Abstract:
Several deterrence mechanisms suitable for content distribution networks (CDN) (120) are provided. These include a hash-based request routing scheme and a site allocation scheme. The hash-based request routing scheme provides a way to distinguish legitimate requests from bogus requests. Using this mechanism, an attacker is required to generate O(n ) amount of traffic to victimize a CDN-hosted site (120) when the site content is served from n CDN caches. Without these modifications, the attacker must generate only 0(n) traffic to bring down the site. The site allocation scheme provides sufficient isolation among CDN-hosted Web sites (120) to prevent an attack on one Web site from making other sites unavailable. Using an allocation strategy based on binary codes, it can be guaranteed that a successful attack on any individual Web site that disables its assigned servers, does not also bring down other Web sites hosted by the CDN (120).
Abstract:
According to one embodiment, Layer-3 (L3) distributed router functionality is provided to a switch cluster by receiving an address resolution protocol (ARP) request packet from a first host at an entry switch in a switch cluster, a switch controller being in communication with the entry switch, and the ARP request packet including a virtual router IP address of the switch controller as a target, forwarding the ARP request packet to the switch controller after adding a header that adheres to a communication protocol used by the switch controller, receiving an ARP response packet from the switch controller indicating: a source IP address corresponding to a virtual router of the switch controller and a SMAC corresponding to the switch controller, forwarding the ARP response packet to the first host after stripping the communication protocol header, and setting the virtual router as a default gateway for traffic received from the first host.
Abstract:
A method monitors machine activity of multiple virtual computing devices operating through at least one physical computing device by running a monitoring agent. The method measures simple operating characteristics of only a base level virtual computing device and monitors complex operating characteristics by measuring the characteristics for each virtual computing device, recording the operating characteristics of each virtual computing device on a corresponding memory page of each virtual computing device, and sharing each the corresponding memory page with the base level virtual computing device through an interdomain communications channels to transfer the complex operating characteristics to the monitoring agent. The method identifies and outputs simple events and complex events for each of the multiple virtual computing devices by evaluating the simple operating characteristics and the complex operating characteristics.
Abstract:
A method monitors machine activity of multiple virtual computing devices operating through at least one physical computing device by running a monitoring agent. The method measures simple operating characteristics of only a base level virtual computing device and monitors complex operating characteristics by measuring the characteristics for each virtual computing device, recording the operating characteristics of each virtual computing device on a corresponding memory page of each virtual computing device, and sharing each the corresponding memory page with the base level virtual computing device through an interdomain communications channels to transfer the complex operating characteristics to the monitoring agent. The method identifies and outputs simple events and complex events for each of the multiple virtual computing devices by evaluating the simple operating characteristics and the complex operating characteristics.
Abstract:
Several deterrence mechanisms suitable for content distribution networks (CDN) are provided. These include a hash-based request routing scheme and a site allocation scheme. The hash-based request routing scheme provides a way to distinguish legitimate requests from bogus requests. Using this mechanism, an attacker is required to generate O(n2)amount of traffic to victimize a CDN-hosted site when the site content is served from n CDN caches. Without these modifications, the attacker must generate only O(n) traffic to bring down the site. The site allocation scheme provides sufficient isolation among CDN-hosted Web sites to prevent an attack on one Web site from making other sites unavailable. Using an allocation strategy based on binary codes, it can be guaranteed that a successful attack on any individual Web site that disables its assigned servers, does not also bring down other Web sites hosted by the CDN.
Abstract:
Un método supervisa actividad de máquina de múltiples dispositivos de cómputo virtual que operan a través de al menos un dispositivo de cómputo físico al ejecutar un agente de supervisión. El método mide características de operación simples de solo un dispositivo de cómputo virtual de nivel base y supervisa características de operación complejas al medir las características por cada dispositivo de cómputo virtual, grabar las características de operación de cada dispositivo de cómputo virtual en una página de memoria correspondiente de cada dispositivo de cómputo virtual, y compartir cada página de memoria correspondiente con el dispositivo de cómputo virtual de nivel base, a través de canales de comunicaciones interdominios, para transferir las características de operación complejas al agente de supervisión. El método identifica y envía de salida eventos simples y eventos complejos por cada uno de múltiples dispositivos de cómputo virtual al evaluar las características de operación simples y las características de operación complejas.
Abstract:
Several deterrence mechanisms suitable for content distribution networks (CD N) (120) are provided. These include a hash-based request routing scheme and a site allocation scheme. The hash-based request routing scheme provides a way to distinguish legitimate requests from bogus requests. Using this mechanism , an attacker is required to generate O(n2) amount of traffic to victimize a C DN- hosted site (120) when the site content is served from n CDN caches. Without these modifications, the attacker must generate only 0(n) traffic to bring down the site. The site allocation scheme provides sufficient isolation amon g CDN-hosted Web sites (120) to prevent an attack on one Web site from making other sites unavailable. Using an allocation strategy based on binary codes, it can be guaranteed that a successful attack on any individual Web site tha t disables its assigned servers, does not also bring down other Web sites host ed by the CDN (120).