Patent classifications
H04L67/101
Prioritizing internet-accessible workloads for cyber security
Methods and systems for assessing internet exposure of a cloud-based workload are disclosed. A method comprises accessing at least one cloud provider API to determine a plurality of entities capable of routing traffic in a virtual cloud environment associated with a target account containing the workload, querying the at least one cloud provider API to determine at least one networking configuration of the entities, building a graph connecting the plurality of entities based on the networking configuration, accessing a data structure identifying services publicly accessible via the Internet and capable of serving as an internet proxy; integrating the identified services into the graph; traversing the graph to identify at least one source originating via the Internet and reaching the workload, and outputting a risk notification associated with the workload. Systems and computer-readable media implementing the above method are also disclosed.
Collect and forward
Apparatus and methods are disclosed for processing messages from agents of a network environment including the use of collectors. Collectors can use configurable pipelines to improve processing of messages received from the agents. In one example of the disclosed technology, a number of networked agents are configured to gather data describing operational aspects of an agent's computing host. A collector is configured to receive reports from the agent and send the gathered data to one or more destination agent data consumers designated by augmentation information in the reports. In some examples, the collector transforms data using one or more stage selector rules.
Collect and forward
Apparatus and methods are disclosed for processing messages from agents of a network environment including the use of collectors. Collectors can use configurable pipelines to improve processing of messages received from the agents. In one example of the disclosed technology, a number of networked agents are configured to gather data describing operational aspects of an agent's computing host. A collector is configured to receive reports from the agent and send the gathered data to one or more destination agent data consumers designated by augmentation information in the reports. In some examples, the collector transforms data using one or more stage selector rules.
SYSTEM AND METHOD FOR ROUTING SERVICE REQUESTS
A computer-implemented method routes service requests to services in a service framework provided by a plurality of hosts. The method comprises receiving a service request for a service in the service framework and discovering a plurality of candidate hosts that host the service. The plurality of candidate hosts are a subset of the plurality of hosts. The method further comprises selecting a candidate host from the plurality of candidate hosts based on measured latencies for the plurality of candidate hosts and routing the service request to the selected candidate host.
Dynamic content delivery network selection using DNS
Techniques for dynamic content delivery network (CDN) selection using the domain name service (DNS) protocol are described. A DNS resolver utilizes a network identifier provided within a DNS query seeking to resolve a domain to select between different CDNs. The selection can be based on an analysis of network metric summary data corresponding to the CDNs from the perspective of an approximate location of the requesting client, as determined via the network identifier as a proxy. The selection process and involved network metric types can be configured by the user associated with the domain via a selection policy. Network metrics can be provided by the user or collected based on reported data generated by remote clients through provided metric-generating code, and thereafter transformed into network metric summary data that is used for resolution.
Optimized self-designing key-value storage engine
Embodiments of the invention utilize an optimized key-value storage engine to strike the optimal balance between cloud-cost and performance and supports queries, including updates, lookups, range queries, inserts, and read-modify-writes. Cloud cost is manifested in purchasing both storage and processing resources. The improved approach has the ability to self-design and instantiate holistic configurations given a workload, a cloud budget, and optionally performance goals and a set of Service Level Agreement (SLA) specifications. A configuration reflects an optimized storage engine design in terms of, for example, the individual data structures design (in-memory and on-disk) in the engine as well as their algorithms and interactions, a cloud provider, and the exact virtual machines to be used.
Optimized self-designing key-value storage engine
Embodiments of the invention utilize an optimized key-value storage engine to strike the optimal balance between cloud-cost and performance and supports queries, including updates, lookups, range queries, inserts, and read-modify-writes. Cloud cost is manifested in purchasing both storage and processing resources. The improved approach has the ability to self-design and instantiate holistic configurations given a workload, a cloud budget, and optionally performance goals and a set of Service Level Agreement (SLA) specifications. A configuration reflects an optimized storage engine design in terms of, for example, the individual data structures design (in-memory and on-disk) in the engine as well as their algorithms and interactions, a cloud provider, and the exact virtual machines to be used.
Control of offloading of calculation tasks in multi-access edge computing
Method for offloading calculation tasks between a user terminal and an edge host device in a communication network according to a multi-access edge computing technique, including steps of: Offloading data necessary for the execution of the calculation from the user terminal to the edge host device, and Transmitting data resulting from the calculation carried out by the edge host device, from the edge host device to the user terminal, wherein the offloading of data is controlled on the basis of joint criteria of energy efficiency and of minimization of exposure of a user of the user terminal to electromagnetic fields.
Control of offloading of calculation tasks in multi-access edge computing
Method for offloading calculation tasks between a user terminal and an edge host device in a communication network according to a multi-access edge computing technique, including steps of: Offloading data necessary for the execution of the calculation from the user terminal to the edge host device, and Transmitting data resulting from the calculation carried out by the edge host device, from the edge host device to the user terminal, wherein the offloading of data is controlled on the basis of joint criteria of energy efficiency and of minimization of exposure of a user of the user terminal to electromagnetic fields.
Method, apparatus, medium, and device for scheduling access request
An access request scheduling method includes determining a city and a city operator corresponding to an access source IP segment; selecting, from cloud delivery nodes of the city operator, a preferred node of the access source IP segment; determining a mapping relationship between the access source IP segment and an IP of the preferred node; and issuing the mapping relationship to scheduling agent modules of the cloud delivery nodes in a network.