CN110521171B - 用于应用性能监视和管理的流簇解析 - Google Patents
用于应用性能监视和管理的流簇解析 Download PDFInfo
- Publication number
- CN110521171B CN110521171B CN201880021765.XA CN201880021765A CN110521171B CN 110521171 B CN110521171 B CN 110521171B CN 201880021765 A CN201880021765 A CN 201880021765A CN 110521171 B CN110521171 B CN 110521171B
- Authority
- CN
- China
- Prior art keywords
- server
- network
- determining
- cluster
- telemetry
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012544 monitoring process Methods 0.000 title description 15
- 238000012545 processing Methods 0.000 claims abstract description 47
- 238000000034 method Methods 0.000 claims description 91
- 230000008569 process Effects 0.000 claims description 63
- 230000004044 response Effects 0.000 claims description 45
- 230000015654 memory Effects 0.000 claims description 24
- 239000013598 vector Substances 0.000 claims description 15
- 238000010801 machine learning Methods 0.000 claims description 9
- 230000002547 anomalous effect Effects 0.000 claims description 7
- 239000002184 metal Substances 0.000 claims description 3
- 230000002159 abnormal effect Effects 0.000 claims description 2
- 230000000306 recurrent effect Effects 0.000 claims 3
- 238000011524 similarity measure Methods 0.000 claims 2
- 238000003012 network analysis Methods 0.000 abstract description 43
- 235000019580 granularity Nutrition 0.000 abstract description 10
- 230000005540 biological transmission Effects 0.000 abstract description 6
- 230000008439 repair process Effects 0.000 abstract description 4
- 238000004891 communication Methods 0.000 description 18
- 238000003860 storage Methods 0.000 description 14
- 230000006870 function Effects 0.000 description 10
- 238000004458 analytical method Methods 0.000 description 9
- 238000013459 approach Methods 0.000 description 8
- 230000007246 mechanism Effects 0.000 description 7
- 238000012549 training Methods 0.000 description 6
- 230000003993 interaction Effects 0.000 description 5
- 238000005192 partition Methods 0.000 description 5
- 230000010076 replication Effects 0.000 description 5
- 235000008694 Humulus lupulus Nutrition 0.000 description 4
- 230000001934 delay Effects 0.000 description 4
- 238000001514 detection method Methods 0.000 description 4
- 238000005070 sampling Methods 0.000 description 4
- 101100270983 Arabidopsis thaliana ASE3 gene Proteins 0.000 description 3
- 238000013528 artificial neural network Methods 0.000 description 3
- 230000015556 catabolic process Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 238000003066 decision tree Methods 0.000 description 3
- 238000006731 degradation reaction Methods 0.000 description 3
- 238000009826 distribution Methods 0.000 description 3
- 239000012634 fragment Substances 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000007637 random forest analysis Methods 0.000 description 3
- 239000010979 ruby Substances 0.000 description 3
- 229910001750 ruby Inorganic materials 0.000 description 3
- 239000007787 solid Substances 0.000 description 3
- 238000012706 support-vector machine Methods 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 101100270982 Arabidopsis thaliana ASE2 gene Proteins 0.000 description 2
- 230000004931 aggregating effect Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 239000000470 constituent Substances 0.000 description 2
- 238000013480 data collection Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000003909 pattern recognition Methods 0.000 description 2
- 230000011218 segmentation Effects 0.000 description 2
- 238000000638 solvent extraction Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 240000005020 Acaciella glauca Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000000593 degrading effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 210000005069 ears Anatomy 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 235000003642 hunger Nutrition 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 235000003499 redwood Nutrition 0.000 description 1
- 238000005067 remediation Methods 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000007493 shaping process Methods 0.000 description 1
- 230000037351 starvation Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q9/00—Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
- H04Q9/02—Automatically-operated arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3495—Performance evaluation by tracing or monitoring for systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L13/00—Details of the apparatus or circuits covered by groups H04L15/00 or H04L17/00
- H04L13/02—Details not particular to receiver or transmitter
- H04L13/04—Driving mechanisms; Clutches
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
- H04L41/064—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis involving time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0681—Configuration of triggering conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/02—Capturing of monitoring data
- H04L43/026—Capturing of monitoring data using flow identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2209/00—Arrangements in telecontrol or telemetry systems
- H04Q2209/20—Arrangements in telecontrol or telemetry systems using a distributed architecture
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Medical Informatics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Environmental & Geological Engineering (AREA)
Abstract
一种应用和网络分析平台可从在网络内操作的服务器和网络设备捕获遥测。所述应用和网络分析平台可针对在所述网络中执行的应用确定应用依赖图(ADM)。使用所述ADM,所述应用和网络分析平台可将流解析成各种粒度的流簇,并且针对所述流簇确定基线度量。所述基线度量可包括用于所述流簇的传输时间、处理时间和/或数据大小。所述应用和网络分析平台可对照所述基线来比较新流簇以针对所述应用评估可用性、负载、延迟和其他性能度量。在一些实施方式中,所述应用和网络分析平台可使不可用性、负载、延迟和其他应用性能问题的修复自动化。
Description
技术领域
本公开的主题通常涉及计算机网络的领域,并且更具体地涉及应用性能监视和管理。
背景技术
应用性能管理或应用性能监视(APM)系统是企业可使用来评估在企业的数据中心中操作的应用的状态(诸如对于应用来说可能出现的可用性、负载、延迟和其他性能问题)的工具。一些常规网络依靠应用的内置监视实用程序,但是并非每一应用都包括这些实用程序。此外,对于具有数百或数千个应用的典型企业网络来说,采取这样的自组织方法以进行应用监视可能是站不住脚的。某些常规APM平台可能需要将代码注入到应用中以将应用与这些平台集成在一起。这是可能需要开发团队与被分派此后管理应用任务的团队之间的仔细协调的非平凡任务。这也会影响应用的性能,因为在应用的执行路径中直接地发生日志记录和其他监视特征。此方法也不适于企业不能修改的第三方应用和/或部署在外部的应用(例如,经由软件即服务(SaaS)或公用云提供商)。一些常规APM系统使用托管应用的服务器上的测量硬件和/或软件,然而其他APM系统可能依靠网络设备上的类似的工具。两种方法可负面地影响托管硬件和/或软件的性能。
此外,这些技术是不完整的,因为它们优于应用性能而忽视网络性能,或者反之亦然。
附图说明
图1图示依照实施例的用于提供应用性能监视(APM)的应用和网络分析平台的示例;
图2图示依照实施例的网络设备的专用集成电路(ASIC)的转发流水线的示例;
图3图示依照实施例的APM引擎的示例;
图4图示依照实施例的网络环境的示例;
图5图示依照实施例的请求和响应序列的示例;
图6图示依照实施例的用于将流解析成流簇以进行应用性能监视和管理的示例方法;以及
图7A和图7B图示依照一些实施例的系统的示例。
具体实施方式
概要
应用和网络分析平台可从在网络内操作的服务器(例如,物理和/或虚拟服务器)(有时也称为主机、端点、计算设备、机器等)和网络设备(例如,交换机、路由器、集线器等)捕获遥测(例如,流数据、服务器数据、进程数据、用户数据、策略数据等)。应用和网络分析平台可针对在网络中执行的一个或多个应用确定应用依赖图(ADM)。使用ADM,应用和网络分析平台可将流解析成不同粒度的流簇(flowlet),并且针对这些流簇确定基线度量。基线度量可包括用于流簇的传输时间、处理时间和/或数据大小(以分组和/或字节数为单位)。应用和网络分析平台可对照基线来比较新流簇以针对一个或多个应用评估可用性、负载、延迟和其他性能度量。在一些实施例中,应用和网络分析平台可使不可用性、负载、延迟和其他应用性能问题的修复自动化或者基本上使不可用性、负载、延迟和其他应用性能问题的修复自动化。
描述
图1图示依照实施例的应用和网络分析平台100的示例。由加利福尼亚州圣何塞的Cisco公司提供的Tetration AnalyticsTM是应用和网络分析平台100的一个示例实施方式。然而,除非另外陈述,否则本领域的技术人员应理解的是,图1(以及通常在本公开中讨论的任何系统)只是应用和网络分析平台的一个可能的实施例,并且其他实施例可包括以类似的或替代次序或者并行布置的附加的、更少的或替代组件。在图1的示例中,应用和网络分析平台100包括数据收集层110、分析引擎120和呈现层140。
数据收集层110可以包括软件传感器112、硬件传感器114和客户/第三方数据源116。软件传感器112可在网络的服务器内运行,所述服务器诸如物理或裸机(bare metal)服务器;管理程序、虚拟机监视器、容器编排器或其他虚拟实体管理器;虚拟机、容器或其他虚拟实体。硬件传感器114可驻留在交换机、路由器或其他网络设备(例如,诸如独立分组监视器这样的分组捕获(pcap)器具、连接到网络设备的监视端口的设备、沿着数据中心的主干线串联连接的设备或类似的设备)的应用专用集成电路(ASIC)上。软件传感器112可从服务器捕获遥测(例如,流数据、服务器数据、进程数据、用户数据、策略数据等),而硬件传感器114可从网络设备捕获网络遥测(例如,流数据),并且将遥测发送到分析引擎120以用于进一步处理。例如,软件传感器112可嗅探通过其主机的物理或虚拟网络接口卡(NIC)发送的分组,或者每个服务器上的单独的进程可将遥测报告给软件传感器112。硬件传感器114可以线路速率从托管硬件传感器的网络设备的所有端口捕获网络遥测。
图2图示用于网络设备的ASIC的单播转发流水线200的示例,所述网络设备可以线路速率在对CPU有最小影响的情况下捕获网络遥测。在一些实施例中,一个或多个网络设备可以并入用于实现转发流水线200的ASE2或ASE3ASIC。例如,某些实施例包括由Cisco/>提供的利用ASE2或ASE3 ASIC或等效ASIC的一个或多个Cisco/>9000系列交换机。ASIC可以具有多个分片(例如,ASE2和ASE3分别具有六个分片和两个分片),其中每个分片表示具有入口转发流水线210和出口转发流水线220两者的交换子系统。入口转发流水线210可包括输入/输出(I/O)组件、入口MAC 212;输入转发控制器214;以及输入数据路径控制器216。出口转发流水线220可包括输出数据路径控制器222、输出转发控制器224和I/O组件、出口MAC 226。这些分片可以连接到广播网络230,所述广播网络230可以提供来自每个分片的点对多点连接和各片之间的全部连接。广播网络230可提供足够的带宽以同时支持所有分片之间的全线路速率转发。当分组进入网络设备时,分组通过入口MAC 212的端口驻留在上面的分片的入口转发流水线210,遍历广播网络230以进入出口分片,然后通过出口分片的出口转发流水线220。输入转发控制器214可从入口MAC 212的端口接收分组,解析分组报头,并且执行一系列查找以确定是否转发分组以及如何将分组转发到其预定目的地。输入转发控制器214还可生成用于输入数据路径控制器216存储和排队分组的指令。在一些实施例中,网络设备可以是直通式交换机,使得网络设备在将分组存储在输入数据路径控制器216的暂停缓冲器块(未示出)中的同时执行输入转发。
如所讨论的,输入转发控制器214可以对传入分组执行若干操作,包括解析分组报头、执行L2查找、执行L3查找、处理入口访问控制列表(ACL)、对入口业务进行分类以及聚合转发结果。尽管以此顺序描述由输入转发控制器214执行的任务,然而普通技术人员应理解的是,除非另外陈述,否则在各种实施例的范围内,对于本文讨论的任何进程,可以存在以类似的或替代次序或并行执行的附加的、更少的或替代步骤。
在一些实施例中,当单播分组通过前面板端口(例如,入口MAC 212的端口)进入时,输入转发控制器214可以首先执行分组报头解析。例如,输入转发控制器214可以解析分组的前128个字节以提取并保存诸如L2报头、EtherType、L3报头和TCP IP协议这样的信息。
随着分组通过入口转发流水线210,分组可以经历L2切换和L3路由查找。输入转发控制器214可以首先检查分组的目的地MAC地址以确定是交换分组(即,L2查找)还是路由分组(即,L3查找)。例如,如果目的地MAC地址与网络设备自己的MAC地址匹配,则输入转发控制器214可执行L3路由查找。如果目的地MAC地址与网络设备的MAC地址不匹配,则输入转发控制器214可以基于目的地MAC地址来执行L2交换查找以确定虚拟LAN(VLAN)标识符。如果输入转发控制器214在MAC地址表中找到匹配,则输入转发控制器214可将分组发送到出口端口。如果对目的地MAC地址和VLAN标识符来说不存在匹配,则输入转发控制器214可将分组转发到相同VLAN中的所有端口。
在L3路由查找期间,输入转发控制器214可将目的地IP地址用于L3主机表中的搜索。此表可存储用于直连附连的主机和学习的/32主机路由的转发条目。如果目的地IP地址与主机表中的条目匹配,则该条目将提供目的地端口、下一跳MAC地址和出口VLAN。如果输入转发控制器214对于目的地IP地址在主机表中未找到匹配,则输入转发控制器214可在LPM路由表中执行最长前缀匹配(LPM)查找。
除了转发查找之外,输入转发控制器214还可以对分组执行入口ACL处理。例如,输入转发控制器214可以检查ACL三元内容可寻址存储器(TCAM)是否有入口ACL匹配。在一些实施例中,每个ASIC可以具有每分片4000个条目的入口ACL TCAM表以支持系统内部ACL和用户定义的入口ACL。这些ACL可包括端口ACL、路由ACL和VLAN ACL等。在一些实施例中,输入转发控制器214可按照分片定位ACL条目并且仅在需要的情况下对它们进行编程。
在一些实施例中,输入转发控制器214还可以支持入口业务分类。例如,从入口接口,输入转发控制器214可以基于分组报头中的地址字段、IEEE 802.1q服务类(CoS)和IP优先或差异化服务代码点对业务进行分类。在一些实施例中,输入转发控制器214可将业务指派给八个服务质量(QoS)组中的一个。随着分组遍历系统,QoS组可以在内部标识用于后续QoS进程的业务类。
在一些实施例中,输入转发控制器214可以收集在流水线中早期(例如,在分组报头解析、L2查找、L3查找、入口ACL处理、入口业务分类、转发结果生成等期间)生成的转发元数据并且通过输入数据路径控制器216将它向下游传递。例如,输入转发控制器214可将64字节内部报头连同分组一起存储在缓冲器中。此内部报头可包括16字节的iETH(内部通信协议)报头信息,当通过广播网络230将分组转移到输出数据路径控制器222时,输入转发控制器214可将所述16字节的iETH(内部通信协议)报头信息追加到分组。当分组退出出口MAC226的前面板端口时,网络设备可剥离16字节iETH报头。网络设备可以使用剩余的内部报头空间(例如,48个字节)来将元数据从输入转发队列传递到输出转发队列以供由输出转发引擎消费。
在一些实施例中,输入数据路径控制器216可执行入口计数功能、接纳功能以及用于无丢弃服务类的流控制。入口接纳控制机制可基于可用的缓冲存储器的量以及已经由入口端口使用的缓冲空间的量和业务类来确定是否接纳分组进入存储器。输入数据路径控制器216可通过广播网络230将分组转发到输出数据路径控制器222。
如所讨论的,在一些实施例中,广播网络230可包括提供ASIC的所有分片之间的连接的一组点对多点线。输入数据路径控制器216可以在网络设备的所有分片(包括它自己的分片)上具有到输出数据路径控制器222的点对多点连接。
在一些实施例中,输出数据路径控制器222可执行出口缓冲器计数、分组排队、调度和多播复制。在一些实施例中,所有端口可动态地共享出口缓冲器资源。在一些实施例中,输出数据路径控制器222还可执行分组整形。在一些实施例中,网络设备可实现简单出口排队架构。例如,在出口端口拥塞的情况下,输出数据路径控制器222可直接将分组排队在出口分片的缓冲器中。在一些实施例中,在入口分片上可以没有虚拟输出队列(VoQ)。此方法可简化系统缓冲器管理和排队。
如所讨论的,在一些实施例中,一个或多个网络设备可支持出口上多达10个业务类、通过QoS组标识符标识的8个用户定义类、CPU控制业务类和交换端口分析器(SPAN)业务类。每个用户定义类可每出口端口具有单播队列和多播队列。此方法可帮助确保单个端口将不消耗超过其缓冲存储器的公平份额并且对于其他端口引起缓冲器饥饿。
在一些实施例中,多播分组可以作为单播分组通过类似的入口和出口转发流水线,但是替代地使用多播表用于多播转发。另外,组播分组可以通过多级复制进程以便转发到多个目的地端口。在一些实施例中,ASIC可包括通过非阻塞内部广播网络互连的多个分片。当多播分组到达前面板端口时,ASIC可执行转发查找。此查找可解析与入口端口相同的分片上的本地接收端口并且提供在目的地多播组中具有接收端口的预定接收分片的列表。转发引擎可以在本地端口上复制分组,并且将分组的一个副本发送到内部广播网络,同时内部报头中的位向量被设置为指示预定接收分片。以这种方式,仅预定接收分片可以从广播网络的线接受分组。对于此组没有接收端口的分片可丢弃分组。接收分片然后可执行本地L3复制或L2扇出查找和复制以将分组的副本转发到其本地接收端口中的每一个。
在图2中,转发流水线200还包括流高速缓存240,其当与从ASIC收集的遥测的直接导出(即,数据硬件流)组合时,可使得能够以线路速率收集分组和流元数据,同时避免CPU瓶颈或开销。流高速缓存240可提供由网络设备发送和接收的分组和流的完整视图。流高速缓存240可在每分组基础上收集信息,而无需采样并且而不会增加延迟或者使网络设备的性能降级。为了实现这个,流高速缓存240可从转发流水线200中拉出信息,而不用在业务路径(即,入口转发流水线210和出口转发流水线220)中。
除了传统转发信息之外,流高速缓存240还可收集其他元数据,诸如详细的IP和TCP标志以及隧道端点标识符。在一些实施例中,流高速缓存240还可检测分组流中的反常,诸如不一致的TCP标记。流高速缓存240还可以跟踪流性能信息,诸如流的突发和延迟。通过提供这种级别的信息,流高速缓存240可产生流的健康状况的更好视图。此外,因为流高速缓存240不执行采样,所以流高速缓存240可提供对流的完全可见性。
在一些实施例中,流高速缓存240可包括用于补充反常检测的事件机制。这种可配置的机制可定义表示感兴趣分组的一组参数。当分组与这些参数匹配时,事件机制可触发关于触发了事件的元数据(而不只是累积流信息)的事件。这种能力可给予流高速缓存240对累积流信息的洞察以及对特定感兴趣事件的可见性。以这种方式,网络(诸如实现应用和网络分析平台100的网络)可更全面地捕获遥测并且不影响应用和网络性能。
返回到图1,由软件传感器112和硬件传感器114捕获的遥测可包括与单独的分组有关的元数据(例如,分组大小、源地址、源端口、目的地地址、目的地端口等);流(例如,在没有不活动的情况下在一定时间(例如,15秒)内发送/接收的或者在一定持续时间(例如,30分钟)内发送/接收的具有相同的源地址/端口、目的地地址/端口、L3协议类型、服务类、路由器/交换机接口等的分组的数量和分组的聚合大小);流簇(例如,作为原始请求或响应流的一部分而生成的子请求和子响应的流以及这些流的子流);双向流(例如,具有对应的源地址/端口、目的地地址/端口等的流的请求/响应对的流数据);流组(例如,用于与某个进程或应用、服务器、用户等相关联的流的流数据)、会话(例如,用于TCP会话的流数据);或指定粒度的其他类型的网络通信。也就是说,网络遥测通常可包括描述开放系统互连(OSI)模型的所有层上的通信的任何信息。在一些实施例中,由传感器112和114收集的网络遥测还可包括其他网络业务数据,诸如跳延迟、分组丢弃计数、端口利用率、缓冲器信息(例如,瞬时队列长度、平均队列长度、拥塞状态等)和其他网络统计。
在一些实施例中,应用和网络分析平台100可将流解析成各种粒度的流簇(即,较大请求和响应的请求和响应的序列)。例如,对到企业应用的请求的响应可以对各种后端服务(例如,认证、静态内容、数据、搜索、同步等)产生多个子请求和子响应。应用和网络分析平台100可将流入分解成其组成分量以提供对应用和网络性能的更深入洞察。应用和网络分析平台100可实时地或基本上实时地(例如,在检测到流之后不超过几分钟)执行此解析。
应用和网络分析平台100可使流与发送或者接收该流的服务器、触发该流的应用或进程、应用或进程的所有者以及适用于该流的一个或多个策略和其他遥测相关联。由软件传感器112捕获的遥测因此可包括服务器数据、进程数据、用户数据、策略数据和其他数据(例如,虚拟化信息、租户信息、传感器信息等)。服务器遥测可包括服务器名称、网络地址、CPU使用率、网络使用率、磁盘空间、端口、登录用户、调度作业、打开文件和类似的信息。在一些实施例中,服务器遥测还可包括关于服务器的文件系统的信息,诸如存储在文件系统内的文件(例如,日志文件、配置文件、设备特殊文件等)和/或目录的列表以及用于文件和目录的元数据(例如,文件和/或目录的存在、不存在或修改)。在一些实施例中,服务器遥测还可包括物理或虚拟配置信息(例如,处理器类型、随机存取存储器(RAM)的量、磁盘或存储装置的量、存储装置的类型、系统类型(例如,32位或64位)、操作系统、公用云提供商、虚拟化平台等)。
进程遥测可包括进程名称(例如,bash、httpd、netstat等)、进程标识符、父进程标识符、进程的路径(例如,/usr2/username/bin/、/usr/local/bin、/usr/bin等)、CPU利用率、存储器利用率、存储器地址、调度信息、nice值、标志、优先级、状态、开始时间、终端类型、由进程花费的CPU时间和发起了进程的命令字符串(例如,“/opt/tetration/collector/tet-collector--config_file/etc/tetration/collector/collector.config--timestamp_flow_info--logtostderr--utc_time_in_file_nametrue--max_num_ssl_sw_sensors 63000--enable_client_certificate true”)。用户遥测可包括有关进程所有者的信息,诸如用户名字、用户标识符、用户的真实名字、电子邮件地址、用户的组、终端信息、登录时间、登录的到期日期、空闲时间以及有关用户的文件和/或目录的信息。
客户/第三方数据源116可包括带外数据,诸如功率水平、温度和物理定位(例如,房间、行、机架、笼门位置等)。客户/第三方数据源116还可包括有关服务器的第三方数据,诸如服务器是否在IP监视列表或安全报告(例如,由马萨诸塞州伯灵顿的加利福尼亚州桑尼维尔的/>公司、英国阿宾登的/>集团股份有限公司、华盛顿州西雅图的/>公司、纽约州纽约的/>通信公司及其他公司提供)上、地理定位数据和Whois数据以及来自外部来源的其他数据。
在一些实施例中,客户/第三方数据源116可包括来自作为服务的配置管理数据库(CMDB)或配置管理系统(CMS)的数据。CMDB/CMS可以以适合的格式(例如,对象表示法(JSON)、可扩展标记语言(XML)、又一种标记语言(YAML)等))发送配置数据。
分析引擎120的处理流水线122可收集并处理遥测。在一些实施例中,处理流水线122可每100ms或更快地从软件传感器112和硬件传感器114中取回遥测。因此,应用和网络分析平台100可能不会错过或者比常规系统(其通常每60秒收集遥测)更不太可能错过“鼠标”流。另外,因为遥测表刷新如此频繁,所以软件传感器112和硬件传感器114确实不会或者比常规系统更不太可能由于存储器的溢出/缺少而丢弃遥测。此方法的附加优点是应用和网络分析平台代替网络设备负责流状态跟踪。因此,各种实施方式的网络设备的ASIC可以是更简单的或者可并入其他特征。
在一些实施例中,处理流水线122可滤出无关或重复数据或者它可创建遥测的摘要。在一些实施例中,处理流水线122可以处理(并且/或者软件传感器112和硬件传感器114可以捕获)仅某些类型的遥测并且忽略其余部分。例如,处理流水线122可以处理(并且/或者传感器可以监视)仅高优先级遥测、与特定子网(例如,财务部门、人力资源部门等)相关联的遥测、与特定应用(例如,业务关键应用、合规软件、医疗保健应用等)相关联的遥测、来自面向外部的服务器的遥测等。作为另一示例,处理流水线122可以仅处理(并且/或者传感器可以捕获)仅遥测的代表性样本(例如,每第1,000个分组或其他适合的采样速率)。
从网络的多个服务器(包括在虚拟化主机的多个分区内)并且从在服务器之间操作的多个网络设备收集和/或处理遥测可提供网络行为的全面视图。从多个视角而不是仅仅在位于数据路径中(或者与数据路径中的组件通信)的单个设备捕获和/或处理遥测可允许数据从各种数据源相关联,所述各种数据源可以被分析引擎120用作附加数据点。
另外,从多个视点收集和/或处理遥测可使得能够捕获更准确的数据。例如,常规网络可以由面向外部的网络设备(例如,路由器、交换机、网络器具等)构成,使得常规网络可能无法监视东西业务,包括针对同一主机上的VM到VM或容器到容器通信的遥测。作为另一示例,常规网络可以在那些分组遍历并入传感器的网络设备之前丢弃一些分组。处理流水线122可通过从多个潜在故障点捕获并处理遥测来基本上减轻或者消除这些问题。此外,处理流水线122可对照彼此来针对流(例如,来自源(物理服务器、管理程序、容器编排器、其他虚拟实体管理器、VM、容器和/或其他虚拟实体)、一个或多个网络设备和目的地的遥测)验证数据的多个实例。
在一些实施例中,处理流水线122可针对由多个传感器捕获的单个流来评估遥测的准确度并且利用来自单个传感器的被确定为最准确和/或完整的遥测。准确度可基于诸如网络拓扑这样的因素(例如,更靠近源的传感器可能更可能比更靠近目的地的传感器更准确)、传感器或托管该传感器的服务器的状态(例如,受损的传感器/服务器与未受损的传感器/服务器相比可以具有不太准确的遥测)或遥测量(例如,捕获较大量遥测的传感器可能比捕获较小量遥测的传感器更准确)。
在一些实施例中,处理流水线122可组装来自多个传感器的最准确的遥测。例如,沿着数据路径的第一传感器可以捕获流的第一分组的数据但是可以遗漏流的第二分组的数据,然而沿着数据路径的第二传感器可以发生相反情形。处理流水线122可组装来自由第一传感器捕获的第一分组和由第二传感器捕获的第二分组的流的数据。
在一些实施例中,处理流水线122还可将流拆开或者分解成各种粒度的请求和响应流簇的序列(例如,较大请求或响应的请求和响应的序列)。例如,对企业应用的请求的响应可以对各种后端服务(例如,认证、静态内容、数据、搜索、同步等)产生多个子请求和子响应。处理流水线122可将流分解成其组成分量以提供对应用和网络性能的更深入洞察。处理流水线122可实时地或基本上实时地(例如,在检测到流之后不超过几分钟)执行此解析。
处理流水线122可将遥测存储在数据湖(未示出)中,所述数据湖是通过用于各种类型的数据的大容量存储、巨大处理能力以及处理几乎无限的并发任务或作业的能力来表征的大规模储存库。在一些实施例中,分析引擎120可以使用来自马里兰州森林山的软件基金会的/>分布式文件系统(HDFSTM)来部署数据湖的至少一部分。HDFSTM是可缩放到数千个集群节点、数百万个文件和数千兆字节数据的高度可扩展和分布式文件系统。HDFSTM的特征是其针对批处理的优化,诸如通过协调对数据所位于的地方的数据计算。HDFSTM的另一特征是其对用于整个集群在一次写入、多次读取访问模型中实现数据一致性的单个命名空间的利用。典型的HDFSTM实施方式将文件分成块,所述块的大小通常是64MB并且在多个数据节点中被复制。客户端可直接地从数据节点访问数据。
处理流水线122可将经处理的数据传播到分析引擎120的一个或多个引擎、监视器和其他组件(并且/或者这些组件可从数据湖中取回数据),诸如应用依赖映射(ADM)引擎124、清单监视器126、流监视器128和应用性能监视(APM)引擎130。
ADM引擎124可确定在网络中运行的应用的依赖性,即,不同服务器上的进程如何彼此交互以执行应用的功能。业务的特定模式可以与特定应用相关。ADM引擎124可评估由处理流水线122处理的遥测以确定应用的互连性或依赖性以生成应用的图形(即,应用依赖映射)。例如,在用于web应用的常规三层架构中,web层的第一服务器、应用层的第二服务器和数据层的第三服务器组成web应用。根据流数据,ADM引擎124可以确定存在与超文本转移协议(HTTP)请求和响应相对应的在第一服务器的端口80上在外部服务器之间流动的第一业务。流数据还可以指示与应用服务器请求和响应相对应的第一服务器的第一端口与第二服务器的第二端口之间的第二业务以及与数据库请求和响应相对应的在第二服务器的第三端口与第三服务器的第四端口之间流动的第三业务。ADM引擎124可以将此应用的应用依赖映射或图形定义为包括含有第一服务器的第一端点组(EPG)(即,用于实现转发和策略逻辑的应用层或集群、应用和/或应用组件的分组)、含有第二服务器的第二EPG和含有第三服务器的第三EPG的三层应用。
清单监视器126可基于由处理流水线122处理的遥测来连续地跟踪网络的资产(例如,服务器、网络设备、应用等)。在一些实施例中,清单监视器126可以指定间隔(例如,每1分钟)评估网络的状态。也就是说,清单监视器126可周期性地拍摄网络的应用、服务器、网络设备和/或其他元件的状态的快照。在其他实施例中,清单监视器126可在发生感兴趣事件时捕获快照,所述感兴趣事件诸如应用经历超过应用延迟阈值的延迟;网络经历超过网络延迟阈值的延迟;服务器、网络设备或其他网络元件的故障;以及类似的情况。快照可包括与网络元件相关联的各种遥测。例如,服务器的快照可表示在捕获时在服务器上执行的进程、由每个进程利用的CPU的量(例如,作为时间的量和/或相对百分比)、由每个进程利用的存储器的量(例如,以字节为单位和/或作为相对百分比)、由每个进程利用的磁盘的量(例如,以字节为单位或者作为相对百分比)以及离一个或多个其他网络元件的距离(物理的和/或逻辑的、相对的和/或绝对的)。
在一些实施例中,在网络的变化(例如,服务器更新其操作系统或者运行新进程;服务器在新端口上通信;VM、容器或其他虚拟化实体迁移到不同的主机和/或子网、VLAN、VxLAN或其他网段;等)时,清单监视器126可向APM引擎130报警以确保应用和网络鉴于数据中心的变化保持像预期那样执行。
流监视器128可分析流以检测它们是否与反常或恶意业务相关联。在一些实施例中,流监视器128可以接收被确定为按预期表现(即,流到达网络设备或目的地的时间长度在阈值时间长度内)或者表现低于预期(即,流到达网络设备和/或目的地的时间长度超过阈值时间长度)的过去流的示例。流监视器128可利用机器学习来分析由处理流水线122处理的遥测并且基于与过去流的相似性来对每个当前流进行分类。在检测到反常流(诸如从源到目的地花费比指定时间范围更短或更长的持续时间的流、大小小于或大于指定量的流或先前被分类为网络攻击的流)时,流监视器128可以向APM引擎130和/或向呈现层140发送警报。在一些实施例中,网络可以在可信环境中操作持续一段时间,使得分析引擎120可建立正常操作的基线。
APM引擎130可负责监视并管理在网络内运行的应用。例如,APM引擎130可以在网络的变化时接收到来自清单监视器126的警报或者在流监视器128检测到反常流时接收到来自流监视器的警报。APM引擎130可评估遥测以精确定位性能降级的根本原因。在一些实施例中,APM引擎130还可执行修复任务,诸如负载平衡、将应用组件迁移得(在物理上和/或在逻辑上)更靠近在一起、使新服务器实例实例化(在专用网络和/或公用云中)以及对于有问题的服务器禁用网络连接及其他操作。
图3图示表示APM引擎130的许多可能的实施方式中的一个的应用性能监视(APM)引擎300的示例。APM引擎300可包括一个或多个性能前端进程(PFE)310、协调器集群320和遥测暂存器330。虽然APM引擎300在此示例中包括具体组件,但是本领域的普通技术人员应理解的是,APM引擎300的配置是一个可能的配置并且具有更多或更少组件的其他配置也是可能的。
图3示出与传感器302通信的PFE 310。传感器302表示图1的软件传感器112和/或硬件传感器114的许多可能的实施方式中的一个。在安装在数据中心的服务器和/或网络设备上之后,每个传感器302可经由与PFE310中的一个或多个进行通信来向协调器集群320注册。在成功注册后,传感器302可以开始捕获遥测,包括流数据、主机数据、进程数据、用户数据、策略数据等。传感器302可以不时地接收新配置信息,诸如以捕获用于诊断目的或者用于软件升级的附加遥测。在一些实施例中,APM引擎300可以以高级平台无关格式对配置信息进行编码。在一些实施例中,每个传感器302可确定其服务器的操作环境,将高级配置信息转换成平台特定配置信息,并且基于操作环境来应用某些平台特定优化。在其他实施例中,APM引擎300可以在分发之前从传感器302远程地将高级配置信息转化为平台特定格式。
在一些实施例中,PFE 310可负责将平台无关配置信息存储在存储器中、处理传感器302的注册、监视对配置信息的更新、将更新分发到传感器302并且收集由传感器302捕获的遥测。在图3的示例中,PFE 310可充当传感器302与协调器集群320之间的媒介。这可在服务器与APM引擎300之间添加一层安全性。例如,传感器302可在信任仅协调器集群320而不信任PFE 310的最小特权原则下操作。传感器302和PFE 310必须对它们之间的所有事务(包括配置和注册)进行签名和认证。
协调器集群320可作为用于APM引擎300的控制器来操作。在图3的示例中,协调器集群320实现高可用性方案(例如,ZooKeeper、doozerd和etcd),其中集群选举一个协调器实例主控而剩余协调器实例用作备用实例。协调器集群320可管理传感器302到PFE 310的指派。在一些实施例中,每个传感器302可以最初向最靠近(在物理上和/或在逻辑上)传感器的主机的PFE 310注册,但是例如为了负载平衡和/或在PFE 310中的一个或多个发生故障的情况下,协调器集群320可以将传感器重新指派给不同的PFE。在一些实施例中,协调器集群320可以将分片(sharding)用于负载平衡并且为PFE 310提供高可用性。
遥测暂存器330可维护由传感器302捕获的传感器数据。在一些实施例中,APM引擎可在更容易可访问的数据暂存器(例如,固态设备(SSD)、优化的硬盘驱动器(HDD)等)中维护最近捕获和/或访问的遥测并且将较旧的遥测迁移到不太可访问的数据暂存器(例如,商品HDD、磁带等)。在一些实施例中,APM引擎300可以使用或其他关系数据库平台来实现遥测暂存器330。在其他实施例中,APM引擎300可以使用由纽约州纽约的/>公司提供的软件或其他NoSQL数据库来实现遥测暂存器330。
在一些实施例中,协调器集群320还可以负责使PFE 310负载平衡、确保PFE 310对传感器302的高可用性并且在遥测暂存器330中接收和存储遥测。在其他实施例中,APM引擎300可集成PFE和协调器的功能性或者将PFE和协调器的功能性进一步划分成附加组件。
返回到图1,呈现层140可包括web图形用户界面(GUI)142、API端点144和基于事件的通知系统146。在一些实施例中,应用和网络分析平台100可以使用Ruby on RailsTM作为web应用框架来实现web GUI 142。Ruby on RailsTM是为数据库、web服务和web页面提供默认结构的模型-视图-控制器(MVC)框架。Ruby on RailsTM依靠诸如用于数据转移的JSON或XML这样的web标准以及用于显示和用户对接的超文本标记语言(HTML)、级联样式表(CSS)和
在一些实施例中,应用和网络分析平台100可暴露应用编程接口(API)端点(例如,诸如基于简单对象访问协议(SOAP)、面向服务架构(SOA)、代表性状态转移(REST)架构、面向资源架构(ROA)等的那些)以用于监视在网络中执行的应用和网络它本身的性能。在一些实施例中,应用和网络分析平台100可以使用来自的/>Hive用于后端并且使用来自加利福尼亚州红木滩的/>公司的/>数据库连接(JDBC)作为API层来实现API端点144。Hive是提供数据摘要和自组织查询的数据仓库基础设施。Hive提供用于使用称作HiveQL的结构化查询语言(SQL)的变体来查询数据的机制。JDBC是用于编程语言/>的应用编程接口(API),其定义客户端如何可以访问数据库。
在一些实施例中,应用和网络分析平台100可以使用Kafka来实现基于事件的通知系统。Kafka是支持分割和复制的分布式消息传送系统。Kafka使用主题的构思。主题是具体类别中的消息的馈源。在一些实施例中,Kafka可将原始分组捕获和遥测信息视为输入,并且将消息输出到安全信息和事件管理(SIEM)平台,所述SIEM平台给用户提供用于搜索、监视并分析机器生成的数据的能力。
在一些实施例中,网络中的每个服务器可以包括软件传感器并且每个网络设备可以包括硬件传感器114。在其他实施例中,软件传感器112和硬件传感器114可驻留在网络的服务器和网络设备的一部分上。在一些实施例中,软件传感器112和/或硬件传感器114可以在全可见性模式或有限可见性模式下操作,在所述全可见性模式下传感器从每一分组和每一流收集遥测,在所述有限可见性模式下传感器仅提供应用洞察和策略生成所需要的对话视图。
图4图示网络环境400的示例。普通技术人员应领会的是,对于网络环境400和本公开中讨论的任何环境,可在类似的或替代配置中存在附加或更少的节点、设备、链路、网络或组件。其他实施例可以具有不同数量和/或类型的客户端、网络、节点、云组件、服务器、软件组件、设备、虚拟或物理资源、配置、拓扑、服务、器具、部署或网络设备。进一步地,网络环境400可包括可由客户端或租户访问并利用的任何数量或类型的资源。
网络环境400可包括客户端计算设备402、广域网(WAN)404和局域网(LAN)410。尽管在这里出于简单和简洁的目的未示出,然而典型的数据中心还可以包括位于边缘网络设备406b与web服务器412之间的防火墙、负载平衡器和/或附加边缘路由器。客户端402可以是能够通过网络进行通信的任何种类的计算设备(即,具有不同的类型、能力、操作系统等),诸如服务器(物理的或虚拟的)、台式计算机、膝上型电脑、平板、智能电话或可穿戴设备(例如,手表;眼镜、遮阳板、头戴式显示器或通常穿戴在用户的眼睛上方的其他设备;耳机、耳塞或通常穿戴在用户的耳朵中或上方的其他设备;等等)。客户端402还可以是“信息娱乐系统”(即,与运输工具集成在一起的计算设备)、“智能”家庭设备或物联网(IoT)设备(例如,电视、机顶盒、数字视频记录器(DVR)、数字视频盘(DVD)播放器或其他媒体播放器、视频游戏控制台等)或其他电子设备。
WAN 404可包括一个或多个网络和/或网络设备,诸如网络设备406a和406b,以用于互连客户端402和LAN 410。WAN可通过长距离通信链路连接地理上分散的节点,所述长距离通信链路诸如公共载波电话线、光学光路、同步光网络(SONET)或同步数字体系(SDH)链路。LAN和WAN可包括L2和/或L3网络和服务器。互联网是连接全世界不同的网络从而提供各种网络上的节点之间的全球通信的WAN的示例。节点通常通过根据预定义协议(诸如传输控制协议/网际协议(TCP/IP))交换数据的离散帧或分组来通过网络通信。在此上下文中,协议可指代定义节点如何彼此交互的一组规则。WAN 404也可以是专用网络,诸如全球企业网络,其使用与公用互联网类似或相同的技术来操作。
LAN可通过位于相同的一般物理定位(诸如建筑物或校园)中的专用私密通信链路来连接节点。在图4的示例中,LAN 410可以是包括单个简单web应用的数据中心。典型的数据中心可包括数百或数千个更简单或更复杂的应用。Web应用包括连接到网络设备414(例如,集线器、交换机、路由器等)以便与认证服务器416、内容服务器418和数据服务器420进行通信的web服务器412。数据服务器420可直接地或间接地连接到数据库422。尽管图4可以看起来示出web服务器412、认证服务器416、内容服务器418和数据服务器420作为单独的元件,然而服务器或服务器的各种组合可作为虚拟机、容器或其他虚拟实体驻留在单个物理机器上。类似地,网络设备414可以是一个或多个物理网络设备、虚拟网络设备,或各种配置(例如,叶脊、三层(即,包括核心、聚合和访问级别)、胖树、网格、总线、集中星型等)中的物理和虚拟网络设备的各种组合。
在图4的示例中,web应用可以是与一个或多个用户账户相关联的简单网站。用户可以登录到其账户并访问其个人信息和其他内容。用户可以从客户端设备402(例如,经由独立客户端应用、web浏览器、插件等)访问她的与网站/web应用相关联的账户。客户端设备402可以通过WAN404(例如,互联网、企业网络等)与位于LAN 410中的网站/web应用进行通信以便用户以任何数量的方式与她的账户交互,诸如更新特权信息(例如,名字、电子邮件地址、登录密码等)、查看内容、创建内容等。每个交互可构成对网站/web应用的请求并且该请求的结果可以是响应。然而,每个请求可以包括一个或多个附加子请求和子响应。同样地,每个响应可包括一个或多个子请求和子响应。子请求和子响应的数量可主要取决于应用的复杂性。但是甚至诸如图4中图示的简单web应用/网站也可包括许多子请求和子响应。
图5图示针对与图4的网站/web应用的交互的请求和响应的时间序列500的示例。普通技术人员应理解的是,对于本文讨论的任何序列,除非另外陈述否则在各种实施例的范围内,可能存在以类似的或替代次序或者并行执行的附加的、更少的或替代步骤。用户交互可以是用户登录到网站/web应用中、点击以查看某些内容、在网站/web应用中搜索内容以及任何数量的可能性。在时间序列500中,垂直轴线对应于时间并且水平轴线示出网站/web应用的各个组件之间的通信。
在图5的示例中,客户端402可以发送对网站/web应用的特定页面或其他内容的始发请求(即,在点A处)。在遍历WAN 404之后,始发请求可以在持续时间AB之后到达web服务器412。如上面所讨论的,始发请求可以包括通过WAN 404、数据中心的边缘网络设备中的一个或多个、防火墙、负载平衡器以及其他软件和硬件组件的段,但是图5为了简洁和清楚而排除那些段。Web服务器412可以花费一些时间BC处理请求以确定请求是对需要认证的个人内容的请求。因此,web服务器412可以向认证服务器416发送认证请求(即,在点C处)以验证用户的登录名字和密码与由网站/web应用存储的用户的信息匹配。为了发送认证请求,web服务器412可以首先将认证请求转发到网络设备414持续持续时间CD。网络设备414可接收认证请求,花费一定量的时间DE来处理认证请求的分组并且将请求转发到认证服务器416持续持续时间EF。认证服务器416可以处理认证请求并且准备认证响应(即,在点G处)持续时间FG并且将认证请求转发到网络设备414持续时间GH。网络设备414可花费时间HI来确定在哪里将认证请求转发到web服务器412,这时网络设备414可以在持续时间IJ期间将响应转发到web服务器412。
Web服务器412可以根据认证响应确认用户的认证并且开始取回内容以提供对始发请求的响应。响应可以是网站/web应用的页面,其包括来自内容服务器418的内容和来自数据服务器420的个人信息。Web服务器412可以占去时间JK以准备对内容服务器418的请求并且占去时间KS以准备对数据服务器420的请求。Web服务器412可以在时间KL期间向网络设备414发送内容请求,这时网络设备414可以花费时间LM来将转发对内容服务器418的请求持续持续时间MN。内容服务器418可以接收内容请求,花费时间NO来处理该请求,并且在时间OP期间向网络设备414发送内容响应。网络设备414可处理内容响应持续时间PQ并且将内容响应转发到web服务器,此后经过QR时间。
与对内容服务器418的请求/响应并行或在时间上非常接近地,web服务器412可以将数据请求发送到网络设备414持续时间ST。网络设备可处理数据请求持续时间TU并且在时间段UV期间转发数据请求。数据服务器420可以具有这样的架构,即它必须从数据库422中取回所请求的数据,并且因此必须执行一些时间VW处理数据请求并且准备数据库请求(即,在点W处)。数据库请求可以花费时间WX到达数据库422。在持续时间XY期间可以发生取出所请求的数据,并且在时间YZ期间可以发生将数据(即,在点Y处)发送回到数据服务器420。在时间αβ期间将数据响应发送回到网络设备414之前,数据服务器可以在时间Zα内处理数据库响应。网络设备可以处理数据响应持续时间βγ并且在时间γδ期间转发数据响应。Web服务器412可以在时间εζ期间将对始发请求的响应发送到客户端402之前在时间δε期间组装从内容服务器418取回到的内容和从数据服务器420取回到的数据。
在图5的示例中,从BC开始至εζ的段可表示用于将对始发请求的web服务器响应发送到web服务器的总延迟。总响应延迟因此可包括由于web服务器412而导致的延迟、由于认证服务器416而导致的延迟以及由于内容服务器418而导致的延迟与由于数据服务器420而导致的延迟之间的最大值(假定对内容服务器418和数据服务器420的请求并行或基本上并行)。一些常规数据中心可以能够导出这些延迟中的一些。例如,依靠来自网络设备(例如,网络设备414)的网络遥测的数据中心可以能够经由认证请求流簇和认证响应流簇的时间戳来计算web服务器延迟。同样地,可能的是数据中心可以依靠来自服务器的遥测来根据指示web服务器412何时将认证请求流簇发送到认证服务器416并且web服务器何时从认证服务器416接收到认证响应流簇的web服务器日志来计算web服务器延迟。各种实施例可通过计算更多粒度的延迟来在这些常规方法上改进。例如,应用和网络分析平台100可将用于提供对认证请求的响应的总延迟解析成包括表示从web服务器412到网络设备414的网络延迟的段CD、表示网络设备延迟的段DE(但在一些实施例中是可忽略的并被忽视)、表示从网络设备414到认证服务器416的网络延迟的段EF、表示认证服务器延迟的段FG、表示从认证服务器416到网络设备414的网络延迟的段GH、表示网络设备延迟的段HI以及表示从网络设备414到web服务器412的网络延迟的段IJ。常规数据中心不能以这种粒度级别确定延迟,但是本技术的各种实施例可通过从web服务器412、网络设备414和认证服务器416获得遥测来以这种粒度级别确定延迟。在一定时间段期间,依照一些实施例的应用和分析框架可以为web服务器412与认证服务器416之间的网络延迟(即,段CD、(有时DE)、EF)、认证服务器延迟(即、段FG)以及认证服务器416与web服务器412之间的网络延迟(即,段GH、(有时HI)和IJ)建立基线度量。当用户经历延迟时,管理员可以基于将流分解成流簇的这种方式快速地确定问题是由于服务器延迟还是网络延迟而导致的。
如图5中所示,单个用户与简单应用的交互可包括不止十几个请求和响应。典型的企业网络可包括数百或数千个更复杂的应用,其中数百或数千个用户可能每天执行数百万或数十亿个操作。人类用户将不可能处理并分析这种数据量。图5还演示仅依靠来自服务器或网络设备中的一个的遥测的数据中心的不完整性。例如,在仅可从网络设备414获得遥测的第一数据中心中并且在网络设备试图与数据服务器420进行通信异常慢或者失败的情形下,第一APM平台不能诊断问题是由于应用不可用性还是负载而出现的。另外,第一数据中心可能无法提供关于问题存在于数据服务器420、数据库422还是数据服务器与数据库之间的连接中的洞察。例如,在数据请求中,第一数据中心可以仅恢复ST和UV,但是可能无法恢复VW、WX、XY、YZ和Zα,因为第一数据中心可能不知道数据服务器420对数据库422有依赖。
仅依靠来自服务器的遥测的第二数据中心也可能遭受各种缺陷。这样的系统可以能够检测web服务器412与数据服务器420之间的通信中的反常(或无)响应时间,但是可能无法探知延迟或故障是由于web服务器412、网络设备414、数据服务器420、数据库422还是数据服务器与数据库之间的连接而导致的。例如,在数据请求中,第二数据中心可以具有数据请求和数据响应的视图,但是ST、TU、UV、VW、WX、XY、YZ、Zα、αβ、βγ和γδ可以是黑盒子。各种实施例可以通过沿着数据路径的多个点捕获遥测、将流解析成流簇、为流簇建立基线并且对照基线来评估新业务以更精确地诊断应用和网络性能降级的根本原因来克服现有技术的数据中心的这些和其他缺陷。
图6图示用于将一个或多个流解析成流簇以进行应用性能监视和管理的方法600的示例。普通技术人员应理解的是,对于本文讨论的任何方法,除非另外陈述否则在各种实施例的范围内,可以存在以类似的或替代次序或并行执行的附加的、更少的或替代步骤。网络以及特别是应用和网络分析平台(例如,图1的应用和网络分析平台100)、分析引擎(例如,图1的分析引擎120)、APM引擎(例如,图1的APM引擎130)、网络操作系统、虚拟实体管理器或类似的系统可执行方法600。
在图6的示例中,方法600可以在步骤602处开始,在所述步骤602中传感器(例如,图1的软件传感器112和硬件传感器114)在第一时间段期间从网络的服务器和网络设备捕获遥测(例如,流数据、主机数据、进程数据、用户数据、策略数据等)以为应用和网络性能建立基线。在一些实施例中,应用和网络分析平台还可以收集虚拟化信息、网络拓扑信息和应用信息(例如,配置信息、先前生成的应用依赖映射、应用策略等)。另外,应用和网络分析平台还可以收集带外数据(例如,功率水平、温度和物理定位)和客户/第三方数据(例如,CMDB或CMS即服务、Whois、地理坐标等)。如所讨论的,软件传感器112和硬件传感器114可从多个视角收集所捕获的数据以提供网络行为的全面视图。软件传感器112可以沿着数据路径的多个点(例如,网络设备、物理或裸机服务器)并在物理主机的多个分区(例如,管理程序、容器编排器、虚拟实体管理器、VM、容器、其他虚拟实体等)内包括传感器。
在收集网络遥测和相关数据之后,方法600可以继续到步骤604,其中应用和网络分析平台可为在网络中执行的一个或多个应用生成应用依赖图(ADM)。在一些实施例中,ADM的节点可表示服务器和进程(或应用层、应用、应用组件或其他实施例中的其他应用粒度)的配对或级联,并且ADM图的边缘可表示应用和网络分析框架检测节点之间的流。节点的集群(即,在彼此的相似性阈值内的主机-进程配对)可表示应用组件,并且ADM的每个连接图可表示应用。
在一些实施例中,生成ADM可涉及通过级联服务器(例如,遥测将服务器标识为分组/流的分组报头元数据中的源或目的地)和应用/应用组件(例如,遥测标识生成分组/流的进程)来确定ADM的节点。生成ADM还可包括通过检测ADM的节点之间的一个或多个流来确定ADM的边缘。生成ADM还可包括确定节点的特征向量。每个节点的特征向量可以包括服务器特征、进程特征和/或其他特征的级联。服务器特征可包括服务器名字、网络地址、操作系统、CPU使用率、网络使用率、磁盘空间、端口、登录用户、调度作业、打开文件以及有关存储在服务器上的文件和/或目录的信息。进程特征可包括进程名字、进程标识符、父进程标识符、进程路径、CPU利用率、存储器利用率、存储器地址、调度信息、nice值、标志、优先级、状态、开始时间、终端类型、由进程花费的CPU时间、启动了进程的命令字符串和进程所有者(例如,用户名字、用户标识符、用户的真实名字、电子邮件地址,用户的组)、终端信息、登录时间、登录的到期日期、空闲时间以及有关用户的文件和/或目录的信息。在一些实施例中,特征向量还可包括从客户/第三方数据(例如,CMDB或CMS即服务、Whois、地理坐标等)中提取的特征。
用于检测ADM的节点之间的流的遥测可以包括诸如源地址、源端口、目的地地址、目的地端口、协议类型、服务类等这样的分组报头字段和/或诸如流开始时间、流结束时间、流的分组数、流的字节数、流的TCP标志的并集等这样的聚合分组数据。
生成ADM还可涉及通过比较其特征向量来确定ADM的节点之间的相似性。相似性可以是两个节点相对于其他节点有多相似的量度或两个节点与其他节点相比彼此不太遥远的量度。在一些实施例中,应用和网络分析平台可使用欧几里德距离、曼哈顿距离、闵可夫斯基距离、余弦相似性、杰卡德相似性等中的一个或多个作为相似性/距离量度。在一些实施例中,确定ADM还可包括设置相似性阈值以便集群指定关于在网络中执行的应用的视图的粒度级别。例如,将相似性阈值设置为非常粗程度的相似性可导致多个集群将数据中心表示为单片应用。另一方面,将相似性阈值设置为非常细程度的相似性可对于网络中的每个主机-进程配对产生单独集群。设置相似性阈值可能主要取决于在网络中执行的应用的数量和类型以及手头任务所期望的粒度级别。在大多数情形下,相似性阈值可以位于非常粗与非常细之间某处。如所讨论的,集群可表示应用组件,并且连接图可表示应用。
在生成ADM之后,方法600可进行到步骤606,其中应用和网络分析平台可将流移交到一个或多个流簇中。也就是说,应用和网络分析平台可通过跟踪从源到目的地的流来将流分解成一系列子请求和子响应。请求流可包括遍及从源到目的地的网络设备的跳以及由网络设备对流的处理。响应流可包括遍及网络设备的跳、由网络设备对流的处理以及被执行来生成对始发请求流的响应的对中间端点的子请求和子响应(包括遍及网络设备的跳和由这些网络设备进行的处理)。例如,在图5中,应用和网络分析平台可以将web服务器412对来自客户端的始发请求的响应分解为包括段BC、CD、DE、EF、FG、GH、HI、IJ、JK、KL、LM、MN、NO、OP、PQ、QR、ST、TU、UV、WX、XY、YZ、Zα、αβ、βγ、γδ、δε和εζ的序列。
方法600可以继续到步骤608,其中应用和网络分析平台可确定用于流簇的基线度量,诸如用于发送和/或处理每个流簇的时间长度的平均值或范围和/或在每个流簇内发送和/或处理的数据量(例如,以分组和/或字节数为单位)的平均数据量或范围。例如,应用和网络分析平台可使用由服务器的软件传感器捕获的网络遥测和相关数据来检测与在服务器上执行的应用相关联的请求流,诸如通过拍摄在服务器上执行的进程在服务器生成了流时的快照并且使流与进程中的一个相关联。应用和网络分析平台可跟踪从服务器到一个或多个网络设备的请求流(即,网络设备可以对应于流的一个或多个跳)并且确定服务器与网络设备之间的传输时间(以及有时是发送的数据量)以及由网络设备基于由网络设备的硬件传感器捕获的网络遥测来处理流所花费的时间。应用和网络分析平台可基于由这些附加设备的传感器捕获的网络遥测和相关数据来跟踪响应流作为对其他服务器的子请求和子响应的传输和/或处理(以及由网络设备沿着子请求和响应的数据路径进行的传输和/或处理)并且确定与发送和/或处理子请求和子响应相关联的时间量(和/或在一些实施例中为数据量)。应用和网络分析平台可以通过聚合在指定时间段内检测到的流簇的观察结果来确定用于流簇的基线度量。
在步骤610处,应用和网络分析平台可在第二时间段期间通过对照新流簇的对应基线来比较它们来评估网络遥测和相关数据。在一些实施例中,应用和网络分析平台可以使用机器学习和模式识别算法来对每个新流簇进行分类。机器学习可涉及接收“训练的”样本(即,与预定分类相关联的流簇)、确定特定分类的样本可以彼此有共同点并且可能与其他分类没有共同点的特征(有时加权的)并且使用这些(有时加权的)特征来对新流簇进行分类。机器学习和模式识别算法可包括判定树、随机森林、基于规则的分类器、支持向量机(SVM)分类器、神经网络分类器、最近邻分类器等。
判定树使用底层数据和不同特征的分层划分。数据的分层划分创建按其类分布偏倚的类分区。对于流簇之间的给定差异集,流簇最可能属于的分区是该流簇的分类。
随机森林依靠判定树的组合,其中每个树取决于独立地采样并且对于森林中的所有树具有相同分布的随机向量的值。实施者可针对许多树T通过在放回的条件下随机对训练数据的n个案例进行采样以创建训练数据的子集来训练随机森林。在每个节点处,分类器可从所有特征的集合中随机选择数量m个特征,并且可最终选择提供最佳分割来在该节点上做二进制分割的特征。在下一个节点处,分类器随机选择另一数量m个特征并且重复该过程。
基于规则的分类器确定定义不同类的模式(例如,正则表达式)。这些类型的分类器定义一组规则,其中左手侧对应于模式,而右手侧对应于类标签。规则确定分类。
SVM分类器试图使用不同类之间的线性或非线性描绘来分割底层数据。这些分类器的前提是为了确定不同类之间的最佳边界并且将这些边界用于分类的目的。
神经网络分类器利用使用连接方法来处理信息的一组互连的函数或分类器。神经网络在训练期间改变其结构,诸如通过在一个网络内合并重叠检测并且训练仲裁网络以组合来自不同网络的结果。
最近邻分类器将训练数据中的k-最近邻居确定为流簇之间的特定差异集,并且来自k个邻居的多数类确定分类。
在判定点612处,如果新流簇不偏离其基线,诸如通过在指定时间范围内发生并且/或者在数据大小的指定范围内发送/处理一定量的数据,则应用和网络分析平台可以继续分析新流簇。
然而,如果应用和网络分析平台确定新流簇偏离其基线,则在步骤614处,应用和网络分析平台可执行某些修复任务以解决偏差。在一些实施例中,修复可包括诸如经由基于事件的通知系统(例如,图1的基于事件的通知系统146)生成警报。在一些情况下,网络管理员可以分析反常流簇并且确定应用和网络的性能符合预期或者确定流簇指示应用和网络性能的问题。应用和网络分析平台可将这个作为输入(即,训练样本)接收以改进机器学习。
如所讨论的,在一些实施例中,应用和网络分析平台可确定网络内的服务器的物理和/或逻辑定位(例如,CMDB/CMS、地理坐标、IP地址等)。应用和网络分析可使用定位信息来确定依赖于彼此的应用组件的最佳放置和配置,使得组件在物理上和/或在逻辑上更靠近在一起。例如,应用和网络分析平台可以确定反常流对特定应用来说是瓶颈并且可定位用于应用组件的不同定位。作为另一示例,应用和网络分析平台可以具有数据中心中的应用和网络活动的全面视图并且可确定用于应用组件的使带宽和延迟最小化的定位。因此,在一些实施例中,修复可包括自动地将具有应用依赖的虚拟实体迁移得在物理上和/或在逻辑上更靠近在一起以解决应用和网络性能问题。在一些实施例中,修复还可包括生成关于要在物理上和/或在逻辑上更靠近在一起的应用组件的物理放置或配置的推荐以减少延迟和其他性能降级。
图7A和图7B图示依照各种实施例的系统。当实践各种实施例时,更适当的系统对于本领域的普通技术人员而言将是显而易见的。本领域的普通技术人员也将容易地领会的是,其他系统也可能的。
图7A图示用于常规总线计算系统700的示例架构,其中系统的组件使用总线705来彼此电通信。计算系统700可包括处理单元(CPU或处理器)710和系统总线705,所述系统总线705可以将包括系统存储器715(诸如图7B中所示的存储设备770中的只读存储器(ROM)和随机存取存储器(RAM)775)的各种系统组件耦合到处理器710。计算系统700可包括直接地与处理器710连接、与处理器710极为接近或者作为处理器710的一部分集成的高速存储器的高速缓存712。计算系统700可将数据从存储器715和/或存储设备730复制到高速缓存712以供由处理器710快速访问。以这种方式,高速缓存712可提供在等待数据的同时避免处理器延迟的性能提升。这些和其他模块可控制处理器710以执行各种动作。其他系统存储器715也可以用于使用。存储器715可包括具有不同性能特性的多种不同类型的存储器。处理器710可包括被配置为控制处理器710的任何通用处理器和硬件模块或软件模块(诸如存储在存储设备730中的模块1:732、模块2:734和模块3:736)以及专用处理器,其中软件指令被并入到实际的处理器设计中。处理器710可以基本上是完全自备的计算系统,包含多个核心或处理器、总线、存储器控制器、高速缓存等。多核心处理器可以是对称的或不对称的。
为了使得能实现用户与计算系统700的交互,输入设备745可表示任何数量的输入机制,诸如用于语音的麦克风、用于手势或图形输入的触摸保护屏幕、键盘、鼠标、动作输入、语音等。输出设备735也可以是为本领域的技术人员已知的许多输出机制中的一种或多种。在一些情况下,多模态系统可使得用户能够提供多种类型的输入来与计算系统700进行通信。通信接口740可支配并管理用户输入和系统输出。可能对在任何特定硬件布置上操作没有限制,并且各种其他实施例可以在这里取代基本特征以得到改进的硬件或固件布置。
存储设备730可以是非易失性存储器并且可以是可存储可由计算机访问的数据的硬盘或其他类型的计算机可读介质,诸如磁带盒、闪速存储器卡、固态存储器设备、数字通用盘、磁盒、随机存取存储器(RAM)725、只读存储器(ROM)720及其混合物。
存储设备730可包括用于控制处理器710的软件模块732、734、736。各种实施例可以利用其他硬件或软件模块。存储设备730可连接到系统总线705。在一个方面中,执行特定功能的硬件模块可连同必要的硬件组件(诸如处理器710、总线705、输出设备735等)一起包括存储在计算机可读介质中的软件组件,以执行该功能。
图7B图示依照实施例的可被使用的用于常规芯片组计算系统750的示例架构。计算系统750可包括表示能够执行被配置为执行标识的计算的软件、固件和硬件的任何数量的在物理上和/或在逻辑上根本不同的资源的处理器755。处理器755可与芯片组760进行通信,所述芯片组760可控制到处理器755的输入和来自处理器755的输出。在此示例中,芯片组760可将信息输出到输出设备765,诸如显示器,并且可以读取信息并将信息写入到存储设备770,所述存储设备770可包括例如磁介质和固态介质。芯片组760还可从RAM 775读取数据并且将数据写入到RAM 775。用于连接各种用户接口组件785的桥接器780可与芯片组760对接。用户接口组件785可包括键盘、麦克风、触摸检测和处理电路、指点设备(诸如鼠标)等。对计算系统750的输入可来自各种源(机器生成的和/或人类生成的)中的任一个。
芯片组760还可与可具有不同物理接口的一个或多个通信接口790对接。通信接口790可包括用于有线和无线LAN、用于宽带无线网络以及个人区域网络的接口。本文公开的用于生成、显示并使用GUI的方法的一些应用可包括通过物理接口接收有序数据集或者由机器它本身通过处理器755分析存储在存储设备770或RAM 775中的数据来生成。进一步地,计算系统750可经由用户接口组件785从用户接收输入并且通过使用处理器755来解释这些输入而执行适当的功能,诸如浏览功能。
应领会的是,计算系统700和750分别可具有多于一个处理器710和755,或者是联网在一起以提供更大处理能力的计算设备的组或集群的一部分。
为了说明的清楚,在一些情况下各种实施例可以被呈现为包括单独的功能块,包括含有设备、设备组件、用软件或硬件和软件的组合加以具体实现的方法中的步骤或例行程序的功能块。
在一些实施例中,计算机可读存储设备、介质和存储器可包括包含比特流等的电缆或无线信号。然而,当被提及时,非暂态计算机可读存储介质明确地排除诸如能量、载波信号、电磁波和信号本身这样的介质。
可使用被存储或者可其他方式从计算机可读介质获得的计算机可执行指令来实现根据上述示例的方法。这样的指令可包括例如使或者以其他方式将通用计算机、专用计算机或专用处理设备配置成执行某个功能或一组功能的指令和数据。可通过网络访问使用的计算机资源的各部分。计算机可执行指令可以是例如二进制文件、诸如汇编语言这样的中间格式指令、固件或源代码。可以用于存储指令、使用的信息和/或在根据描述的示例的方法期间创建的信息的计算机可读介质的示例包括磁盘或光盘、闪速存储器、设置有非易失性存储器的USB设备、联网存储设备等。
实现根据这些公开的方法的设备可包括硬件、固件和/或软件,并且可采取各种形状因数中的任一种。这样的形状因数的典型示例包括膝上型电脑、智能电话、小形状因数个人计算机、个人数字助理、机架安装设备、独立设备等。其他实施例可以在外围设备或附加卡中实现本公开中描述的功能性。作为另一示例,各种实施例还可以在不同芯片当中的电路板或在单个设备中执行的不同进程上实现此功能性。
指令、用于输送这样的指令的介质、用于执行它们的计算资源以及用于支持这样的计算资源的其他结构是用于提供这些公开中描述的功能的手段。
尽管本公开使用各种示例和其他信息来说明所附权利要求的范围内的各方面,但是本领域的普通技术人员应理解不应将权利要求限于这样的示例中的特定特征或布置,因为普通技术人员可使用这些示例来导出各式各样的实施方式。进一步地,尽管本公开用特定于结构特征和/或方法步骤的示例的语言来描述某个主题,然而普通技术人员应理解的是,所附权利要求中限定的主题不一定限于这些描述的特征或行为。例如,这样的功能性可不同地分布或者在除本文标识的那些以外的组件中被执行。相反,本公开将描述的特征和步骤作为所附权利要求的范围内的系统和方法的组件的示例来提供。
Claims (17)
1.一种用于确定反常流簇的方法,所述方法包括:
在第一时间段期间从网络的至少第一服务器和第一网络设备捕获第一遥测;
通过级联服务器特征和进程特征来确定与所述第一遥测相关联的应用依赖图的多个节点;
基于所述第一遥测来确定所述应用依赖图的多个边缘,所述第一遥测包括指示所述多个节点中的节点对之间的一个或多个流的流信息;
针对所述多个节点中的第一节点确定第一特征向量;
基于所述第一特征向量与所述多个节点中的第二节点的第二特征向量之间的相似性度量满足相似性阈值,来确定包括所述第一节点和所述第二节点的集群;
基于所述应用依赖图来针对由所述第一服务器生成并且将所述第一网络设备作为一跳来包括的至少一个流,确定第一多个流簇;
针对所述第一多个流簇中的至少一个第一流簇,确定基线度量;以及
通过将所述基线度量与至少一个第二流簇的对应度量相比较,来确定至少一个反常流簇,其中,所述至少一个第二流簇与在第二时间段期间从至少所述第一服务器和所述第一网络设备捕获的第二遥测相关联。
2.根据权利要求1所述的方法,还包括:
确定所述相似性阈值以生成多个集群。
3.根据权利要求1所述的方法,还包括:
执行机器学习进程以确定所述相似性度量。
4.根据权利要求3所述的方法,还包括:
接收针对所述反常流簇的分类;以及
使用所述分类来更新所述机器学习进程。
5.根据权利要求1至4中的任一项所述的方法,还包括:
通过跟踪从所述第一服务器到所述第一网络设备的所述至少一个流,来确定所述第一多个流簇中的第一流簇。
6.根据权利要求1至4中的任一项所述的方法,还包括:
通过跟踪对所述网络的一个或多个第二服务器的一个或多个子请求和子响应,来确定所述第一多个流簇中的第一流簇。
7.根据权利要求1至4中的任一项所述的方法,还包括:
确定与所述第一服务器相关联的第一定位;并且
确定第二定位,所述第二定位减小所述网络中与所述至少一个反常流簇相关联的第二服务器与所述第一服务器之间的距离。
8.根据权利要求7所述的方法,还包括:
将所述第一服务器从所述第一定位迁移到所述第二定位。
9.根据权利要求1至4中的任一项所述的方法,还包括:
将所述基线度量确定为包括用于将所述第一流簇发送到所述第一网络设备的时间和由所述第一网络设备对所述第一流簇的处理时间的和。
10.根据权利要求1至4中的任一项所述的方法,还包括:
将所述基线度量确定为以下各项中的至少一项:用于所述第一服务器生成对所述网络的第二服务器的至少一个子请求的时间、用于将所述至少一个子请求从所述第一服务器发送到所述第二服务器的时间、用于由所述第二服务器处理所述至少一个子请求的时间、用于由所述第二服务器生成子响应的时间、或用于将所述至少一个子响应从所述第二服务器发送到所述第一服务器的时间。
11.一种用于确定反常流簇的系统,所述系统包括:
处理器;以及
存储器,所述存储器包括指令,所述指令在被所述处理器执行时,使所述系统:
在第一时间段期间从网络的至少第一服务器和第一网络设备捕获第一遥测;
通过级联服务器特征和进程特征来确定与所述第一遥测相关联的应用依赖图的多个节点;
基于所述第一遥测来确定所述应用依赖图的多个边缘,所述第一遥测包括指示所述多个节点中的节点对之间的一个或多个流的流信息;
针对所述多个节点中的第一节点确定第一特征向量;
基于所述第一特征向量与所述多个节点中的第二节点的第二特征向量之间的相似性度量满足相似性阈值,来确定包括所述第一节点和所述第二节点的集群;
基于所述应用依赖图来针对由所述第一服务器生成并且将所述第一网络设备作为一跳来包括的至少一个流,确定第一多个流簇;
针对所述第一多个流簇中的至少一个第一流簇,确定基线度量;并且
通过将所述基线度量与至少一个第二流簇的对应度量相比较,来确定至少一个反常流簇,所述至少一个第二流簇与在第二时间段期间从至少所述第一服务器和所述第一网络设备捕获的第二遥测相关联。
12.根据权利要求11所述的系统,其中,所述指令在被执行时进一步使所述系统:
以线路速率从嵌入在所述第一网络设备的专用集成电路ASIC中的硬件传感器捕获所述第一遥测的至少一部分。
13.根据权利要求11或12所述的系统,其中,所述指令在被执行时进一步使所述系统:
从驻留在所述网络的裸机服务器内的软件传感器捕获所述第一遥测的至少一部分。
14.根据权利要求11或12所述的系统,其中,所述指令在被执行时进一步使所述系统:
从驻留在所述网络的同一物理服务器的多个虚拟实体内的多个软件传感器捕获所述第一遥测的至少一部分。
15.一种具有指令的非暂态计算机可读介质,所述指令在被处理器执行时,使所述处理器:
在第一时间段期间从网络的至少第一服务器和第一网络设备捕获第一遥测;
通过级联服务器特征和进程特征来确定与所述第一遥测相关联的应用依赖图的多个节点;
基于所述第一遥测来确定所述应用依赖图的多个边缘,所述第一遥测包括指示所述多个节点中的节点对之间的一个或多个流的流信息;
针对所述多个节点中的第一节点确定第一特征向量;
基于所述第一特征向量与所述多个节点中的第二节点的第二特征向量之间的相似性度量满足相似性阈值,来确定包括所述第一节点和所述第二节点的集群;
基于所述应用依赖图来针对由所述第一服务器生成并且将所述第一网络设备作为一跳来包括的至少一个流,确定第一多个流簇;
针对所述第一多个流簇中的至少一个第一流簇,确定基线度量;并且
通过将所述基线度量与至少一个第二流簇的对应度量相比较,来确定至少一个反常流簇,所述至少一个第二流簇与在第二时间段期间从至少所述第一服务器和所述第一网络设备捕获的第二遥测相关联。
16.根据权利要求15所述的非暂态计算机可读介质,其中,所述指令进一步使所述处理器:
执行机器学习进程以确定所述相似性度量;
接收针对所述反常流簇的分类;并且
使用所述分类来更新所述机器学习进程。
17.根据权利要求15至16中的任一项所述的非暂态计算机可读介质,其中,所述指令进一步使所述处理器:
通过跟踪从所述第一服务器到所述第一网络设备的所述至少一个流来确定所述第一多个流簇中的第一流簇;并且
通过跟踪对所述网络的一个或多个第二服务器的一个或多个子请求和子响应来确定所述第一多个流簇中的第二流簇。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/471,183 | 2017-03-28 | ||
US15/471,183 US10873794B2 (en) | 2017-03-28 | 2017-03-28 | Flowlet resolution for application performance monitoring and management |
PCT/US2018/024730 WO2018183422A1 (en) | 2017-03-28 | 2018-03-28 | Flowlet resolution for application performance monitoring and management |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110521171A CN110521171A (zh) | 2019-11-29 |
CN110521171B true CN110521171B (zh) | 2023-03-24 |
Family
ID=63671057
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201880021765.XA Active CN110521171B (zh) | 2017-03-28 | 2018-03-28 | 用于应用性能监视和管理的流簇解析 |
Country Status (4)
Country | Link |
---|---|
US (4) | US10873794B2 (zh) |
EP (1) | EP3602968A1 (zh) |
CN (1) | CN110521171B (zh) |
WO (1) | WO2018183422A1 (zh) |
Families Citing this family (86)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10454714B2 (en) | 2013-07-10 | 2019-10-22 | Nicira, Inc. | Method and system of overlay flow control |
US10135789B2 (en) | 2015-04-13 | 2018-11-20 | Nicira, Inc. | Method and system of establishing a virtual private network in a cloud service for branch networking |
US10498652B2 (en) | 2015-04-13 | 2019-12-03 | Nicira, Inc. | Method and system of application-aware routing with crowdsourcing |
US20180219765A1 (en) | 2017-01-31 | 2018-08-02 | Waltz Networks | Method and Apparatus for Network Traffic Control Optimization |
US10992568B2 (en) | 2017-01-31 | 2021-04-27 | Vmware, Inc. | High performance software-defined core network |
US11706127B2 (en) | 2017-01-31 | 2023-07-18 | Vmware, Inc. | High performance software-defined core network |
US20200036624A1 (en) | 2017-01-31 | 2020-01-30 | The Mode Group | High performance software-defined core network |
US10778528B2 (en) | 2017-02-11 | 2020-09-15 | Nicira, Inc. | Method and system of connecting to a multipath hub in a cluster |
US10523539B2 (en) | 2017-06-22 | 2019-12-31 | Nicira, Inc. | Method and system of resiliency in cloud-delivered SD-WAN |
US10885393B1 (en) * | 2017-09-28 | 2021-01-05 | Architecture Technology Corporation | Scalable incident-response and forensics toolkit |
US10778466B2 (en) | 2017-10-02 | 2020-09-15 | Vmware, Inc. | Processing data messages of a virtual network that are sent to and received from external service machines |
US10999100B2 (en) | 2017-10-02 | 2021-05-04 | Vmware, Inc. | Identifying multiple nodes in a virtual network defined over a set of public clouds to connect to an external SAAS provider |
US11115480B2 (en) | 2017-10-02 | 2021-09-07 | Vmware, Inc. | Layer four optimization for a virtual network defined over public cloud |
US11223514B2 (en) | 2017-11-09 | 2022-01-11 | Nicira, Inc. | Method and system of a dynamic high-availability mode based on current wide area network connectivity |
US10944723B2 (en) * | 2017-11-17 | 2021-03-09 | ShieldX Networks, Inc. | Systems and methods for managing endpoints and security policies in a networked environment |
US10671621B2 (en) * | 2017-12-08 | 2020-06-02 | Microsoft Technology Licensing, Llc | Predictive scaling for cloud applications |
US10789158B2 (en) * | 2018-03-21 | 2020-09-29 | Sap Se | Adaptive monitoring of applications |
US10951693B2 (en) | 2018-04-02 | 2021-03-16 | T-Mobile Usa, Inc. | Data prioritization and scheduling system |
US10834181B2 (en) * | 2018-04-02 | 2020-11-10 | T-Mobile Usa, Inc. | Load balancing and data prioritization system |
US11483313B2 (en) * | 2018-06-28 | 2022-10-25 | Intel Corporation | Technologies for updating an access control list table without causing disruption |
US10887329B2 (en) * | 2018-07-26 | 2021-01-05 | A10 Networks, Inc. | Cluster-based precision mitigation of network attacks |
JP6992697B2 (ja) * | 2018-07-27 | 2022-01-13 | 日本電信電話株式会社 | ネットワークシステム、情報取得装置、情報取得方法およびプログラム |
US11165694B2 (en) * | 2018-07-31 | 2021-11-02 | Mcafee, Llc | Methods, systems, articles of manufacture and apparatus to identify applications |
WO2020047426A1 (en) | 2018-08-30 | 2020-03-05 | Rigetti & Co, Inc. | Low-latency, high-performance hybrid computing |
JP7348797B2 (ja) * | 2018-11-09 | 2023-09-21 | 日本放送協会 | パケットフロー監視装置 |
US10467360B1 (en) * | 2019-01-02 | 2019-11-05 | Fmr Llc | System and method for dynamically determining availability of a computing resource |
US10665251B1 (en) * | 2019-02-27 | 2020-05-26 | International Business Machines Corporation | Multi-modal anomaly detection |
US11489613B2 (en) * | 2019-05-14 | 2022-11-01 | Infinera Corporation | Out-of-band communication channel for subcarrier-based optical communication systems |
US10915428B2 (en) | 2019-06-27 | 2021-02-09 | Capital One Services, Llc | Intelligent services and training agent for application dependency discovery, reporting, and management tool |
US10521235B1 (en) | 2019-06-27 | 2019-12-31 | Capital One Services, Llc | Determining problem dependencies in application dependency discovery, reporting, and management tool |
US10747544B1 (en) | 2019-06-27 | 2020-08-18 | Capital One Services, Llc | Dependency analyzer in application dependency discovery, reporting, and management tool |
US11093378B2 (en) | 2019-06-27 | 2021-08-17 | Capital One Services, Llc | Testing agent for application dependency discovery, reporting, and management tool |
US11354222B2 (en) * | 2019-06-27 | 2022-06-07 | Capital One Services, Llc | Discovery crawler for application dependency discovery, reporting, and management tool |
US10642719B1 (en) | 2019-06-27 | 2020-05-05 | Capital One Services, Llc | Intelligent services for application dependency discovery, reporting, and management tool |
US11379292B2 (en) * | 2019-06-27 | 2022-07-05 | Capital One Services, Llc | Baseline modeling for application dependency discovery, reporting, and management tool |
TWI714184B (zh) * | 2019-07-25 | 2020-12-21 | 中華電信股份有限公司 | 多階層網路樣式比對方法 |
US11121985B2 (en) | 2019-08-27 | 2021-09-14 | Vmware, Inc. | Defining different public cloud virtual networks for different entities based on different sets of measurements |
US11063833B2 (en) | 2019-09-23 | 2021-07-13 | Capital One Services, Llc | Dependency tracking using application layer and network layer information |
US11611507B2 (en) | 2019-10-28 | 2023-03-21 | Vmware, Inc. | Managing forwarding elements at edge nodes connected to a virtual network |
US11134023B2 (en) | 2019-10-28 | 2021-09-28 | Microsoft Technology Licensing, Llc | Network path redirection |
US20210126847A1 (en) * | 2019-10-29 | 2021-04-29 | Microsoft Technology Licensing, Llc | Repository for telemetry data |
CN112887119B (zh) * | 2019-11-30 | 2022-09-16 | 华为技术有限公司 | 故障根因确定方法及装置、计算机存储介质 |
CN111010313B (zh) * | 2019-12-05 | 2021-03-19 | 深圳联想懂的通信有限公司 | 一种批量处理的状态监控方法、服务器及存储介质 |
US11489783B2 (en) | 2019-12-12 | 2022-11-01 | Vmware, Inc. | Performing deep packet inspection in a software defined wide area network |
US11394640B2 (en) | 2019-12-12 | 2022-07-19 | Vmware, Inc. | Collecting and analyzing data regarding flows associated with DPI parameters |
US11438789B2 (en) | 2020-01-24 | 2022-09-06 | Vmware, Inc. | Computing and using different path quality metrics for different service classes |
US11233704B2 (en) | 2020-01-29 | 2022-01-25 | Salesforce.Com, Inc. | Machine learning based end to end system for tcp optimization |
US11271840B2 (en) | 2020-01-29 | 2022-03-08 | Salesforce.Com, Inc. | Estimation of network quality metrics from network request data |
US11824876B2 (en) | 2020-01-31 | 2023-11-21 | Extreme Networks, Inc. | Online anomaly detection of vector embeddings |
US11128540B1 (en) * | 2020-02-13 | 2021-09-21 | Sprint Communications Company L.P. | Augmented reality electronic equipment maintenance user interface |
CN111459775B (zh) * | 2020-02-21 | 2023-08-08 | 北京数立得科技有限公司 | Web系统功能评估方法、装置、电子设备及可读存储介质 |
US11165721B1 (en) * | 2020-04-09 | 2021-11-02 | Arista Networks, Inc. | Reprogramming multicast replication using real-time buffer feedback |
US11245641B2 (en) | 2020-07-02 | 2022-02-08 | Vmware, Inc. | Methods and apparatus for application aware hub clustering techniques for a hyper scale SD-WAN |
US11533243B2 (en) * | 2020-07-16 | 2022-12-20 | Citrix Systems, Inc. | Method for computing environment specific baselines for metrics of user experience |
CN111831340B (zh) * | 2020-07-20 | 2024-03-05 | 北京简单一点科技有限公司 | 一种持续集成多流水线编排方法 |
US11272007B2 (en) * | 2020-07-21 | 2022-03-08 | Servicenow, Inc. | Unified agent framework including push-based discovery and real-time diagnostics features |
US11709710B2 (en) | 2020-07-30 | 2023-07-25 | Vmware, Inc. | Memory allocator for I/O operations |
CN112269660B (zh) * | 2020-10-28 | 2023-04-11 | 浙江纺织服装职业技术学院 | 一种海量数据处理并发任务自适应测控方法及系统 |
US11575591B2 (en) | 2020-11-17 | 2023-02-07 | Vmware, Inc. | Autonomous distributed forwarding plane traceability based anomaly detection in application traffic for hyper-scale SD-WAN |
US11880347B2 (en) * | 2020-11-23 | 2024-01-23 | Microsoft Technology Licensing, Llc. | Tuning large data infrastructures |
US11575600B2 (en) | 2020-11-24 | 2023-02-07 | Vmware, Inc. | Tunnel-less SD-WAN |
CN112445863B (zh) * | 2020-11-30 | 2024-06-18 | 永辉云金科技有限公司 | 一种数据实时同步方法及系统 |
US11929903B2 (en) | 2020-12-29 | 2024-03-12 | VMware LLC | Emulating packet flows to assess network links for SD-WAN |
CN116783874A (zh) | 2021-01-18 | 2023-09-19 | Vm维尔股份有限公司 | 网络感知的负载平衡 |
US11418586B2 (en) | 2021-01-19 | 2022-08-16 | Servicenow, Inc. | Load balancing of discovery agents across proxy servers |
US11979325B2 (en) | 2021-01-28 | 2024-05-07 | VMware LLC | Dynamic SD-WAN hub cluster scaling with machine learning |
US11509571B1 (en) | 2021-05-03 | 2022-11-22 | Vmware, Inc. | Cost-based routing mesh for facilitating routing through an SD-WAN |
US12009987B2 (en) | 2021-05-03 | 2024-06-11 | VMware LLC | Methods to support dynamic transit paths through hub clustering across branches in SD-WAN |
US11729065B2 (en) | 2021-05-06 | 2023-08-15 | Vmware, Inc. | Methods for application defined virtual network service among multiple transport in SD-WAN |
US11757888B2 (en) | 2021-06-15 | 2023-09-12 | Fortinet, Inc. | Systems and methods for fine grained forward testing for a ZTNA environment |
US12015536B2 (en) | 2021-06-18 | 2024-06-18 | VMware LLC | Method and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics of types of resource elements in the public clouds |
US11489720B1 (en) | 2021-06-18 | 2022-11-01 | Vmware, Inc. | Method and apparatus to evaluate resource elements and public clouds for deploying tenant deployable elements based on harvested performance metrics |
US12047282B2 (en) | 2021-07-22 | 2024-07-23 | VMware LLC | Methods for smart bandwidth aggregation based dynamic overlay selection among preferred exits in SD-WAN |
US11943146B2 (en) | 2021-10-01 | 2024-03-26 | VMware LLC | Traffic prioritization in SD-WAN |
US12088610B2 (en) * | 2021-10-27 | 2024-09-10 | Hewlett Packard Enterprise Development Lp | Platform for privacy preserving decentralized learning and network event monitoring |
WO2023079757A1 (ja) * | 2021-11-08 | 2023-05-11 | 日本電信電話株式会社 | 分析装置、分析方法及び分析プログラム |
US12088465B2 (en) * | 2022-01-11 | 2024-09-10 | Pensando Systems Inc. | Methods and systems for upgrading a control plane and a data plane of a network appliance |
US11627061B1 (en) * | 2022-02-24 | 2023-04-11 | Microsoft Technology Licensing, Llc | Packet capture using VXLAN encapsulation |
US20230308470A1 (en) * | 2022-03-25 | 2023-09-28 | Cisco Technology, Inc. | Systems and Methods for Deriving Application Security Signals from Application Performance Data |
US11909815B2 (en) | 2022-06-06 | 2024-02-20 | VMware LLC | Routing based on geolocation costs |
US11743280B1 (en) * | 2022-07-29 | 2023-08-29 | Intuit Inc. | Identifying clusters with anomaly detection |
US20240064079A1 (en) * | 2022-08-17 | 2024-02-22 | Cisco Technology, Inc. | Diagnosing poor application experience in hybrid work environments |
US12068907B1 (en) * | 2023-01-31 | 2024-08-20 | PagerDuty, Inc. | Service dependencies based on relationship network graph |
US12034587B1 (en) | 2023-03-27 | 2024-07-09 | VMware LLC | Identifying and remediating anomalies in a self-healing network |
US12057993B1 (en) | 2023-03-27 | 2024-08-06 | VMware LLC | Identifying and remediating anomalies in a self-healing network |
CN118573598A (zh) * | 2024-07-30 | 2024-08-30 | 国家计算机网络与信息安全管理中心 | 一种多出口环境下异常flow日志的识别和纠正方法及系统 |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105847069A (zh) * | 2012-06-06 | 2016-08-10 | 瞻博网络公司 | 针对虚拟网络分组流的物理路径确定 |
Family Cites Families (645)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5086385A (en) | 1989-01-31 | 1992-02-04 | Custom Command Systems | Expandable home automation system |
US5400246A (en) | 1989-05-09 | 1995-03-21 | Ansan Industries, Ltd. | Peripheral data acquisition, monitor, and adaptive control system via personal computer |
DE69132280T2 (de) | 1990-09-17 | 2001-01-18 | Cabletron Systems, Inc. | System und Verfahren zur Modellierung eines Computer-Netzwerks |
US5319754A (en) | 1991-10-03 | 1994-06-07 | Compaq Computer Corporation | Data transfer system between a computer and a host adapter using multiple arrays |
US6850252B1 (en) | 1999-10-05 | 2005-02-01 | Steven M. Hoffberg | Intelligent electronic appliance system and method |
EP0592079A2 (en) | 1992-09-20 | 1994-04-13 | Sun Microsystems, Inc. | Automated software installation and operating environment configuration on a computer system |
US5742829A (en) | 1995-03-10 | 1998-04-21 | Microsoft Corporation | Automatic software installation on heterogeneous networked client computer systems |
IT1285179B1 (it) | 1995-04-24 | 1998-06-03 | Motorola Inc | Procedimento ed apparecchio di controllo di indirizzamento sensibile per sistemi di comunicazioni. |
US5726644A (en) | 1995-06-30 | 1998-03-10 | Philips Electronics North America Corporation | Lighting control system with packet hopping communication |
US5822731A (en) | 1995-09-15 | 1998-10-13 | Infonautics Corporation | Adjusting a hidden Markov model tagger for sentence fragments |
US6249241B1 (en) | 1995-09-21 | 2001-06-19 | The United States Of America As Represented By The Secretary Of The Navy | Marine vessel traffic system |
US5831848A (en) | 1995-11-17 | 1998-11-03 | Phoenix Controls Corporation | Distributed environmental process control system |
US6151643A (en) | 1996-06-07 | 2000-11-21 | Networks Associates, Inc. | Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer |
US6144962A (en) | 1996-10-15 | 2000-11-07 | Mercury Interactive Corporation | Visualization of web sites and hierarchical data structures |
US6085243A (en) | 1996-12-13 | 2000-07-04 | 3Com Corporation | Distributed remote management (dRMON) for networks |
US5964841A (en) | 1997-03-03 | 1999-10-12 | Cisco Technology, Inc. | Technique for handling forwarding transients with link state routing protocol |
US6247058B1 (en) | 1998-03-30 | 2001-06-12 | Hewlett-Packard Company | Method and apparatus for processing network packets using time stamps |
US6141595A (en) | 1998-04-03 | 2000-10-31 | Johnson Controls Technology Company | Common object architecture supporting application-centric building automation systems |
US6012096A (en) | 1998-04-23 | 2000-01-04 | Microsoft Corporation | Method and system for peer-to-peer network latency measurement |
US6185566B1 (en) | 1998-05-05 | 2001-02-06 | Robert A. Adams | Network management system having an embedded network database |
WO1999059059A1 (en) | 1998-05-13 | 1999-11-18 | Glaxo Group Limited | Remote installation of computer operating systems |
US6157955A (en) | 1998-06-15 | 2000-12-05 | Intel Corporation | Packet processing system including a policy engine having a classification unit |
US6353775B1 (en) | 1998-07-28 | 2002-03-05 | Honeywell International Inc. | Multiple instance single value identifiers environmental control communication method and system |
US6628304B2 (en) | 1998-12-09 | 2003-09-30 | Cisco Technology, Inc. | Method and apparatus providing a graphical user interface for representing and navigating hierarchical networks |
US6330562B1 (en) | 1999-01-29 | 2001-12-11 | International Business Machines Corporation | System and method for managing security objects |
US20070162420A1 (en) | 2004-01-21 | 2007-07-12 | Oracle International Corporation | Techniques for automatically discovering a database device on a network |
US6484315B1 (en) | 1999-02-01 | 2002-11-19 | Cisco Technology, Inc. | Method and system for dynamically distributing updates in a network |
US6239699B1 (en) | 1999-03-03 | 2001-05-29 | Lucent Technologies Inc. | Intelligent alarm filtering in a telecommunications network |
US8272875B1 (en) | 1999-03-09 | 2012-09-25 | Realityworks, Inc. | Educational device for simulating addictive behavior and method of using |
US6546420B1 (en) | 1999-03-31 | 2003-04-08 | Cisco Technology, Inc. | Aggregating information about network message flows |
US6801878B1 (en) | 1999-04-08 | 2004-10-05 | George Mason University | System and method for managing sensors of a system |
US8179809B1 (en) | 1999-08-23 | 2012-05-15 | Oracle America, Inc. | Approach for allocating resources to an apparatus based on suspendable resource requirements |
US6611896B1 (en) | 1999-08-25 | 2003-08-26 | Emc Corporation | Dynamic mirror service policy with seek adjustment in a non-physical mirrored storage environment |
US6848106B1 (en) | 1999-10-05 | 2005-01-25 | Veritas Operating Corporation | Snapshot restore of application chains and applications |
US7797367B1 (en) | 1999-10-06 | 2010-09-14 | Gelvin David C | Apparatus for compact internetworked wireless integrated network sensors (WINS) |
US6728779B1 (en) | 1999-12-01 | 2004-04-27 | Lucent Technologies Inc. | Method and apparatus for exchanging routing information in a packet-based data network |
GB2357390B (en) | 1999-12-16 | 2002-09-25 | 3Com Corp | Ethernet units adapted for loop configuration and method of operating same |
US7203740B1 (en) | 1999-12-22 | 2007-04-10 | Intel Corporation | Method and apparatus for allowing proprietary forwarding elements to interoperate with standard control elements in an open architecture for network devices |
US6871284B2 (en) | 2000-01-07 | 2005-03-22 | Securify, Inc. | Credential/condition assertion verification optimization |
US7120934B2 (en) | 2000-03-30 | 2006-10-10 | Ishikawa Mark M | System, method and apparatus for detecting, identifying and responding to fraudulent requests on a network |
EP1146766A1 (en) | 2000-04-11 | 2001-10-17 | Alcatel | Connection control module |
US7024468B1 (en) | 2000-04-27 | 2006-04-04 | Hewlett-Packard Development Company, L.P. | Internet usage data recording system and method with configurable data collector system |
US6925490B1 (en) | 2000-05-31 | 2005-08-02 | International Business Machines Corporation | Method, system and program products for controlling system traffic of a clustered computing environment |
US6847993B1 (en) | 2000-05-31 | 2005-01-25 | International Business Machines Corporation | Method, system and program products for managing cluster configurations |
US6816461B1 (en) | 2000-06-16 | 2004-11-09 | Ciena Corporation | Method of controlling a network element to aggregate alarms and faults of a communications network |
US7693976B2 (en) | 2000-07-11 | 2010-04-06 | Ciena Corporation | Granular management of network resources |
US20020103793A1 (en) | 2000-08-02 | 2002-08-01 | Daphne Koller | Method and apparatus for learning probabilistic relational models having attribute and link uncertainty and for performing selectivity estimation using probabilistic relational models |
US7181769B1 (en) | 2000-08-25 | 2007-02-20 | Ncircle Network Security, Inc. | Network security system having a device profiler communicatively coupled to a traffic monitor |
US6745011B1 (en) * | 2000-09-01 | 2004-06-01 | Telephia, Inc. | System and method for measuring wireless device and network usage and performance metrics |
US8010469B2 (en) | 2000-09-25 | 2011-08-30 | Crossbeam Systems, Inc. | Systems and methods for processing data flows |
US9800608B2 (en) | 2000-09-25 | 2017-10-24 | Symantec Corporation | Processing data flows with a data flow processor |
US7080161B2 (en) | 2000-10-17 | 2006-07-18 | Avaya Technology Corp. | Routing information exchange |
US20030097439A1 (en) | 2000-10-23 | 2003-05-22 | Strayer William Timothy | Systems and methods for identifying anomalies in network data streams |
US8875116B2 (en) | 2000-11-17 | 2014-10-28 | Hewlett-Packard Development Company, L.P. | Network for updating firmware and / or software in wireless communication devices |
US7133923B2 (en) | 2000-12-11 | 2006-11-07 | Acme Packet, Inc. | System and method for assisting in controlling real-time transport protocol flow through multiple networks via screening |
US6973023B1 (en) | 2000-12-30 | 2005-12-06 | Cisco Technology, Inc. | Method for routing information over a network employing centralized control |
US7065569B2 (en) | 2001-01-09 | 2006-06-20 | Turin Networks, Inc. | System and method for remote traffic management in a communication network |
US20040213221A1 (en) | 2001-01-16 | 2004-10-28 | Seyhan Civanlar | System and method for soft bandwidth |
US6938122B2 (en) | 2001-01-23 | 2005-08-30 | Emc Corporation | Remote mirroring in a switched environment |
US7444404B2 (en) | 2001-02-05 | 2008-10-28 | Arbor Networks, Inc. | Network traffic regulation including consistency based detection and filtering of packets with spoof source addresses |
FI20010596A0 (fi) | 2001-03-22 | 2001-03-22 | Ssh Comm Security Oyj | Turvallisuusjärjestelmä tietoliikenneverkkoa varten |
US7139242B2 (en) | 2001-03-28 | 2006-11-21 | Proficient Networks, Inc. | Methods, apparatuses and systems facilitating deployment, support and configuration of network routing policies |
US7096273B1 (en) | 2001-04-25 | 2006-08-22 | Cisco Technology, Inc. | DHCP over mobile IP |
US20030023601A1 (en) | 2001-05-08 | 2003-01-30 | Fortier Joseph W. | System and method for intercommunication among disparate communication networks |
US6738933B2 (en) | 2001-05-09 | 2004-05-18 | Mercury Interactive Corporation | Root cause analysis of server system performance degradations |
US6525658B2 (en) | 2001-06-11 | 2003-02-25 | Ensco, Inc. | Method and device for event detection utilizing data from a multiplicity of sensor sources |
US7162643B1 (en) | 2001-06-15 | 2007-01-09 | Informatica Corporation | Method and system for providing transfer of analytic application data over a network |
WO2003003210A2 (en) | 2001-06-27 | 2003-01-09 | Arbor Networks | Method and system for monitoring control signal traffic over a computer network |
US6958998B2 (en) | 2001-07-09 | 2005-10-25 | International Business Machines Corporation | Traffic management in packet-based networks |
US7096368B2 (en) | 2001-08-01 | 2006-08-22 | Mcafee, Inc. | Platform abstraction layer for a wireless malware scanning engine |
US9836424B2 (en) | 2001-08-24 | 2017-12-05 | Intel Corporation | General input/output architecture, protocol and related methods to implement flow control |
US7111055B2 (en) | 2001-08-30 | 2006-09-19 | Sun Microsystems, Inc. | Method and apparatus to facilitate automated software installation on remote computers over a network |
US7633942B2 (en) | 2001-10-15 | 2009-12-15 | Avaya Inc. | Network traffic generation and monitoring systems and methods for their use in testing frameworks for determining suitability of a network for target applications |
EP1442372B1 (en) | 2001-11-07 | 2015-03-04 | Sap Se | Providing isolation through process attachable virtual machines |
US7603440B1 (en) | 2001-11-09 | 2009-10-13 | Persystent Technology Corporation | System and method for management of end user computing devices |
US7437762B2 (en) | 2001-11-29 | 2008-10-14 | International Business Machines Corporation | Method, computer program element and a system for processing alarms triggered by a monitoring system |
US6996817B2 (en) | 2001-12-12 | 2006-02-07 | Valve Corporation | Method and system for upgrading and rolling back versions |
US20030126242A1 (en) | 2001-12-28 | 2003-07-03 | Chang Albert H. | Network boot system and method using remotely-stored, client-specific boot images created from shared, base snapshot image |
US20030151513A1 (en) | 2002-01-10 | 2003-08-14 | Falk Herrmann | Self-organizing hierarchical wireless network for surveillance and control |
JP3963728B2 (ja) | 2002-01-22 | 2007-08-22 | 富士通株式会社 | スパニングツリーのバイパス方法および装置 |
US7743415B2 (en) | 2002-01-31 | 2010-06-22 | Riverbed Technology, Inc. | Denial of service attacks characterization |
US7349761B1 (en) | 2002-02-07 | 2008-03-25 | Cruse Mike B | System and method for distributed facility management and operational control |
US8370936B2 (en) | 2002-02-08 | 2013-02-05 | Juniper Networks, Inc. | Multi-method gateway-based network security systems and methods |
US7693947B2 (en) | 2002-03-08 | 2010-04-06 | Mcafee, Inc. | Systems and methods for graphically displaying messaging traffic |
US7346672B2 (en) | 2002-03-12 | 2008-03-18 | Hewlett-Packard Development Company, L.P. | Automatic TFTP firmware download |
US20040243533A1 (en) | 2002-04-08 | 2004-12-02 | Wsi Corporation | Method for interactively creating real-time visualizations of traffic information |
US7747729B2 (en) | 2002-06-14 | 2010-06-29 | Hanoch Levy | Determining client latencies over a network |
EP1383261A1 (en) | 2002-07-15 | 2004-01-21 | Alcatel | Protection method and system for traffic of different service classes |
US7337206B1 (en) | 2002-07-15 | 2008-02-26 | Network Physics | Method for detecting congestion in internet traffic |
JP2004056604A (ja) | 2002-07-23 | 2004-02-19 | Fujitsu Ltd | ネットワーク運用監視装置 |
US6983323B2 (en) | 2002-08-12 | 2006-01-03 | Tippingpoint Technologies, Inc. | Multi-level packet screening with dynamically selected filtering criteria |
US20040039728A1 (en) * | 2002-08-23 | 2004-02-26 | Diring Software | Method and system for monitoring distributed systems |
US7185103B1 (en) | 2002-09-10 | 2007-02-27 | Juniper Networks, Inc. | Rate-controlled transmission of traffic flow information |
US7370092B2 (en) | 2002-09-12 | 2008-05-06 | Computer Sciences Corporation | System and method for enhanced software updating and revision |
US8407798B1 (en) | 2002-10-01 | 2013-03-26 | Skybox Secutiry Inc. | Method for simulation aided security event management |
US8191136B2 (en) | 2002-11-04 | 2012-05-29 | Riverbed Technology, Inc. | Connection based denial of service detection |
US7340674B2 (en) | 2002-12-16 | 2008-03-04 | Xerox Corporation | Method and apparatus for normalizing quoting styles in electronic mail messages |
US9818136B1 (en) | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
EP1450511A1 (en) | 2003-02-18 | 2004-08-25 | Alcatel | Device and method for simulating network traffic treatments of a network using policy rules |
WO2004084471A2 (en) | 2003-03-19 | 2004-09-30 | Home Data Source, Llc | Relative timing mechanism for event sequencing without clock synchronization |
US7360072B1 (en) | 2003-03-28 | 2008-04-15 | Cisco Technology, Inc. | iSCSI system OS boot configuration modification |
US8171551B2 (en) | 2003-04-01 | 2012-05-01 | Mcafee, Inc. | Malware detection using external call characteristics |
US7895649B1 (en) | 2003-04-04 | 2011-02-22 | Raytheon Company | Dynamic rule generation for an enterprise intrusion detection system |
US8209680B1 (en) | 2003-04-11 | 2012-06-26 | Vmware, Inc. | System and method for disk imaging on diverse computers |
US7317693B1 (en) | 2003-05-12 | 2008-01-08 | Sourcefire, Inc. | Systems and methods for determining the network topology of a network |
US7281126B2 (en) | 2003-05-30 | 2007-10-09 | Sun Microsystems, Inc. | Method of installing an image on a client over a network securely using a wanboot binary and a kernel to install the image |
US7420931B2 (en) | 2003-06-05 | 2008-09-02 | Nvidia Corporation | Using TCP/IP offload to accelerate packet filtering |
US7827602B2 (en) | 2003-06-30 | 2010-11-02 | At&T Intellectual Property I, L.P. | Network firewall host application identification and authentication |
US8296847B2 (en) | 2003-07-25 | 2012-10-23 | Hewlett-Packard Development Company, L.P. | Method of managing utilization of network intrusion detection systems in a dynamic data center |
US7266754B2 (en) | 2003-08-14 | 2007-09-04 | Cisco Technology, Inc. | Detecting network denial of service attacks |
US7568107B1 (en) | 2003-08-20 | 2009-07-28 | Extreme Networks, Inc. | Method and system for auto discovery of authenticator for network login |
US7522596B2 (en) | 2003-08-25 | 2009-04-21 | Alcatel Lucent | Enhanced DVMRP for destination-based forwarding of multicast data |
US7483384B2 (en) | 2003-09-22 | 2009-01-27 | Hewlett-Packard Development Company, L.P. | System and method for monitoring network traffic |
US20050182681A1 (en) | 2003-09-25 | 2005-08-18 | Bruskotter Thomas P. | Money dispensing system |
JPWO2005034446A1 (ja) | 2003-10-03 | 2006-12-14 | 富士通株式会社 | ポリシールール適用ネットワークシステム |
US20050177829A1 (en) | 2003-10-10 | 2005-08-11 | Vipul Vishwanath | Method of applying constraints against discovered attributes in provisioning computers |
US20050198629A1 (en) | 2003-10-10 | 2005-09-08 | Vipul Vishwanath | Method and system for provisioning servers based on a policy and rule hierarchy |
US8560671B1 (en) | 2003-10-23 | 2013-10-15 | Netapp, Inc. | Systems and methods for path-based management of virtual servers in storage network environments |
US20050108331A1 (en) | 2003-10-31 | 2005-05-19 | Osterman Lawrence W. | Presence tracking for datagram based protocols with search |
US7885197B2 (en) | 2003-11-17 | 2011-02-08 | Intel Corporation | System and method for measuring per node packet loss in a wireless network |
US7802084B2 (en) | 2003-11-26 | 2010-09-21 | Hewlett-Packard Development Company, L.P. | System and method for management and installation of operating system images for computers |
US7975035B2 (en) | 2003-12-01 | 2011-07-05 | International Business Machines Corporation | Method and apparatus to support application and network awareness of collaborative applications using multi-attribute clustering |
US7385605B2 (en) | 2003-12-04 | 2008-06-10 | International Business Machines Corporation | Computer display system for dynamically modifying stacked area line graphs to change the order or presence of a set of stacked areas in the graph respectively representative of the proportions contributed to a total by each of a set of time dependent variables |
US20050138157A1 (en) | 2003-12-23 | 2005-06-23 | Ken-Ju Jung | Network device discovery system and method thereof |
US7930540B2 (en) | 2004-01-22 | 2011-04-19 | Mcafee, Inc. | Cryptographic policy enforcement |
US8990430B2 (en) | 2004-02-19 | 2015-03-24 | Cisco Technology, Inc. | Interface bundles in virtual network devices |
AU2005215043A1 (en) | 2004-02-19 | 2005-09-01 | Georgia Tech Research Corporation | Systems and methods for parallel communication |
US7466681B2 (en) | 2004-03-19 | 2008-12-16 | Nortel Networks Limited | Method and apparatus for sensor network routing |
US8584239B2 (en) | 2004-04-01 | 2013-11-12 | Fireeye, Inc. | Virtual machine with dynamic data flow analysis |
US20050240799A1 (en) * | 2004-04-10 | 2005-10-27 | Manfredi Charles T | Method of network qualification and testing |
EP1589716A1 (en) | 2004-04-20 | 2005-10-26 | Ecole Polytechnique Fédérale de Lausanne (EPFL) | Method of detecting anomalous behaviour in a computer network |
US7484237B2 (en) | 2004-05-13 | 2009-01-27 | Hewlett-Packard Development Company, L.P. | Method and apparatus for role-based security policy management |
US7961637B2 (en) | 2004-06-07 | 2011-06-14 | Spirent Communications Of Rockville, Inc. | Method and apparatus for monitoring latency, jitter, packet throughput and packet loss ratio between two points on a network |
US20050289244A1 (en) | 2004-06-28 | 2005-12-29 | Himansu Sahu | Method for service chaining in a communication network |
KR100608821B1 (ko) | 2004-07-22 | 2006-08-08 | 엘지전자 주식회사 | 휴대단말기의 왕복지연시간 측정장치 및 방법 |
WO2006012610A2 (en) | 2004-07-23 | 2006-02-02 | Citrix Systems, Inc. | Systems and methods for optimizing communications between network nodes |
CN1728715A (zh) * | 2004-07-27 | 2006-02-01 | 邓里文 | 一种用于因特网与波分复用系统融合的适配方法 |
JP4529144B2 (ja) | 2004-08-11 | 2010-08-25 | 日本電気株式会社 | 仮想lanシステムおよびノード装置 |
US8572734B2 (en) | 2004-08-12 | 2013-10-29 | Verizon Patent And Licensing Inc. | Geographical intrusion response prioritization mapping through authentication and flight data correlation |
US7475424B2 (en) | 2004-09-02 | 2009-01-06 | International Business Machines Corporation | System and method for on-demand dynamic control of security policies/rules by a client computing device |
US7490235B2 (en) | 2004-10-08 | 2009-02-10 | International Business Machines Corporation | Offline analysis of packets |
US7760653B2 (en) | 2004-10-26 | 2010-07-20 | Riverbed Technology, Inc. | Stackable aggregation for connection based anomaly detection |
US7644438B1 (en) | 2004-10-27 | 2010-01-05 | Arcsight, Inc. | Security event aggregation at software agent |
US7610375B2 (en) | 2004-10-28 | 2009-10-27 | Cisco Technology, Inc. | Intrusion detection in a data center environment |
US7681131B1 (en) | 2004-11-10 | 2010-03-16 | InternetPerils, Inc. | Method and apparatus for aggregating, condensing, supersetting, and displaying network topology and performance data |
US9489496B2 (en) | 2004-11-12 | 2016-11-08 | Apple Inc. | Secure software updates |
US7496575B2 (en) | 2004-11-22 | 2009-02-24 | Verdasys, Inc. | Application instrumentation and monitoring |
US9160755B2 (en) | 2004-12-21 | 2015-10-13 | Mcafee, Inc. | Trusted communication network |
US20060173912A1 (en) | 2004-12-27 | 2006-08-03 | Eric Lindvall | Automated deployment of operating system and data space to a server |
US7395195B2 (en) | 2004-12-27 | 2008-07-01 | Sap Aktiengesellschaft | Sensor network modeling and deployment |
US7398382B2 (en) | 2004-12-29 | 2008-07-08 | Intel Corporation | Method and apparatus to enhance platform boot efficiency |
US7657942B2 (en) | 2005-01-11 | 2010-02-02 | International Business Machines Corporation | Method of assuring enterprise security standards compliance |
US7729284B2 (en) | 2005-01-19 | 2010-06-01 | Emulex Design & Manufacturing Corporation | Discovery and configuration of devices across an Ethernet interface |
US7657536B2 (en) | 2005-02-28 | 2010-02-02 | International Business Machines Corporation | Application of resource-dependent policies to managed resources in a distributed computing system |
US7808897B1 (en) | 2005-03-01 | 2010-10-05 | International Business Machines Corporation | Fast network security utilizing intrusion prevention systems |
US8589530B2 (en) | 2005-03-28 | 2013-11-19 | Riverbed Technology, Inc. | Method and system for managing a distributed network of network monitoring devices |
US20060274659A1 (en) | 2005-05-06 | 2006-12-07 | Battelle Memorial Institute | Method and system for generating synthetic digital network traffic |
US20070097976A1 (en) | 2005-05-20 | 2007-05-03 | Wood George D | Suspect traffic redirection |
US20060272018A1 (en) | 2005-05-27 | 2006-11-30 | Mci, Inc. | Method and apparatus for detecting denial of service attacks |
US7609625B2 (en) | 2005-07-06 | 2009-10-27 | Fortinet, Inc. | Systems and methods for detecting and preventing flooding attacks in a network environment |
US7580351B2 (en) | 2005-07-12 | 2009-08-25 | Cisco Technology, Inc | Dynamically controlling the rate and internal priority of packets destined for the control plane of a routing device |
US7874001B2 (en) | 2005-07-15 | 2011-01-18 | Microsoft Corporation | Detecting user-mode rootkits |
US9871767B2 (en) | 2005-07-18 | 2018-01-16 | Mutualink, Inc. | Enabling ad hoc trusted connections among enclaved communication communities |
US7567805B2 (en) | 2005-08-01 | 2009-07-28 | Cisco Technology, Inc. | Method and system for dynamic assignment of wireless LAN access point identity |
KR100716620B1 (ko) | 2005-08-17 | 2007-05-09 | 고려대학교 산학협력단 | 평행 좌표계를 이용한 네트워크 감시 장치 및 방법 |
US8429630B2 (en) | 2005-09-15 | 2013-04-23 | Ca, Inc. | Globally distributed utility computing cloud |
US8001610B1 (en) | 2005-09-28 | 2011-08-16 | Juniper Networks, Inc. | Network defense system utilizing endpoint health indicators and user identity |
US20110314148A1 (en) | 2005-11-12 | 2011-12-22 | LogRhythm Inc. | Log collection, structuring and processing |
US7930752B2 (en) | 2005-11-18 | 2011-04-19 | Nexthink S.A. | Method for the detection and visualization of anomalous behaviors in a computer network |
EP1788752A1 (en) | 2005-11-21 | 2007-05-23 | Alcatel Lucent | Network node with control plane processor overload protection |
US7600005B2 (en) | 2005-11-23 | 2009-10-06 | Sun Microsystems, Inc. | Method and apparatus for provisioning heterogeneous operating systems onto heterogeneous hardware systems |
WO2007070711A2 (en) | 2005-12-15 | 2007-06-21 | Malloy Patrick J | Interactive network monitoring and analysis |
KR100772394B1 (ko) | 2006-02-09 | 2007-11-01 | 삼성전자주식회사 | IPSec에서의 재전송 방지 윈도우 갱신 방법 및 장치 |
US20070195729A1 (en) | 2006-02-17 | 2007-08-23 | Hongbing Li | System and method for self-configuring adaptive wireless router network |
US7873025B2 (en) | 2006-02-23 | 2011-01-18 | Cisco Technology, Inc. | Network device that determines application-level network latency by monitoring option values in a transport layer message |
JP4634320B2 (ja) | 2006-02-28 | 2011-02-16 | 株式会社日立製作所 | 対異常通信防御を行うための装置とネットワークシステム |
US8266697B2 (en) | 2006-03-04 | 2012-09-11 | 21St Century Technologies, Inc. | Enabling network intrusion detection by representing network activity in graphical form utilizing distributed data sensors to detect and transmit activity data |
US7546450B2 (en) | 2006-03-07 | 2009-06-09 | Sun Microsystems, Inc. | Method and apparatus for operating system deployment |
GB2435980A (en) | 2006-03-09 | 2007-09-12 | Agilent Technologies Inc | Optimizing routing of demands in a network |
US7530105B2 (en) | 2006-03-21 | 2009-05-05 | 21St Century Technologies, Inc. | Tactical and strategic attack detection and prediction |
US7610330B1 (en) | 2006-03-30 | 2009-10-27 | Packeteer, Inc. | Multi-dimensional computation distribution in a packet processing device having multiple processing architecture |
US20070230415A1 (en) | 2006-03-31 | 2007-10-04 | Symbol Technologies, Inc. | Methods and apparatus for cluster management using a common configuration file |
KR20070099201A (ko) | 2006-04-03 | 2007-10-09 | 삼성전자주식회사 | 휴대형 무선 기기의 보안 관리 방법 및 이를 이용한 보안관리 장치 |
US20080082662A1 (en) | 2006-05-19 | 2008-04-03 | Richard Dandliker | Method and apparatus for controlling access to network resources based on reputation |
US8966018B2 (en) | 2006-05-19 | 2015-02-24 | Trapeze Networks, Inc. | Automated network device configuration and network deployment |
US8429746B2 (en) | 2006-05-22 | 2013-04-23 | Neuraliq, Inc. | Decoy network technology with automatic signature generation for intrusion detection and intrusion prevention systems |
US7873074B1 (en) | 2006-06-01 | 2011-01-18 | Avaya Inc. | Adaptive selection of bandwidth parameters to meet a service provider pricing model |
US7592906B1 (en) | 2006-06-05 | 2009-09-22 | Juniper Networks, Inc. | Network policy evaluation |
US7783457B2 (en) | 2006-06-15 | 2010-08-24 | Oracle America, Inc. | Sensor localization using lateral inhibition |
KR100799302B1 (ko) | 2006-06-21 | 2008-01-29 | 한국전자통신연구원 | 시스템 이벤트 정보를 이용한 은닉 프로세스 탐지 시스템및 방법 |
US8151337B2 (en) | 2006-06-30 | 2012-04-03 | Microsoft Corporation | Applying firewalls to virtualized environments |
US8365286B2 (en) | 2006-06-30 | 2013-01-29 | Sophos Plc | Method and system for classification of software using characteristics and combinations of such characteristics |
US8239915B1 (en) | 2006-06-30 | 2012-08-07 | Symantec Corporation | Endpoint management using trust rating data |
US7894434B2 (en) | 2006-07-03 | 2011-02-22 | Hewlett-Packard Development Company, L.P. | Method, apparatus, and system for capturing traffic statistics between two sites of MPLS based VPN |
US7748000B2 (en) | 2006-07-27 | 2010-06-29 | International Business Machines Corporation | Filtering a list of available install items for an install program based on a consumer's install policy |
JP4126707B2 (ja) | 2006-07-28 | 2008-07-30 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 情報システムの状態を解析する技術 |
US7788250B2 (en) | 2006-08-04 | 2010-08-31 | Mohammad Salman | Flexible request and response communications interfaces |
US7957934B2 (en) | 2007-05-15 | 2011-06-07 | Dynatrace Software Gmbh | Method and system for processing application performance data ouside of monitored applications to limit overhead caused by monitoring |
US8345561B2 (en) | 2006-08-22 | 2013-01-01 | Rueters America Inc. | Time monitor |
KR100793057B1 (ko) | 2006-09-01 | 2008-01-10 | 한국전자통신연구원 | 이기종 센서 네트워크 기반의 정보 서비스 생성을 위한usn 미들웨어 장치 및 그 방법과, 그를 이용한 정보서비스 제공 시스템 |
US8056134B1 (en) | 2006-09-10 | 2011-11-08 | Ogilvie John W | Malware detection and identification via malware spoofing |
US9258203B1 (en) * | 2006-09-29 | 2016-02-09 | Amazon Technologies, Inc. | Monitoring computer performance metrics utilizing baseline performance metric filtering |
US8407164B2 (en) | 2006-10-02 | 2013-03-26 | The Trustees Of Columbia University In The City Of New York | Data classification and hierarchical clustering |
US7743242B2 (en) | 2006-10-16 | 2010-06-22 | Scalent Systems Inc. | Method and system for automatic generation of operating system boot images |
CN1937623A (zh) | 2006-10-18 | 2007-03-28 | 华为技术有限公司 | 一种控制网络业务的方法及系统 |
US7768921B2 (en) | 2006-10-30 | 2010-08-03 | Juniper Networks, Inc. | Identification of potential network threats using a distributed threshold random walk |
US7774498B1 (en) | 2006-11-06 | 2010-08-10 | Cisco Technology, Inc. | Methods and apparatus for trusted application centric QoS provisioning |
US7861933B2 (en) | 2006-11-06 | 2011-01-04 | Ikan Technologies Inc. | Methods and systems for network configuration |
US8181248B2 (en) | 2006-11-23 | 2012-05-15 | Electronics And Telecommunications Research Institute | System and method of detecting anomaly malicious code by using process behavior prediction technique |
US8769120B2 (en) | 2006-11-28 | 2014-07-01 | Sap Ag | Method and system to monitor parameters of a data flow path in a communication system |
WO2008069439A1 (en) | 2006-12-05 | 2008-06-12 | Electronics And Telecommunications Research Institute | Method for grouping sensor nodes in heterogeneous wireless sensor networks |
US9280337B2 (en) | 2006-12-18 | 2016-03-08 | Adobe Systems Incorporated | Secured distribution of software updates |
US8312115B2 (en) | 2006-12-21 | 2012-11-13 | 1E Limited | Network booting apparatus and method |
US8250657B1 (en) | 2006-12-29 | 2012-08-21 | Symantec Corporation | Web site hygiene-based computer security |
US8640086B2 (en) | 2006-12-29 | 2014-01-28 | Sap Ag | Graphical user interface system and method for presenting objects |
US7788477B1 (en) | 2007-01-31 | 2010-08-31 | Hewlett-Packard Development Company, L.P. | Methods, apparatus and articles of manufacture to control operating system images for diskless servers |
US8762951B1 (en) | 2007-03-21 | 2014-06-24 | Oracle America, Inc. | Apparatus and method for profiling system events in a fine grain multi-threaded multi-core processor |
US8572735B2 (en) | 2007-03-29 | 2013-10-29 | George Mason Research Foundation, Inc. | Attack resistant continuous network service trustworthiness controller |
US9083712B2 (en) | 2007-04-04 | 2015-07-14 | Sri International | Method and apparatus for generating highly predictive blacklists |
US8005935B2 (en) | 2007-04-05 | 2011-08-23 | International Business Machines Corporation | Methods and computer program products for managing application performance on a network |
US8706914B2 (en) | 2007-04-23 | 2014-04-22 | David D. Duchesneau | Computing infrastructure |
US9405585B2 (en) | 2007-04-30 | 2016-08-02 | International Business Machines Corporation | Management of heterogeneous workloads |
US8256003B2 (en) | 2007-05-10 | 2012-08-28 | Microsoft Corporation | Real-time network malware protection |
US8209738B2 (en) | 2007-05-31 | 2012-06-26 | The Board Of Trustees Of The University Of Illinois | Analysis of distributed policy rule-sets for compliance with global policy |
WO2008151321A2 (en) | 2007-06-08 | 2008-12-11 | The Trustees Of Columbia University In The City Of New York | Systems, methods, and media for enforcing a security policy in a network including a plurality of components |
CN101682443B (zh) | 2007-06-14 | 2013-07-10 | 皇家飞利浦电子股份有限公司 | 供在网络中使用的网络装置 |
US7934248B1 (en) | 2007-06-27 | 2011-04-26 | Emc Corporation | Network policy enforcement dashboard views |
JP2009016906A (ja) | 2007-06-29 | 2009-01-22 | Toshiba Corp | 情報処理装置、情報処理装置の再生方法 |
US9014047B2 (en) | 2007-07-10 | 2015-04-21 | Level 3 Communications, Llc | System and method for aggregating and reporting network traffic data |
US8645527B1 (en) | 2007-07-25 | 2014-02-04 | Xangati, Inc. | Network monitoring using bounded memory data structures |
KR100862971B1 (ko) | 2007-07-26 | 2008-10-13 | 강릉대학교산학협력단 | 무선 센서 네트워크의 노드들에 대한 펌웨어 업데이트 방법 |
US8291495B1 (en) | 2007-08-08 | 2012-10-16 | Juniper Networks, Inc. | Identifying applications for intrusion detection systems |
US20090059934A1 (en) | 2007-08-30 | 2009-03-05 | Motorola, Inc. | Method and device for providing a bridge in a network |
US8613084B2 (en) | 2007-09-18 | 2013-12-17 | Mcafee, Inc. | System, method, and computer program product for detecting at least potentially unwanted activity based on execution profile monitoring |
DE602007003733D1 (de) | 2007-09-28 | 2010-01-21 | Zimory Gmbh | Verfahren und System zur automatischen Remote-Bereitstellung eines Servers über virtuelle Geräteanwendungen |
US8248928B1 (en) | 2007-10-09 | 2012-08-21 | Foundry Networks, Llc | Monitoring server load balancing |
US8442073B2 (en) | 2007-10-25 | 2013-05-14 | Siemens Aktiengesellschaft | Method and an apparatus for analyzing a communication network |
KR101394338B1 (ko) | 2007-10-31 | 2014-05-30 | 삼성전자주식회사 | 무선 센서 네트워크의 토폴로지 정보 표시 방법 및 장치 및이를 위한 시스템 |
US8305896B2 (en) | 2007-10-31 | 2012-11-06 | Cisco Technology, Inc. | Selective performance enhancement of traffic flows |
KR100938672B1 (ko) | 2007-11-20 | 2010-01-25 | 한국전자통신연구원 | 악성 코드에 의해 삽입된 동적 연결 라이브러리 검출 장치 및 방법 |
KR100974888B1 (ko) | 2007-11-26 | 2010-08-11 | 한국전자통신연구원 | 비정상 트래픽 탐지 장치 및 방법 |
US7970946B1 (en) | 2007-11-27 | 2011-06-28 | Google Inc. | Recording and serializing events |
US8775577B1 (en) | 2007-12-18 | 2014-07-08 | Amazon Technologies, Inc. | System and method for configuration management service |
US20090168648A1 (en) | 2007-12-29 | 2009-07-02 | Arbor Networks, Inc. | Method and System for Annotating Network Flow Information |
US20090182818A1 (en) | 2008-01-11 | 2009-07-16 | Fortinet, Inc. A Delaware Corporation | Heuristic detection of probable misspelled addresses in electronic communications |
JP2009171194A (ja) | 2008-01-16 | 2009-07-30 | Oki Electric Ind Co Ltd | パケットサンプリング方法、パケットサンプリング装置、ネットワーク監視装置 |
WO2009096970A1 (en) | 2008-01-31 | 2009-08-06 | Hewlett-Packard Development Company, L.P. | Automated application dependency mapping |
US8719936B2 (en) | 2008-02-01 | 2014-05-06 | Northeastern University | VMM-based intrusion detection system |
US9240945B2 (en) | 2008-03-19 | 2016-01-19 | Citrix Systems, Inc. | Access, priority and bandwidth management based on application identity |
US8793117B1 (en) | 2008-04-16 | 2014-07-29 | Scalable Network Technologies, Inc. | System and method for virtualization of networking system software via emulation |
US7844744B2 (en) | 2008-04-25 | 2010-11-30 | International Business Machines Corporation | Providing server security via a security sensor application shared by multiple operating system partitions |
US8024861B2 (en) * | 2008-05-16 | 2011-09-27 | Delphi Technologies, Inc. | External stroke/flow setting method for fuel injectors |
US8224936B2 (en) | 2008-05-21 | 2012-07-17 | Cisco Technology, Inc. | Configuration file override |
US9152789B2 (en) | 2008-05-28 | 2015-10-06 | Zscaler, Inc. | Systems and methods for dynamic cloud-based malware behavior analysis |
US9270477B2 (en) | 2008-05-28 | 2016-02-23 | Airmagnet, Inc. | Method and apparatus of measuring and reporting data gap from within an analysis tool |
US8713177B2 (en) | 2008-05-30 | 2014-04-29 | Red Hat, Inc. | Remote management of networked systems using secure modular platform |
US8255972B2 (en) | 2008-06-06 | 2012-08-28 | International Business Machines Corporation | Method to automatically map business function level policies to it management policies |
US8160063B2 (en) | 2008-06-09 | 2012-04-17 | Microsoft Corporation | Data center interconnect and traffic engineering |
US9369299B2 (en) | 2008-06-10 | 2016-06-14 | Bradford Networks, Inc. | Network access control system and method for devices connecting to network using remote access control methods |
EP2134057B1 (en) | 2008-06-12 | 2013-05-01 | Alcatel Lucent | Method for protecting a packet-based network from attacks, as well as security border node |
US8630316B2 (en) | 2008-06-19 | 2014-01-14 | Microsoft Corporation | Clock synchronization using correlation events |
US8930828B2 (en) | 2008-06-22 | 2015-01-06 | Microsoft Corporation | Distinguishing conference participants |
US8856926B2 (en) | 2008-06-27 | 2014-10-07 | Juniper Networks, Inc. | Dynamic policy provisioning within network security devices |
JP5590825B2 (ja) | 2008-06-30 | 2014-09-17 | キヤノン株式会社 | 通信装置及びラウンドトリップ時間を求める方法 |
US8046443B2 (en) | 2008-08-21 | 2011-10-25 | Red Hat, Inc. | Rapid deployment remote network monitor |
US7904420B2 (en) | 2008-08-26 | 2011-03-08 | Raytheon Company | Identification and verification of common cluster files residing on nodes in a cluster |
US8752042B2 (en) | 2008-08-27 | 2014-06-10 | Cardinalcommerce Corporation | Intelligent server routing |
US8023504B2 (en) | 2008-08-27 | 2011-09-20 | Cisco Technology, Inc. | Integrating security server policies with optimized routing control |
US8755396B2 (en) | 2008-09-11 | 2014-06-17 | Juniper Networks, Inc. | Methods and apparatus related to flow control within a data center switch fabric |
US9495538B2 (en) | 2008-09-25 | 2016-11-15 | Symantec Corporation | Graduated enforcement of restrictions according to an application's reputation |
US8572717B2 (en) | 2008-10-09 | 2013-10-29 | Juniper Networks, Inc. | Dynamic access control policy with port restrictions for a network security appliance |
CN102265269A (zh) | 2008-10-28 | 2011-11-30 | 惠普开发有限公司 | 数据中心管理器 |
US7902973B2 (en) | 2008-11-17 | 2011-03-08 | Cisco Technology, Inc. | Alarm reordering to handle alarm storms in large networks |
US8775578B2 (en) | 2008-11-28 | 2014-07-08 | Red Hat, Inc. | Providing hardware updates in a software environment |
JP4629768B2 (ja) | 2008-12-03 | 2011-02-09 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 並列化処理方法、システム、及びプログラム |
US8462212B1 (en) | 2008-12-04 | 2013-06-11 | Stoplift, Inc. | Correlating detected events with image data |
US8589582B2 (en) | 2008-12-08 | 2013-11-19 | Telefonaktiebolaget L M Ericsson (Publ) | Broadband network access |
US8566571B2 (en) | 2008-12-12 | 2013-10-22 | Novell, Inc. | Pre-boot securing of operating system (OS) for endpoint evaluation |
US9258217B2 (en) | 2008-12-16 | 2016-02-09 | At&T Intellectual Property I, L.P. | Systems and methods for rule-based anomaly detection on IP network flow |
CN101770551A (zh) | 2008-12-30 | 2010-07-07 | 中国科学院软件研究所 | 一种基于硬件模拟器的处理隐藏进程的方法 |
WO2010082091A2 (en) | 2009-01-16 | 2010-07-22 | Mainline Net Holdings Limited | Maximizing bandwidth utilization in networks with high latencies and packet drops using transmission control protocol |
US20100306180A1 (en) | 2009-01-28 | 2010-12-02 | Digitiliti, Inc. | File revision management |
US8866821B2 (en) | 2009-01-30 | 2014-10-21 | Microsoft Corporation | Depth map movement tracking via optical flow and velocity prediction |
US7864707B2 (en) | 2009-02-24 | 2011-01-04 | International Business Machines Corporation | Determination of network topology using flow-based traffic information |
EP2224357A1 (en) | 2009-02-27 | 2010-09-01 | BRITISH TELECOMMUNICATIONS public limited company | Video segmentation |
US8667096B2 (en) | 2009-02-27 | 2014-03-04 | Red Hat, Inc. | Automatically generating system restoration order for network recovery |
US7787480B1 (en) | 2009-03-04 | 2010-08-31 | Juniper Networks, Inc. | Routing frames in a trill network using service VLAN identifiers |
US20100235915A1 (en) | 2009-03-12 | 2010-09-16 | Nasir Memon | Using host symptoms, host roles, and/or host reputation for detection of host infection |
US8838804B2 (en) | 2009-03-12 | 2014-09-16 | Novell, Inc. | Securing a network connection by way of an endpoint computing device |
US8904520B1 (en) | 2009-03-19 | 2014-12-02 | Symantec Corporation | Communication-based reputation system |
US8667121B2 (en) | 2009-03-25 | 2014-03-04 | Mcafee, Inc. | System and method for managing data and policies |
US8381289B1 (en) | 2009-03-31 | 2013-02-19 | Symantec Corporation | Communication-based host reputation system |
US8516590B1 (en) | 2009-04-25 | 2013-08-20 | Dasient, Inc. | Malicious advertisement detection and remediation |
EP2249525B1 (en) | 2009-05-06 | 2012-10-31 | Alcatel Lucent | Traffic-engineered connection establishment across resource domains for data transport |
US8918531B2 (en) | 2009-05-07 | 2014-12-23 | Cisco Technology, Inc. | Automated network device provisioning using dynamic host configuration protocol |
US8588422B2 (en) | 2009-05-28 | 2013-11-19 | Novell, Inc. | Key management to protect encrypted data of an endpoint computing device |
US8040822B2 (en) | 2009-06-04 | 2011-10-18 | Alcatel Lucent | Configuring communication services using policy groups |
US9778953B2 (en) | 2009-06-16 | 2017-10-03 | International Business Machines Corporation | Process and system for comprehensive IT discovery without credentials |
US9210050B2 (en) | 2009-07-09 | 2015-12-08 | Centurylink Intellectual Property Llc | System and method for a testing vector and associated performance map |
US20110029658A1 (en) | 2009-07-24 | 2011-02-03 | Theodore Werth | System and methods for providing a multi-device, multi-service platform via a client agent |
US8832013B1 (en) | 2009-07-24 | 2014-09-09 | Decision Lens, Inc. | Method and system for analytic network process (ANP) total influence analysis |
KR101548021B1 (ko) | 2009-08-06 | 2015-08-28 | 주식회사 케이티 | 네트워크 관리 방법 |
US8700765B2 (en) | 2009-08-14 | 2014-04-15 | Blue Stripe Software, Inc. | Methods and computer program products for monitoring and reporting network application performance |
CN101998629B (zh) | 2009-08-28 | 2014-05-21 | 国际商业机器公司 | 搜索虚拟资源的位置的方法、装置和系统 |
WO2011027352A1 (en) | 2009-09-03 | 2011-03-10 | Mcafee, Inc. | Network access control |
US10230611B2 (en) * | 2009-09-10 | 2019-03-12 | Cisco Technology, Inc. | Dynamic baseline determination for distributed business transaction |
US9049617B2 (en) | 2009-09-23 | 2015-06-02 | At&T Intellectual Property I, L.P. | Signaling-less dynamic call setup and teardown by utilizing observed session state information |
US8489717B2 (en) | 2009-09-24 | 2013-07-16 | Hitachi, Ltd. | Accelerated cable modem restart service |
US20110082936A1 (en) | 2009-10-05 | 2011-04-07 | Vss Monitoring, Inc. | Method, apparatus and system for transmission of captured network traffic through a stacked topology of network captured traffic distribution devices |
JP4931978B2 (ja) | 2009-10-06 | 2012-05-16 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 並列化処理方法、システム、及びプログラム |
US8572739B1 (en) | 2009-10-27 | 2013-10-29 | Trend Micro Incorporated | Detection of malicious modules injected on legitimate processes |
JP5214035B2 (ja) | 2009-10-30 | 2013-06-19 | 三菱電機株式会社 | ゲートウェイ装置、通信システムおよび通信方法 |
TWI507985B (zh) | 2009-11-02 | 2015-11-11 | Wistron Corp | 可自動化連續安裝作業系統的電子裝置及其相關方法與系統 |
US8621460B2 (en) | 2009-11-02 | 2013-12-31 | International Business Machines Corporation | Endpoint-hosted hypervisor management |
US8442048B2 (en) | 2009-11-04 | 2013-05-14 | Juniper Networks, Inc. | Methods and apparatus for configuring a virtual network switch |
US20110126197A1 (en) | 2009-11-25 | 2011-05-26 | Novell, Inc. | System and method for controlling cloud and virtualized data centers in an intelligent workload management system |
US8965981B2 (en) | 2009-11-25 | 2015-02-24 | At&T Intellectual Property I, L.P. | Method and apparatus for botnet analysis and visualization |
US20110145885A1 (en) | 2009-12-10 | 2011-06-16 | Bank Of America Corporation | Policy Adherence And Compliance Model |
US20110153811A1 (en) | 2009-12-18 | 2011-06-23 | Hyun Cheol Jeong | System and method for modeling activity patterns of network traffic to detect botnets |
US20110153039A1 (en) | 2009-12-23 | 2011-06-23 | Viktor Gvelesiani | System and method for providing diagnostic information and graphical user interface therefor |
US8310950B2 (en) | 2009-12-28 | 2012-11-13 | Oracle America, Inc. | Self-configuring networking devices for providing services in a nework |
US8774232B2 (en) | 2010-01-08 | 2014-07-08 | Ciena Corporation | Systems and methods of measuring latency and routing thereon in optical networks |
US8291258B2 (en) | 2010-01-08 | 2012-10-16 | Juniper Networks, Inc. | High availability for network security devices |
US8819826B2 (en) | 2010-01-27 | 2014-08-26 | Mcafee, Inc. | Method and system for detection of malware that connect to network destinations through cloud scanning and web reputation |
US20110196957A1 (en) | 2010-02-05 | 2011-08-11 | International Business Machines Corporation | Real-Time Policy Visualization by Configuration Item to Demonstrate Real-Time and Historical Interaction of Policies |
US9160737B2 (en) | 2010-02-26 | 2015-10-13 | Microsoft Technology Licensing, Llc | Statistical security for anonymous mesh-up oriented online services |
US8869138B2 (en) | 2011-11-11 | 2014-10-21 | Wyse Technology L.L.C. | Robust firmware update with recovery logic |
US9413649B2 (en) | 2010-03-12 | 2016-08-09 | Force10 Networks, Inc. | Virtual network device architecture |
US20110228696A1 (en) | 2010-03-19 | 2011-09-22 | Navneet Agarwal | Dynamic directed acyclic graph (dag) topology reporting |
US8489765B2 (en) | 2010-03-19 | 2013-07-16 | Cisco Technology, Inc. | Dynamic directed acyclic graph (DAG) adjustment |
US8560658B2 (en) | 2010-03-23 | 2013-10-15 | Juniper Networks, Inc. | Managing distributed address pools within network devices |
KR101122650B1 (ko) | 2010-04-28 | 2012-03-09 | 한국전자통신연구원 | 정상 프로세스에 위장 삽입된 악성코드 탐지 장치, 시스템 및 방법 |
US8281397B2 (en) | 2010-04-29 | 2012-10-02 | Telcordia Technologies, Inc. | Method and apparatus for detecting spoofed network traffic |
US9270663B2 (en) | 2010-04-30 | 2016-02-23 | T-Central, Inc. | System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added |
US8549650B2 (en) | 2010-05-06 | 2013-10-01 | Tenable Network Security, Inc. | System and method for three-dimensional visualization of vulnerability and asset data |
WO2011137935A1 (en) | 2010-05-07 | 2011-11-10 | Ulysses Systems (Uk) Limited | System and method for identifying relevant information for an enterprise |
US20110283277A1 (en) | 2010-05-11 | 2011-11-17 | International Business Machines Corporation | Virtualization and dynamic resource allocation aware storage level reordering |
WO2011143542A1 (en) | 2010-05-13 | 2011-11-17 | Ramakant Pandrangi | Systems and methods for identifying malicious domains using internet-wide dns lookup patterns |
US8745188B2 (en) | 2010-06-07 | 2014-06-03 | Novell, Inc. | System and method for managing changes in a network datacenter |
US8433790B2 (en) | 2010-06-11 | 2013-04-30 | Sourcefire, Inc. | System and method for assigning network blocks to sensors |
EP2583211B1 (en) | 2010-06-15 | 2020-04-15 | Oracle International Corporation | Virtual computing infrastructure |
US8832461B2 (en) | 2010-06-25 | 2014-09-09 | Microsoft Corporation | Trusted sensors |
US8570861B1 (en) | 2010-06-29 | 2013-10-29 | Amazon Technologies, Inc. | Reputation-based networking |
US9384112B2 (en) | 2010-07-01 | 2016-07-05 | Logrhythm, Inc. | Log collection, structuring and processing |
US8588081B2 (en) | 2010-07-14 | 2013-11-19 | Cisco Technology, Inc. | Monitoring a flow set to detect faults |
US8489775B2 (en) | 2010-07-21 | 2013-07-16 | Dell Products L.P. | System-wide time synchronization across power management interfaces and sensor data |
US8849926B2 (en) | 2010-08-06 | 2014-09-30 | Simon Fraser University | System and method for self-calibrating, self-organizing and localizing sensors in wireless sensor networks |
CN102387169B (zh) | 2010-08-26 | 2014-07-23 | 阿里巴巴集团控股有限公司 | 分布式缓存的对象删除方法、系统及删除服务器 |
US8661544B2 (en) | 2010-08-31 | 2014-02-25 | Cisco Technology, Inc. | Detecting botnets |
US8683389B1 (en) | 2010-09-08 | 2014-03-25 | The New England Complex Systems Institute, Inc. | Method and apparatus for dynamic information visualization |
US8413235B1 (en) | 2010-09-10 | 2013-04-02 | Symantec Corporation | Malware detection using file heritage data |
US8707275B2 (en) | 2010-09-14 | 2014-04-22 | Microsoft Corporation | Simulation environment for distributed programs |
EP2712144A1 (en) | 2010-09-24 | 2014-03-26 | VeriSign, Inc. | IP address confidence scoring system and method |
US8351430B2 (en) | 2010-09-30 | 2013-01-08 | Microsoft Corporation | Routing using global address pairs |
US8838830B2 (en) | 2010-10-12 | 2014-09-16 | Sap Portals Israel Ltd | Optimizing distributed computer networks |
US20120102361A1 (en) | 2010-10-25 | 2012-04-26 | Computer Associates Think, Inc. | Heuristic policy analysis |
US20120102543A1 (en) | 2010-10-26 | 2012-04-26 | 360 GRC, Inc. | Audit Management System |
US20150222939A1 (en) | 2010-10-28 | 2015-08-06 | Avvasi Inc. | System for monitoring a video network and methods for use therewith |
US8832835B1 (en) | 2010-10-28 | 2014-09-09 | Symantec Corporation | Detecting and remediating malware dropped by files |
JP5568776B2 (ja) | 2010-11-05 | 2014-08-13 | 株式会社日立製作所 | 計算機のモニタリングシステム及びモニタリング方法 |
TWI453624B (zh) | 2010-11-09 | 2014-09-21 | Inst Information Industry | 資訊安全防護主機 |
US9117075B1 (en) | 2010-11-22 | 2015-08-25 | Trend Micro Inc. | Early malware detection by cross-referencing host data |
JP5907983B2 (ja) | 2010-11-23 | 2016-05-11 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | マイグレーション方法、コンピュータ・プログラム、およびシステム |
KR20120057066A (ko) | 2010-11-26 | 2012-06-05 | 한국전자통신연구원 | 네트워크 보안관제 시스템 및 방법, 네트워크 보안관제를 위한 보안 이벤트 처리 장치 및 시각화 처리 장치 |
US20120137278A1 (en) | 2010-11-30 | 2012-05-31 | International Business Machines Corporation | Generating a customized set of tasks for migration of a deployed software solution |
US9660940B2 (en) | 2010-12-01 | 2017-05-23 | Juniper Networks, Inc. | Methods and apparatus for flow control associated with a switch fabric |
US9128803B2 (en) | 2010-12-15 | 2015-09-08 | Microsoft Technology Licensing, Llc | Application model for implementing composite applications |
US8499348B1 (en) | 2010-12-28 | 2013-07-30 | Amazon Technologies, Inc. | Detection of and responses to network attacks |
US9225793B2 (en) | 2011-01-28 | 2015-12-29 | Cisco Technology, Inc. | Aggregating sensor data |
US20120197856A1 (en) | 2011-01-28 | 2012-08-02 | Cisco Technology, Inc. | Hierarchical Network for Collecting, Aggregating, Indexing, and Searching Sensor Data |
US20120195198A1 (en) | 2011-01-31 | 2012-08-02 | Joseph Regan | Method and apparatus providing protocol policing |
US20120198541A1 (en) | 2011-02-02 | 2012-08-02 | Reeves Randall E | Methods and apparatus for preventing network intrusion |
US9292329B2 (en) | 2011-02-10 | 2016-03-22 | Microsoft Technology Licensing, Llc | Virtual switch interceptor |
JP6332970B2 (ja) | 2011-02-11 | 2018-05-30 | シーメンス・ヘルスケア・ダイアグノスティックス・インコーポレーテッドSiemens Healthcare Diagnostics Inc. | 安全なソフトウェアの更新のためのシステム及び方法 |
US9112830B2 (en) | 2011-02-23 | 2015-08-18 | Mcafee, Inc. | System and method for interlocking a host and a gateway |
US8665883B2 (en) | 2011-02-28 | 2014-03-04 | Alcatel Lucent | Generalized multi-homing for virtual private LAN services |
US8538926B2 (en) | 2011-03-08 | 2013-09-17 | Rackspace Us, Inc. | Massively scalable object storage system for storing object replicas |
US20120233473A1 (en) | 2011-03-08 | 2012-09-13 | Cisco Technology, Inc. | Power Management in Networks |
US9118637B2 (en) | 2011-03-09 | 2015-08-25 | Arris Enterprises, Inc. | Dual-mode download manager |
JP5678751B2 (ja) | 2011-03-18 | 2015-03-04 | 株式会社リコー | 検疫ネットワークシステム |
US9122877B2 (en) | 2011-03-21 | 2015-09-01 | Mcafee, Inc. | System and method for malware and network reputation correlation |
US20120246303A1 (en) | 2011-03-23 | 2012-09-27 | LogRhythm Inc. | Log collection, structuring and processing |
US20120254109A1 (en) | 2011-03-28 | 2012-10-04 | Microsoft Corporation | Distributed component runtime |
US9571354B2 (en) | 2011-03-28 | 2017-02-14 | Citrix Systems, Inc. | Systems and methods for tracking application layer flow via a multi-connection intermediary device |
US9170917B2 (en) | 2011-04-01 | 2015-10-27 | Paypal, Inc. | Flow tracing though diverse logical and physical application and infrastructure layers/dependencies |
US9465589B2 (en) | 2011-04-05 | 2016-10-11 | Microsoft Technology Licensing, Llc | Stateful component authoring and execution |
US9071575B2 (en) | 2011-04-21 | 2015-06-30 | Robert K. Lemaster | Method and system for abuse route aggregation and distribution |
US8612169B2 (en) | 2011-04-26 | 2013-12-17 | International Business Machines Corporation | Method and system for detecting anomalies in a bipartite graph |
US9270572B2 (en) | 2011-05-02 | 2016-02-23 | Brocade Communications Systems Inc. | Layer-3 support in TRILL networks |
WO2012150602A1 (en) | 2011-05-03 | 2012-11-08 | Yogesh Chunilal Rathod | A system and method for dynamically monitoring, recording, processing, attaching dynamic, contextual & accessible active links & presenting of physical or digital activities, actions, locations, logs, life stream, behavior & status |
US9396327B2 (en) | 2011-05-16 | 2016-07-19 | D2L Corporation | Systems and methods for security verification in electronic learning systems and other systems |
US8966625B1 (en) | 2011-05-24 | 2015-02-24 | Palo Alto Networks, Inc. | Identification of malware sites using unknown URL sites and newly registered DNS addresses |
US20120300628A1 (en) | 2011-05-26 | 2012-11-29 | Dan Prescott | Method and apparatus to passively determine the state of a flow including determining flow state in the event of missing data on one or both sides of the flow |
US9465696B2 (en) | 2011-06-03 | 2016-10-11 | Apple Inc. | Methods and apparatus for multi-phase multi-source backup |
US8719835B2 (en) | 2011-06-07 | 2014-05-06 | Telefonaktiebolaget L M Ericsson (Publ) | Ranking service units to provide and protect highly available services using the Nway redundancy model |
US9450873B2 (en) | 2011-06-28 | 2016-09-20 | Microsoft Technology Licensing, Llc | Performance isolation for clouds |
US8370407B1 (en) | 2011-06-28 | 2013-02-05 | Go Daddy Operating Company, LLC | Systems providing a network resource address reputation service |
US9407533B2 (en) | 2011-06-28 | 2016-08-02 | Brocade Communications Systems, Inc. | Multicast in a trill network |
US9116968B2 (en) | 2011-06-30 | 2015-08-25 | Bmc Software, Inc. | Methods and apparatus related to graph transformation and synchronization |
US9250918B2 (en) | 2011-06-30 | 2016-02-02 | Bmc Software, Inc. | Server management with dynamic construction of pre-boot images |
US9185127B2 (en) | 2011-07-06 | 2015-11-10 | Nominum, Inc. | Network protection service |
US8726379B1 (en) | 2011-07-15 | 2014-05-13 | Norse Corporation | Systems and methods for dynamic protection from electronic attacks |
US20140165207A1 (en) | 2011-07-26 | 2014-06-12 | Light Cyber Ltd. | Method for detecting anomaly action within a computer network |
US9571508B2 (en) | 2011-07-29 | 2017-02-14 | Hewlett Packard Enterprise Development Lp | Systems and methods for distributed rule-based correlation of events |
US8719452B1 (en) | 2011-07-29 | 2014-05-06 | Google Inc. | Correction of client-assigned timestamps |
US20130038358A1 (en) | 2011-08-10 | 2013-02-14 | David M. Cook | Wireless sensor node and method |
US8881258B2 (en) | 2011-08-24 | 2014-11-04 | Mcafee, Inc. | System, method, and computer program for preventing infections from spreading in a network environment using dynamic application of a firewall policy |
EP2751682A4 (en) | 2011-08-29 | 2015-01-07 | Fiberlink Comm Corp | PLATFORM FOR USE AND DISTRIBUTION OF MODULES TO END POINTS |
WO2013030830A1 (en) | 2011-08-31 | 2013-03-07 | Daniel Levy | Automatic ranking of entities based on interactions therebetween |
US9916538B2 (en) | 2012-09-15 | 2018-03-13 | Z Advanced Computing, Inc. | Method and system for feature detection |
US8311973B1 (en) | 2011-09-24 | 2012-11-13 | Zadeh Lotfi A | Methods and systems for applications for Z-numbers |
US20130085889A1 (en) | 2011-09-29 | 2013-04-04 | Sears Brands, Llc | Systems and methods for managing returns or exchanges made via a computer network |
US8694644B2 (en) | 2011-09-29 | 2014-04-08 | Nec Laboratories America, Inc. | Network-aware coordination of virtual machine migrations in enterprise data centers and clouds |
US8677487B2 (en) | 2011-10-18 | 2014-03-18 | Mcafee, Inc. | System and method for detecting a malicious command and control channel |
CN102387608B (zh) | 2011-10-21 | 2014-12-10 | 大唐移动通信设备有限公司 | WiFi接入点接入方法、WiFi接入点及WiFi系统 |
US9148381B2 (en) | 2011-10-21 | 2015-09-29 | Qualcomm Incorporated | Cloud computing enhanced gateway for communication networks |
US8773999B2 (en) | 2011-10-26 | 2014-07-08 | International Business Machines Corporation | Distributed chassis architecture having integrated service appliances |
CN103095597B (zh) | 2011-10-28 | 2017-04-26 | 华为技术有限公司 | 一种用于负载均衡的方法和装置 |
US8812447B1 (en) | 2011-11-09 | 2014-08-19 | Access Sciences Corporation | Computer implemented system for accelerating electronic file migration from multiple sources to multiple destinations |
US8447851B1 (en) | 2011-11-10 | 2013-05-21 | CopperEgg Corporation | System for monitoring elastic cloud-based computing systems as a service |
US9003141B2 (en) | 2011-11-14 | 2015-04-07 | Ca, Inc. | Enhanced software application platform |
US9015823B2 (en) | 2011-11-15 | 2015-04-21 | Nicira, Inc. | Firewalls in logical networks |
CN103946804B (zh) | 2011-11-18 | 2017-11-21 | 汤姆逊许可公司 | 包括用于终端用户装置的远程管理的发布/订阅代理及相应的终端用户装置的系统 |
CN102521537B (zh) | 2011-12-06 | 2015-05-20 | 北京航空航天大学 | 基于虚拟机监控器的隐藏进程检测方法和装置 |
WO2013086221A1 (en) | 2011-12-07 | 2013-06-13 | Huawei Technologies Co., Ltd. | Method to carry fcoe frames over a trill based network |
US8887238B2 (en) | 2011-12-07 | 2014-11-11 | Time Warner Cable Enterprises Llc | Mechanism for establishing reputation in a network environment |
US8881145B2 (en) | 2011-12-15 | 2014-11-04 | Industrial Technology Research Institute | System and method for generating application-level dependencies in one or more virtual machines |
US8914497B1 (en) | 2011-12-15 | 2014-12-16 | Amazon Technologies, Inc. | System and method for throttling service requests having non-uniform workloads |
EP2605453B1 (en) | 2011-12-16 | 2014-11-12 | Alcatel Lucent | Method and apparatus for monitoring transmission characteristics in a network |
US8966021B1 (en) | 2011-12-20 | 2015-02-24 | Amazon Technologies, Inc. | Composable machine image |
US9130825B2 (en) | 2011-12-27 | 2015-09-08 | Tektronix, Inc. | Confidence intervals for key performance indicators in communication networks |
US8973147B2 (en) | 2011-12-29 | 2015-03-03 | Mcafee, Inc. | Geo-mapping system security events |
US9083741B2 (en) | 2011-12-29 | 2015-07-14 | Architecture Technology Corporation | Network defense system and framework for detecting and geolocating botnet cyber attacks |
US10514937B2 (en) | 2012-01-05 | 2019-12-24 | Vmware, Inc. | Auto-discovery service and method of discovering applications within a virtual network |
US9575809B2 (en) | 2012-01-10 | 2017-02-21 | Microsoft Technology Licensing, Llc | Distributed stochastic clustering for automated formation of connected networks of agents |
CN107370629A (zh) | 2012-01-16 | 2017-11-21 | 诺基亚通信公司 | 供应商特定的基站自动配置框架 |
US10091218B2 (en) * | 2012-01-23 | 2018-10-02 | Hrl Laboratories, Llc | System and method to detect attacks on mobile wireless networks based on network controllability analysis |
US9246702B1 (en) | 2012-01-31 | 2016-01-26 | Cisco Technology, Inc. | System and method for configuring service appliances as virtual line cards in a network environment |
US9612814B2 (en) | 2012-02-02 | 2017-04-04 | Sungard Availability Services, Lp | Network topology-aware recovery automation |
US9088517B2 (en) | 2012-02-08 | 2015-07-21 | Cisco Technology, Inc. | Stitching multicast trees |
US9372213B2 (en) | 2012-02-15 | 2016-06-21 | Alpha and Omega, Inc. | Sensors for electrical connectors |
US8640239B2 (en) | 2012-02-20 | 2014-01-28 | International Business Machines Corporation | Network intrusion detection in a network that includes a distributed virtual switch fabric |
CN104106240B (zh) | 2012-02-24 | 2017-10-10 | 华为技术有限公司 | 覆盖网络中转发和地址解析的平衡 |
US8997227B1 (en) | 2012-02-27 | 2015-03-31 | Amazon Technologies, Inc. | Attack traffic signature generation using statistical pattern recognition |
US9052961B2 (en) | 2012-03-02 | 2015-06-09 | Vmware, Inc. | System to generate a deployment plan for a cloud infrastructure according to logical, multi-tier application blueprint |
US9281940B2 (en) | 2012-03-02 | 2016-03-08 | Sony Corporation | Information processing apparatus, information processing method, and program |
RU2486588C1 (ru) | 2012-03-14 | 2013-06-27 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ эффективного лечения компьютера от вредоносных программ и последствий их работы |
US8789164B2 (en) | 2012-03-16 | 2014-07-22 | International Business Machines Corporation | Scalable virtual appliance cloud (SVAC) and devices usable in an SVAC |
US8825848B1 (en) | 2012-03-20 | 2014-09-02 | Emc Corporation | Ordering of event records in an electronic system for forensic analysis |
US8832831B2 (en) | 2012-03-21 | 2014-09-09 | Radware, Ltd. | Method and system for detecting and mitigating attacks performed using cryptographic protocols |
US9621413B1 (en) | 2012-03-29 | 2017-04-11 | Arris Enterprises, Inc. | Displaying dynamic host configuration protocol (DHCP) transaction states using a DHCP relay agent |
US8931043B2 (en) | 2012-04-10 | 2015-01-06 | Mcafee Inc. | System and method for determining and using local reputations of users and hosts to protect information in a network environment |
US9608881B2 (en) | 2012-04-13 | 2017-03-28 | International Business Machines Corporation | Service compliance enforcement using user activity monitoring and work request verification |
US9210180B2 (en) | 2012-04-18 | 2015-12-08 | Radware Ltd. | Techniques for separating the processing of clients' traffic to different zones in software defined networks |
US8850588B2 (en) | 2012-05-01 | 2014-09-30 | Taasera, Inc. | Systems and methods for providing mobile security based on dynamic attestation |
US9674589B2 (en) | 2012-05-04 | 2017-06-06 | Itron, Inc. | Coordinated collection of metering data |
US8867367B2 (en) | 2012-05-10 | 2014-10-21 | Telefonaktiebolaget L M Ericsson (Publ) | 802.1aq support over IETF EVPN |
US20130304900A1 (en) | 2012-05-14 | 2013-11-14 | Sap Ag | Reputation management using evolving reputation scores |
US9503463B2 (en) | 2012-05-14 | 2016-11-22 | Zimperium, Inc. | Detection of threats to networks, based on geographic location |
US8812725B2 (en) | 2012-05-18 | 2014-08-19 | Cisco Technology Inc. | System and method for latency reduction in a network environment |
US10116696B2 (en) | 2012-05-22 | 2018-10-30 | Sri International | Network privilege manager for a dynamically programmable computer network |
CN102722563B (zh) | 2012-05-31 | 2014-12-03 | 优视科技有限公司 | 页面显示方法及装置 |
WO2013184099A1 (en) | 2012-06-05 | 2013-12-12 | Empire Technology Development, Llc | Cross-user correlation for detecting server-side multi-target intrusion |
US9501744B1 (en) | 2012-06-11 | 2016-11-22 | Dell Software Inc. | System and method for classifying data |
US9647938B2 (en) | 2012-06-11 | 2017-05-09 | Radware, Ltd. | Techniques for providing value-added services in SDN-based networks |
US9779260B1 (en) | 2012-06-11 | 2017-10-03 | Dell Software Inc. | Aggregation and classification of secure data |
US8989049B2 (en) | 2012-06-15 | 2015-03-24 | Cisco Technology, Inc. | System and method for virtual portchannel load balancing in a trill network |
US20130347103A1 (en) | 2012-06-21 | 2013-12-26 | Mark Veteikis | Packet capture for error tracking |
US8959325B2 (en) | 2012-06-21 | 2015-02-17 | Breakingpoint Systems, Inc. | Systems and methods for booting devices using assigned servers in a multiple-card computing system |
US9038178B1 (en) | 2012-06-25 | 2015-05-19 | Emc Corporation | Detection of malware beaconing activities |
US9213590B2 (en) | 2012-06-27 | 2015-12-15 | Brocade Communications Systems, Inc. | Network monitoring and diagnostics |
US9686169B2 (en) | 2012-07-02 | 2017-06-20 | Ixia | Real-time highly accurate network latency measurement with low generated traffic or data requirements |
US8861331B2 (en) * | 2012-07-03 | 2014-10-14 | King Fahd University Of Petroleum And Minerals | Least movement WSAN topology repair method |
US9792320B2 (en) | 2012-07-06 | 2017-10-17 | Box, Inc. | System and method for performing shard migration to support functions of a cloud-based service |
US8868030B2 (en) | 2012-07-30 | 2014-10-21 | General Motors Llc | Automated vehicle intrusion device |
US9852073B2 (en) | 2012-08-07 | 2017-12-26 | Dell Products L.P. | System and method for data redundancy within a cache |
WO2014025472A1 (en) | 2012-08-09 | 2014-02-13 | Itron, Inc. | Interface for clustered utility nodes |
US9548908B2 (en) | 2012-08-21 | 2017-01-17 | Cisco Technology, Inc. | Flow de-duplication for network monitoring |
US8792380B2 (en) | 2012-08-24 | 2014-07-29 | Accedian Networks Inc. | System for establishing and maintaining a clock reference indicating one-way latency in a data network |
US8984331B2 (en) | 2012-09-06 | 2015-03-17 | Triumfant, Inc. | Systems and methods for automated memory and thread execution anomaly detection in a computer network |
US20150067786A1 (en) | 2013-09-04 | 2015-03-05 | Michael Stephen Fiske | Visual image authentication and transaction authorization using non-determinism |
US10194284B2 (en) | 2012-09-12 | 2019-01-29 | Digit International Inc. | Embedded communication in message based transports |
US20140089494A1 (en) | 2012-09-27 | 2014-03-27 | Hewlett-Packard Development Company, L.P. | Managing compliance across information technology components |
US9164965B2 (en) | 2012-09-28 | 2015-10-20 | Oracle International Corporation | Interactive topological views of combined hardware and software systems |
US9231820B2 (en) | 2012-09-28 | 2016-01-05 | Juniper Networks, Inc. | Methods and apparatus for controlling wireless access points |
EP2932667A4 (en) | 2012-10-03 | 2016-09-28 | Distrix Networks Ltd | SYSTEMS AND METHODS FOR ADAPTIVE LOAD BALANCING COMMUNICATIONS, ROUTING, FILTERING AND ACCESS CONTROL IN DISTRIBUTED NETWORKS |
US9253042B2 (en) | 2012-10-05 | 2016-02-02 | Nec Laboratories America, Inc. | Network management |
US9083613B2 (en) | 2012-10-16 | 2015-07-14 | Cisco Technology, Inc. | Detection of cabling error in communication network |
US9438488B2 (en) | 2012-11-09 | 2016-09-06 | Citrix Systems, Inc. | Systems and methods for appflow for datastream |
US9178912B2 (en) | 2012-11-15 | 2015-11-03 | Cisco Technology, Inc. | Virtual device context (VDC) integration for network services |
CN103023970B (zh) | 2012-11-15 | 2015-07-22 | 中国科学院计算机网络信息中心 | 一种物联网海量数据存储方法及系统 |
US9171151B2 (en) | 2012-11-16 | 2015-10-27 | Microsoft Technology Licensing, Llc | Reputation-based in-network filtering of client event information |
US9253140B2 (en) | 2012-11-20 | 2016-02-02 | Cisco Technology, Inc. | System and method for optimizing within subnet communication in a network environment |
US9535871B2 (en) | 2012-11-27 | 2017-01-03 | Red Hat Israel, Ltd. | Dynamic routing through virtual appliances |
US9960974B2 (en) | 2012-11-30 | 2018-05-01 | International Business Machines Corporation | Dependency mapping among a system of servers, analytics and visualization thereof |
US9313096B2 (en) | 2012-12-04 | 2016-04-12 | International Business Machines Corporation | Object oriented networks |
US9742877B2 (en) | 2012-12-04 | 2017-08-22 | International Business Machines Corporation | Clustering support across geographical boundaries |
US9183033B2 (en) * | 2012-12-06 | 2015-11-10 | Industrial Technology Research Institute | Method and system for analyzing root causes of relating performance issues among virtual machines to physical machines |
US20140173623A1 (en) | 2012-12-17 | 2014-06-19 | Mediatek Inc. | Method for controlling task migration of task in heterogeneous multi-core system based on dynamic migration threshold and related computer readable medium |
US8813236B1 (en) | 2013-01-07 | 2014-08-19 | Narus, Inc. | Detecting malicious endpoints using network connectivity and flow information |
WO2014111922A1 (en) | 2013-01-21 | 2014-07-24 | B.G. Negev Technologies And Applications Ltd. | Method and system for protecting computerized systems from malicious code |
WO2014116888A1 (en) | 2013-01-25 | 2014-07-31 | REMTCS Inc. | Network security system, method, and apparatus |
US9191402B2 (en) | 2013-01-25 | 2015-11-17 | Opendns, Inc. | Domain classification based on client request behavior |
US20140215573A1 (en) | 2013-01-31 | 2014-07-31 | Desire2Learn Incorporated | System and method for application accounts |
US9130836B2 (en) | 2013-02-04 | 2015-09-08 | Cisco Technology, Inc. | Provisoning of a new node joining an existing cluster in a data center environment |
US9369431B1 (en) | 2013-02-07 | 2016-06-14 | Infoblox Inc. | Security device controller |
US9080707B2 (en) | 2013-02-12 | 2015-07-14 | Bayer Medical Care Inc. | Intelligent contrast warmer and contrast holder |
US9286047B1 (en) | 2013-02-13 | 2016-03-15 | Cisco Technology, Inc. | Deployment and upgrade of network devices in a network environment |
WO2014128253A1 (en) | 2013-02-22 | 2014-08-28 | Adaptive Mobile Security Limited | System and method for embedded mobile (em)/machine to machine (m2m) security, pattern detection, mitigation |
US9143582B2 (en) | 2013-03-08 | 2015-09-22 | International Business Machines Corporation | Interoperability for distributed overlay virtual environments |
US9378068B2 (en) | 2013-03-13 | 2016-06-28 | International Business Machines Corporation | Load balancing for a virtual networking system |
US9237111B2 (en) | 2013-03-14 | 2016-01-12 | International Business Machines Corporation | Credit-based flow control in lossless ethernet networks |
US8848744B1 (en) | 2013-03-15 | 2014-09-30 | Extrahop Networks, Inc. | Resynchronization of passive monitoring of a flow based on hole detection |
US9407519B2 (en) | 2013-03-15 | 2016-08-02 | Vmware, Inc. | Virtual network flow monitoring |
US9721086B2 (en) | 2013-03-15 | 2017-08-01 | Advanced Elemental Technologies, Inc. | Methods and systems for secure and reliable identity-based computing |
US9043912B2 (en) | 2013-03-15 | 2015-05-26 | Mehdi Mahvi | Method for thwarting application layer hypertext transport protocol flood attacks focused on consecutively similar application-specific data packets |
US9477500B2 (en) | 2013-03-15 | 2016-10-25 | Avi Networks | Managing and controlling a distributed network service platform |
US9380066B2 (en) | 2013-03-29 | 2016-06-28 | Intel Corporation | Distributed traffic pattern analysis and entropy prediction for detecting malware in a network environment |
US9369368B2 (en) | 2013-04-06 | 2016-06-14 | Citrix Systems, Inc. | Systems and methods for capturing and consolidating packet tracing in a cluster system |
EP2797291A1 (en) | 2013-04-22 | 2014-10-29 | Telefonaktiebolaget L M Ericsson (publ) | Traffic analysis for http user agent based device category mapping |
KR101394424B1 (ko) | 2013-04-22 | 2014-05-13 | 한국인터넷진흥원 | 하이퍼바이저 기반 침입 방지 플랫폼 및 가상화 네트워크 침입 방지 시스템 |
US9015716B2 (en) | 2013-04-30 | 2015-04-21 | Splunk Inc. | Proactive monitoring tree with node pinning for concurrent node comparisons |
US9392022B2 (en) | 2013-05-03 | 2016-07-12 | Vmware, Inc. | Methods and apparatus to measure compliance of a virtual computing environment |
US9294483B2 (en) | 2013-05-03 | 2016-03-22 | John Wong | Method and system for mitigation of distributed denial of service (DDOS) attacks |
US10977229B2 (en) | 2013-05-21 | 2021-04-13 | Facebook, Inc. | Database sharding with update layer |
US20140348182A1 (en) | 2013-05-22 | 2014-11-27 | Iii Holdings 2, Llc | Time synchronization between nodes of a switched interconnect fabric |
US20140351415A1 (en) | 2013-05-24 | 2014-11-27 | PacketSled Inc. | Selective packet capture |
US9246945B2 (en) | 2013-05-29 | 2016-01-26 | International Business Machines Corporation | Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance |
US9191400B1 (en) | 2013-06-12 | 2015-11-17 | The United States Of America, As Represented By The Secretary Of The Navy | Cyphertext (CT) analytic engine and method for network anomaly detection |
US9769174B2 (en) | 2013-06-14 | 2017-09-19 | Catbird Networks, Inc. | Systems and methods for creating and modifying access control lists |
US11196636B2 (en) | 2013-06-14 | 2021-12-07 | Catbird Networks, Inc. | Systems and methods for network data flow aggregation |
US9197654B2 (en) | 2013-06-28 | 2015-11-24 | Mcafee, Inc. | Rootkit detection by using HW resources to detect inconsistencies in network traffic |
US20150006714A1 (en) | 2013-06-28 | 2015-01-01 | Microsoft Corporation | Run-time verification of middlebox routing and traffic processing |
US20150009840A1 (en) | 2013-07-03 | 2015-01-08 | Niksun, Inc. | Packet time stamp processing methods, systems, and apparatus |
IL227598B (en) | 2013-07-22 | 2018-05-31 | Verint Systems Ltd | Systems and methods for identifying malicious hosts |
US9246773B2 (en) | 2013-07-30 | 2016-01-26 | Draios Inc. | System, method, and graphical user interface for application topology mapping in hosted computing environments |
US9319293B2 (en) | 2013-07-31 | 2016-04-19 | Calix, Inc. | Methods and apparatuses for network flow analysis and control |
US20150039751A1 (en) | 2013-08-02 | 2015-02-05 | PacketSled Inc. | Dynamic parallel coordinates visualization of network flows |
US9450810B2 (en) | 2013-08-02 | 2016-09-20 | Cisco Technoogy, Inc. | Policy-driven automatic redundant fabric placement mechanism for virtual data centers |
US20150046882A1 (en) | 2013-08-07 | 2015-02-12 | Siemens Product Lifecycle Management Software Inc. | User interaction and display of tree hierarchy data on limited screen space |
CN104424013B (zh) | 2013-08-26 | 2018-03-09 | 国际商业机器公司 | 在计算环境中部署虚拟机的方法和设备 |
US9197666B2 (en) | 2013-08-26 | 2015-11-24 | Verizon Patent And Licensing Inc. | Method and apparatus for mitigating distributed denial of service attacks |
US9811435B2 (en) | 2013-09-03 | 2017-11-07 | Cisco Technology, Inc. | System for virtual machine risk monitoring |
US9607146B2 (en) | 2013-09-18 | 2017-03-28 | Qualcomm Incorporated | Data flow based behavioral analysis on mobile devices |
US20160212021A1 (en) | 2013-09-18 | 2016-07-21 | Jolata, Inc. | Highly probable identification of related messages using sparse hash function sets |
US9385959B2 (en) | 2013-09-26 | 2016-07-05 | Acelio, Inc. | System and method for improving TCP performance in virtualized environments |
US9418222B1 (en) | 2013-09-27 | 2016-08-16 | Symantec Corporation | Techniques for detecting advanced security threats |
US9507847B2 (en) | 2013-09-27 | 2016-11-29 | International Business Machines Corporation | Automatic log sensor tuning |
US9369435B2 (en) | 2013-09-30 | 2016-06-14 | Cisco Technology, Inc. | Method for providing authoritative application-based routing and an improved application firewall |
WO2015050488A1 (en) | 2013-10-03 | 2015-04-09 | Telefonaktiebolaget Lm Ericsson (Publ) | Method, system, computer program and computer program product for monitoring data packet flows between virtual machines, vms, within a data centre |
EP2860912A1 (en) | 2013-10-11 | 2015-04-15 | Telefonica Digital España, S.L.U. | A method for correlating network traffic data from distributed systems and computer program thereof |
US9330156B2 (en) | 2013-10-18 | 2016-05-03 | Cisco Technology, Inc. | System and method for software defined network aware data replication |
US20150142936A1 (en) | 2013-10-21 | 2015-05-21 | Nyansa, Inc. | System and method for observing and controlling a programmable network using time varying data collection |
US9405903B1 (en) | 2013-10-31 | 2016-08-02 | Palo Alto Networks, Inc. | Sinkholing bad network domains by registering the bad network domains on the internet |
US9973534B2 (en) | 2013-11-04 | 2018-05-15 | Lookout, Inc. | Methods and systems for secure network connections |
US9502111B2 (en) | 2013-11-05 | 2016-11-22 | Cisco Technology, Inc. | Weighted equal cost multipath routing |
US9634938B2 (en) | 2013-11-05 | 2017-04-25 | International Business Machines Corporation | Adaptive scheduling of data flows in data center networks for efficient resource utilization |
US9513938B2 (en) | 2013-11-07 | 2016-12-06 | Sap Se | Virtual appliance integration with cloud management software |
US9088598B1 (en) | 2013-11-14 | 2015-07-21 | Narus, Inc. | Systematic mining of associated server herds for uncovering malware and attack campaigns |
US9819551B2 (en) | 2013-11-20 | 2017-11-14 | Big Switch Networks, Inc. | Systems and methods for testing networks with a controller |
US9454324B1 (en) | 2013-12-18 | 2016-09-27 | Emc Corporation | Methods and apparatus for data lifecycle analysis |
US9507686B2 (en) | 2013-12-20 | 2016-11-29 | Netapp, Inc. | System, method, and computer program product for monitoring health of computer system assets |
EP2887595B8 (en) | 2013-12-23 | 2019-10-16 | Rohde & Schwarz GmbH & Co. KG | Method and node for retransmitting data packets in a tcp connection |
EP3087526A4 (en) | 2013-12-27 | 2017-06-21 | McAfee, Inc. | Segregating executable files exhibiting network activity |
US9563517B1 (en) | 2013-12-30 | 2017-02-07 | EMC IP Holding Company LLC | Cloud snapshots |
CN103716137B (zh) | 2013-12-30 | 2017-02-01 | 上海交通大学 | 一种识别ZigBee传感器网络丢包原因的方法及其系统 |
US10142259B2 (en) | 2014-03-03 | 2018-11-27 | Ericsson Ab | Conflict detection and resolution in an ABR network |
US9294486B1 (en) | 2014-03-05 | 2016-03-22 | Sandia Corporation | Malware detection and analysis |
KR101889500B1 (ko) | 2014-03-07 | 2018-09-20 | 한국전자통신연구원 | 네트워크 플로우 데이터를 이용한 네트워크 연결 체인 역추적 방법 및 시스템 |
US9886521B2 (en) | 2014-03-13 | 2018-02-06 | International Business Machines Corporation | Adaptive sampling schemes for clustering streaming graphs |
US20150261842A1 (en) | 2014-03-15 | 2015-09-17 | International Business Machines Corporation | Conformance specification and checking for hosting services |
US10263836B2 (en) | 2014-03-24 | 2019-04-16 | Microsoft Technology Licensing, Llc | Identifying troubleshooting options for resolving network failures |
US9853997B2 (en) | 2014-04-14 | 2017-12-26 | Drexel University | Multi-channel change-point malware detection |
US9762443B2 (en) | 2014-04-15 | 2017-09-12 | Splunk Inc. | Transformation of network data at remote capture agents |
US9319384B2 (en) | 2014-04-30 | 2016-04-19 | Fortinet, Inc. | Filtering hidden data embedded in media files |
US9659079B2 (en) | 2014-05-30 | 2017-05-23 | Wal-Mart Stores, Inc. | Shard determination logic for scalable order and inventory management architecture with a sharded transactional database |
US9531589B2 (en) | 2014-05-30 | 2016-12-27 | Cisco Technology, Inc. | Automating monitoring using configuration event triggers in a network environment |
WO2016004075A1 (en) | 2014-06-30 | 2016-01-07 | Amazon Technologies, Inc. | Interactive interfaces for machine learning model evaluations |
WO2016003332A1 (en) | 2014-07-01 | 2016-01-07 | Telefonaktiebolaget L M Ericsson (Publ) | Methods and nodes for congestion control |
CN104065518A (zh) | 2014-07-07 | 2014-09-24 | 北京市博汇科技股份有限公司 | 一种网络数据包丢失位置的确定方法及装置 |
US9645892B1 (en) | 2014-07-08 | 2017-05-09 | EMC IP Holding Company LLC | Recording file events in change logs while incrementally backing up file systems |
US9887886B2 (en) | 2014-07-15 | 2018-02-06 | Sap Se | Forensic software investigation |
US10659478B2 (en) | 2014-07-21 | 2020-05-19 | David Paul Heilig | Identifying stealth packets in network communications through use of packet headers |
AU2015296248B2 (en) | 2014-07-30 | 2018-01-18 | Forward Networks, Inc. | Systems and methods for network management |
US20160036837A1 (en) | 2014-08-04 | 2016-02-04 | Microsoft Corporation | Detecting attacks on data centers |
CN105517668B (zh) | 2014-08-06 | 2019-05-28 | 华为技术有限公司 | 识别网络传输拥塞的方法及装置 |
US20160050132A1 (en) | 2014-08-18 | 2016-02-18 | Telefonaktiebolaget L M Ericsson (Publ) | Method and system to dynamically collect statistics of traffic flows in a software-defined networking (sdn) system |
US9992225B2 (en) | 2014-09-12 | 2018-06-05 | Topspin Security Ltd. | System and a method for identifying malware network activity using a decoy environment |
US9537841B2 (en) | 2014-09-14 | 2017-01-03 | Sophos Limited | Key management for compromised enterprise endpoints |
US9935854B2 (en) | 2014-09-23 | 2018-04-03 | Uila Networks, Inc. | Infrastructure performance monitoring |
US10091174B2 (en) | 2014-09-29 | 2018-10-02 | Dropbox, Inc. | Identifying related user accounts based on authentication data |
US10270658B2 (en) | 2014-09-30 | 2019-04-23 | Cisco Technology, Inc. | Zero touch configuration and synchronization of a service appliance in a network environment |
US9524173B2 (en) | 2014-10-09 | 2016-12-20 | Brocade Communications Systems, Inc. | Fast reboot for a switch |
US11159599B2 (en) | 2014-10-10 | 2021-10-26 | Dynatrace Llc | Method and system for real-time modeling of communication, virtualization and transaction execution related topological aspects of monitored software applications and hardware entities |
US9781004B2 (en) | 2014-10-16 | 2017-10-03 | Cisco Technology, Inc. | Discovering and grouping application endpoints in a network environment |
US10171318B2 (en) | 2014-10-21 | 2019-01-01 | RiskIQ, Inc. | System and method of identifying internet-facing assets |
US9762490B2 (en) | 2014-10-27 | 2017-09-12 | Telefonaktiebolaget L M Ericsson (Publ) | Content filtering for information centric networks |
US9832213B2 (en) | 2014-10-31 | 2017-11-28 | Cyber Crucible Inc. | System and method for network intrusion detection of covert channels based on off-line network traffic |
US9417985B2 (en) | 2014-11-14 | 2016-08-16 | Semmle Limited | Distributed analysis and attribution of source code |
US9904584B2 (en) | 2014-11-26 | 2018-02-27 | Microsoft Technology Licensing, Llc | Performance anomaly diagnosis |
US9495193B2 (en) | 2014-12-05 | 2016-11-15 | International Business Machines Corporation | Monitoring hypervisor and provisioned instances of hosted virtual machines using monitoring templates |
US9584536B2 (en) | 2014-12-12 | 2017-02-28 | Fortinet, Inc. | Presentation of threat history associated with network activity |
US9667653B2 (en) | 2014-12-15 | 2017-05-30 | International Business Machines Corporation | Context-aware network service policy management |
US9253206B1 (en) | 2014-12-18 | 2016-02-02 | Docusign, Inc. | Systems and methods for protecting an online service attack against a network-based attack |
US9609517B2 (en) | 2014-12-19 | 2017-03-28 | Intel Corporation | Cooperative security in wireless sensor networks |
US10261851B2 (en) | 2015-01-23 | 2019-04-16 | Lightbend, Inc. | Anomaly detection using circumstance-specific detectors |
US10893100B2 (en) * | 2015-03-12 | 2021-01-12 | International Business Machines Corporation | Providing agentless application performance monitoring (APM) to tenant applications by leveraging software-defined networking (SDN) |
US9819689B2 (en) | 2015-03-13 | 2017-11-14 | Microsoft Technology Licensing, Llc | Large scale malicious process detection |
US10193929B2 (en) | 2015-03-13 | 2019-01-29 | Varmour Networks, Inc. | Methods and systems for improving analytics in distributed networks |
US9438618B1 (en) | 2015-03-30 | 2016-09-06 | Amazon Technologies, Inc. | Threat detection and mitigation through run-time introspection and instrumentation |
US10291473B2 (en) | 2015-03-31 | 2019-05-14 | Ca, Inc. | Routing policy impact simulation |
US9462013B1 (en) | 2015-04-29 | 2016-10-04 | International Business Machines Corporation | Managing security breaches in a networked computing environment |
US10374904B2 (en) | 2015-05-15 | 2019-08-06 | Cisco Technology, Inc. | Diagnostic network visualization |
US9800497B2 (en) | 2015-05-27 | 2017-10-24 | Cisco Technology, Inc. | Operations, administration and management (OAM) in overlay data center environments |
US20160359695A1 (en) | 2015-06-04 | 2016-12-08 | Cisco Technology, Inc. | Network behavior data collection and analytics for anomaly detection |
US10142353B2 (en) | 2015-06-05 | 2018-11-27 | Cisco Technology, Inc. | System for monitoring and managing datacenters |
US9967158B2 (en) | 2015-06-05 | 2018-05-08 | Cisco Technology, Inc. | Interactive hierarchical network chord diagram for application dependency mapping |
US10536357B2 (en) | 2015-06-05 | 2020-01-14 | Cisco Technology, Inc. | Late data detection in data center |
US10089099B2 (en) | 2015-06-05 | 2018-10-02 | Cisco Technology, Inc. | Automatic software upgrade |
US10033766B2 (en) | 2015-06-05 | 2018-07-24 | Cisco Technology, Inc. | Policy-driven compliance |
US9553885B2 (en) | 2015-06-08 | 2017-01-24 | Illusive Networks Ltd. | System and method for creation, deployment and management of augmented attacker map |
US10063446B2 (en) | 2015-06-26 | 2018-08-28 | Intel Corporation | Netflow collection and export offload using network silicon |
US10389615B2 (en) | 2015-06-29 | 2019-08-20 | Cisco Technology, Inc. | Enhanced packet flow monitoring in a network |
US10362113B2 (en) | 2015-07-02 | 2019-07-23 | Prasenjit Bhadra | Cognitive intelligence platform for distributed M2M/ IoT systems |
US10091087B2 (en) | 2015-07-20 | 2018-10-02 | Cisco Technology, Inc. | Methods and systems for load balancing based on data shard leader |
US20170032310A1 (en) | 2015-07-28 | 2017-02-02 | Charles Mimnaugh | Inventory management and marketplace |
US10498588B2 (en) | 2015-08-13 | 2019-12-03 | Level 3 Communications, Llc | Systems and methods for managing network health |
US20170070582A1 (en) | 2015-09-03 | 2017-03-09 | Alcatel Lucent | Network entity discovery and service stitching |
US9733973B2 (en) | 2015-09-16 | 2017-08-15 | Cisco Technology, Inc. | Automatically determining sensor location in a virtualized computing environment |
US10291463B2 (en) * | 2015-10-07 | 2019-05-14 | Riverbed Technology, Inc. | Large-scale distributed correlation |
US10306490B2 (en) | 2016-01-20 | 2019-05-28 | Netscout Systems Texas, Llc | Multi KPI correlation in wireless protocols |
US10284444B2 (en) | 2016-02-29 | 2019-05-07 | Airmagnet, Inc. | Visual representation of end user response time in a multi-tiered network application |
CA3015628A1 (en) | 2016-02-29 | 2017-09-08 | Level 3 Communications, Llc | Systems and methods for dynamic firewall policy configuration |
WO2017168202A1 (en) | 2016-03-27 | 2017-10-05 | Yogesh Chunilal Rathod | Identifying & storing followers, following users, viewers, users and connections for user |
US10523598B2 (en) | 2016-04-04 | 2019-12-31 | Futurewei Technologies, Inc. | Multi-path virtual switching |
US10243926B2 (en) | 2016-04-08 | 2019-03-26 | Cisco Technology, Inc. | Configuring firewalls for an industrial automation network |
WO2017184233A1 (en) | 2016-04-18 | 2017-10-26 | Acalvio Technologies, Inc. | Systems and methods for detecting and tracking adversary trajectory |
US10153977B2 (en) | 2016-05-12 | 2018-12-11 | Cisco Technology, Inc. | Adapting control plane policing parameters dynamically |
US10171357B2 (en) | 2016-05-27 | 2019-01-01 | Cisco Technology, Inc. | Techniques for managing software defined networking controller in-band communications in a data center network |
CN109196807B (zh) * | 2016-06-01 | 2021-09-24 | 瑞典爱立信有限公司 | 网络节点以及操作网络节点以进行资源分发的方法 |
US10289438B2 (en) | 2016-06-16 | 2019-05-14 | Cisco Technology, Inc. | Techniques for coordination of application components deployed on distributed virtual machines |
US20180007115A1 (en) | 2016-07-01 | 2018-01-04 | Cisco Technology, Inc. | Fog enabled telemetry embedded in real time multimedia applications |
US20180096081A1 (en) * | 2016-09-30 | 2018-04-05 | Hewlett Packard Enterprise Development Lp | Relocation of an analytical process based on lineage metadata |
US10972388B2 (en) | 2016-11-22 | 2021-04-06 | Cisco Technology, Inc. | Federated microburst detection |
CN107196807A (zh) | 2017-06-20 | 2017-09-22 | 清华大学深圳研究生院 | 网络中间设备及其部署方法 |
-
2017
- 2017-03-28 US US15/471,183 patent/US10873794B2/en active Active
-
2018
- 2018-03-28 WO PCT/US2018/024730 patent/WO2018183422A1/en unknown
- 2018-03-28 EP EP18720434.2A patent/EP3602968A1/en not_active Withdrawn
- 2018-03-28 CN CN201880021765.XA patent/CN110521171B/zh active Active
-
2020
- 2020-11-11 US US17/094,815 patent/US11202132B2/en active Active
-
2021
- 2021-11-18 US US17/529,727 patent/US11683618B2/en active Active
-
2023
- 2023-05-05 US US18/313,255 patent/US11863921B2/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105847069A (zh) * | 2012-06-06 | 2016-08-10 | 瞻博网络公司 | 针对虚拟网络分组流的物理路径确定 |
Also Published As
Publication number | Publication date |
---|---|
US20210067849A1 (en) | 2021-03-04 |
CN110521171A (zh) | 2019-11-29 |
US11202132B2 (en) | 2021-12-14 |
US10873794B2 (en) | 2020-12-22 |
US11863921B2 (en) | 2024-01-02 |
US20180287907A1 (en) | 2018-10-04 |
US20220159357A1 (en) | 2022-05-19 |
EP3602968A1 (en) | 2020-02-05 |
WO2018183422A1 (en) | 2018-10-04 |
US20230276152A1 (en) | 2023-08-31 |
US11683618B2 (en) | 2023-06-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110521171B (zh) | 用于应用性能监视和管理的流簇解析 | |
US11088929B2 (en) | Predicting application and network performance | |
US11750653B2 (en) | Network intrusion counter-intelligence | |
US20220038353A1 (en) | Technologies for annotating process and user information for network flows | |
US11159386B2 (en) | Enriched flow data for network analytics | |
US10523541B2 (en) | Federated network and application data analytics platform | |
CN111543038B (zh) | 使用中间设备流拼接的网络流拼接 | |
US20180278498A1 (en) | Process representation for process-level network segmentation | |
US11503063B2 (en) | Systems and methods for detecting hidden vulnerabilities in enterprise networks | |
US20190123983A1 (en) | Data integration and user application framework | |
US11128700B2 (en) | Load balancing configuration based on traffic flow telemetry | |
US20210218638A1 (en) | Automatic configuration discovery based on traffic flow data | |
US10798015B2 (en) | Discovery of middleboxes using traffic flow stitching | |
US20210392135A1 (en) | Securing workload and application access from unauthorized entities |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |