014-12-05 2016-11-15 International Business Machines Corporation Monitoring hypervisor and provisioned instances of hosted virtual machines using monitoring templates
US9584536B2 (en) 2014-12-12 2017-02-28 Fortinet, Inc. Presentation of threat history associated with network activity
US9667653B2 (en) 2014-12-15 2017-05-30 International Business Machines Corporation Context-aware network service policy management
US9253206B1 (en) 2014-12-18 2016-02-02 Docusign, Inc. Systems and methods for protecting an online service attack against a network-based attack
US9609517B2 (en) 2014-12-19 2017-03-28 Intel Corporation Cooperative security in wireless sensor networks
US10261851B2 (en) 2015-01-23 2019-04-16 Lightbend, Inc. Anomaly detection using circumstance-specific detectors
US10893100B2 (en) * 2015-03-12 2021-01-12 International Business Machines Corporation Providing agentless application performance monitoring (APM) to tenant applications by leveraging software-defined networking (SDN)
US9819689B2 (en) 2015-03-13 2017-11-14 Microsoft Technology Licensing, Llc Large scale malicious process detection
US10193929B2 (en) 2015-03-13 2019-01-29 Varmour Networks, Inc. Methods and systems for improving analytics in distributed networks
US9438618B1 (en) 2015-03-30 2016-09-06 Amazon Technologies, Inc. Threat detection and mitigation through run-time introspection and instrumentation
US10291473B2 (en) 2015-03-31 2019-05-14 Ca, Inc. Routing policy impact simulation
US9462013B1 (en) 2015-04-29 2016-10-04 International Business Machines Corporation Managing security breaches in a networked computing environment
US10374904B2 (en) 2015-05-15 2019-08-06 Cisco Technology, Inc. Diagnostic network visualization
US9800497B2 (en) 2015-05-27 2017-10-24 Cisco Technology, Inc. Operations, administration and management (OAM) in overlay data center environments
US20160359695A1 (en) 2015-06-04 2016-12-08 Cisco Technology, Inc. Network behavior data collection and analytics for anomaly detection
US10142353B2 (en) 2015-06-05 2018-11-27 Cisco Technology, Inc. System for monitoring and managing datacenters
US9967158B2 (en) 2015-06-05 2018-05-08 Cisco Technology, Inc. Interactive hierarchical network chord diagram for application dependency mapping
US10536357B2 (en) 2015-06-05 2020-01-14 Cisco Technology, Inc. Late data detection in data center
US10089099B2 (en) 2015-06-05 2018-10-02 Cisco Technology, Inc. Automatic software upgrade
US10033766B2 (en) 2015-06-05 2018-07-24 Cisco Technology, Inc. Policy-driven compliance
US9553885B2 (en) 2015-06-08 2017-01-24 Illusive Networks Ltd. System and method for creation, deployment and management of augmented attacker map
US10063446B2 (en) 2015-06-26 2018-08-28 Intel Corporation Netflow collection and export offload using network silicon
US10389615B2 (en) 2015-06-29 2019-08-20 Cisco Technology, Inc. Enhanced packet flow monitoring in a network
US10362113B2 (en) 2015-07-02 2019-07-23 Prasenjit Bhadra Cognitive intelligence platform for distributed M2M/ IoT systems
US10091087B2 (en) 2015-07-20 2018-10-02 Cisco Technology, Inc. Methods and systems for load balancing based on data shard leader
US20170032310A1 (en) 2015-07-28 2017-02-02 Charles Mimnaugh Inventory management and marketplace
US10498588B2 (en) 2015-08-13 2019-12-03 Level 3 Communications, Llc Systems and methods for managing network health
US20170070582A1 (en) 2015-09-03 2017-03-09 Alcatel Lucent Network entity discovery and service stitching
US9733973B2 (en) 2015-09-16 2017-08-15 Cisco Technology, Inc. Automatically determining sensor location in a virtualized computing environment
US10291463B2 (en) * 2015-10-07 2019-05-14 Riverbed Technology, Inc. Large-scale distributed correlation
US10306490B2 (en) 2016-01-20 2019-05-28 Netscout Systems Texas, Llc Multi KPI correlation in wireless protocols
US10284444B2 (en) 2016-02-29 2019-05-07 Airmagnet, Inc. Visual representation of end user response time in a multi-tiered network application
CA3015628A1 (en) 2016-02-29 2017-09-08 Level 3 Communications, Llc Systems and methods for dynamic firewall policy configuration
WO2017168202A1 (en) 2016-03-27 2017-10-05 Yogesh Chunilal Rathod Identifying & storing followers, following users, viewers, users and connections for user
US10523598B2 (en) 2016-04-04 2019-12-31 Futurewei Technologies, Inc. Multi-path virtual switching
US10243926B2 (en) 2016-04-08 2019-03-26 Cisco Technology, Inc. Configuring firewalls for an industrial automation network
WO2017184233A1 (en) 2016-04-18 2017-10-26 Acalvio Technologies, Inc. Systems and methods for detecting and tracking adversary trajectory
US10153977B2 (en) 2016-05-12 2018-12-11 Cisco Technology, Inc. Adapting control plane policing parameters dynamically
US10171357B2 (en) 2016-05-27 2019-01-01 Cisco Technology, Inc. Techniques for managing software defined networking controller in-band communications in a data center network
CN109196807B (zh) * 2016-06-01 2021-09-24 瑞典爱立信有限公司 网络节点以及操作网络节点以进行资源分发的方法
US10289438B2 (en) 2016-06-16 2019-05-14 Cisco Technology, Inc. Techniques for coordination of application components deployed on distributed virtual machines
US20180007115A1 (en) 2016-07-01 2018-01-04 Cisco Technology, Inc. Fog enabled telemetry embedded in real time multimedia applications
US20180096081A1 (en) * 2016-09-30 2018-04-05 Hewlett Packard Enterprise Development Lp Relocation of an analytical process based on lineage metadata
US10972388B2 (en) 2016-11-22 2021-04-06 Cisco Technology, Inc. Federated microburst detection
CN107196807A (zh) 2017-06-20 2017-09-22 清华大学深圳研究生院 网络中间设备及其部署方法

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105847069A (zh) * 2012-06-06 2016-08-10 瞻博网络公司 针对虚拟网络分组流的物理路径确定

Also Published As

Publication number Publication date
US20210067849A1 (en) 2021-03-04
CN110521171A (zh) 2019-11-29
US11202132B2 (en) 2021-12-14
US10873794B2 (en) 2020-12-22
US11863921B2 (en) 2024-01-02
US20180287907A1 (en) 2018-10-04
US20220159357A1 (en) 2022-05-19
EP3602968A1 (en) 2020-02-05
WO2018183422A1 (en) 2018-10-04
US20230276152A1 (en) 2023-08-31
US11683618B2 (en) 2023-06-20

Similar Documents

Publication Publication Date Title
CN110521171B (zh) 用于应用性能监视和管理的流簇解析
US11088929B2 (en) Predicting application and network performance
US11750653B2 (en) Network intrusion counter-intelligence
US20220038353A1 (en) Technologies for annotating process and user information for network flows
US11159386B2 (en) Enriched flow data for network analytics
US10523541B2 (en) Federated network and application data analytics platform
CN111543038B (zh) 使用中间设备流拼接的网络流拼接
US20180278498A1 (en) Process representation for process-level network segmentation
US11503063B2 (en) Systems and methods for detecting hidden vulnerabilities in enterprise networks
US20190123983A1 (en) Data integration and user application framework
US11128700B2 (en) Load balancing configuration based on traffic flow telemetry
US20210218638A1 (en) Automatic configuration discovery based on traffic flow data
US10798015B2 (en) Discovery of middleboxes using traffic flow stitching
US20210392135A1 (en) Securing workload and application access from unauthorized entities

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant