会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明授权
    • Identification of potential network threats using a distributed threshold random walk
    • 使用分布式阈值随机游走识别潜在的网络威胁
    • US07768921B2
    • 2010-08-03
    • US11589645
    • 2006-10-30
    • Harshad NakilBryan BurnsAnkur Singla
    • Harshad NakilBryan BurnsAnkur Singla
    • G08B23/00
    • H04L63/1425
    • In general, the invention is directed to techniques of identifying an infected network device in a computer network where traffic to and from the infected network device is not necessarily routed through a single point on the computer network. For example, individual line cards in network devices count incoming network flows from network devices in host tables. The host tables of all line cards of all participating network devices are then correlated. It is then determined whether the number of flows from a network device outweighs the number of flows to the network device to a significant degree. If so, the network device may be considered suspicious. Packets from a suspicious network device may be rerouted to a network security device for more thorough inspection.
    • 通常,本发明涉及识别计算机网络中感染的网络设备的技术,其中来往和来自被感染的网络设备的流量不一定通过计算机网络上的单个点路由。 例如,网络设备中的各个线路卡从主机表中的网络设备计数传入的网络流。 然后,所有参与的网络设备的所有线路卡的主机表相关。 然后确定来自网络设备的流量是否大大超过了到网络设备的流量的数量。 如果是这样,网络设备可能被认为是可疑的。 来自可疑网络设备的数据包可能会重新路由到网络安全设备以进行更全面的检查。
    • 9. 发明授权
    • Methods and apparatus with virtual identifiers for physical switches in a virtual chassis
    • 具有虚拟机箱中物理交换机的虚拟标识符的方法和设备
    • US08797897B1
    • 2014-08-05
    • US13249963
    • 2011-09-30
    • Megh BhattHarshad NakilRajashekar ReddySaurabh AgarwalShankar Ramanathan
    • Megh BhattHarshad NakilRajashekar ReddySaurabh AgarwalShankar Ramanathan
    • H04L12/26H04Q11/00
    • H04L12/26H04L49/00H04L49/65H04L49/70H04Q11/00
    • In some embodiments, an apparatus includes a first switch having an egress port configured to be coupled to a second switch to collectively to define a single logical entity having a set of virtual identifiers. A first set of virtual identifiers from the set of virtual identifiers is associated with the first switch, a second set of virtual identifiers from the set of virtual identifiers is associated with the second switch. The first switch is configured to receive a forwarding table associating a first set of destination addresses with a set of identifiers local to the first switch and associating a second set of destination addresses with a set of identifiers local to the second switch. Each identifier from the first set of identifiers is uniquely associated the first set of virtual identifiers. Each identifier from the set of identifiers is uniquely associated the second set of virtual identifiers.
    • 在一些实施例中,设备包括具有出口端口的第一交换机,该出口端口被配置为耦合到第二交换机以共同定义具有一组虚拟标识符的单个逻辑实体。 来自该组虚拟标识符的第一组虚拟标识符与第一交换机相关联,来自该组虚拟标识符的第二组虚拟标识符与第二交换机相关联。 第一交换机被配置为接收将第一组目的地地址与第一交换机本地的一组标识符相关联的转发表,并将第二组目的地址与第二交换机本地的一组标识符相关联。 来自第一组标识符的每个标识符与第一组虚拟标识符唯一相关联。 来自标识符集合的每个标识符与第二组虚拟标识符唯一地相关联。