Intelligent scheduling of backups

    公开(公告)号:US11442817B2

    公开(公告)日:2022-09-13

    申请号:US16287130

    申请日:2019-02-27

    Applicant: Rubrik, Inc.

    Inventor: Di Wu

    Abstract: Normal virtual machine operation is observed to automatically determine patterns of resource utilization. Backup activities are then scheduled, taking into account these utilization patterns. For example, if a normally scheduled backup would occur during a busy period, it may be rescheduled to a less busy period. As another example, backups made by made opportunistically during less busy periods even if not required by the normal backup schedule, in order to alleviate backup demands during more busy periods.

    Intelligent scheduling of backups

    公开(公告)号:US11256576B2

    公开(公告)日:2022-02-22

    申请号:US16287199

    申请日:2019-02-27

    Applicant: Rubrik, Inc.

    Inventor: Di Wu

    Abstract: A system for reducing VM stunting during backup of a set of virtual machines is provided. In some examples, a system comprises processors and a memory storing instructions that, when executed by at least one processor among the processors, cause the system to perform certain operations. Example operations may include running an analytic process to learn resource utilization patterns of a hypervisor system monitoring the set of virtual machines, determining an opportunistic window of reduced resource utilization based on the resource utilization patterns, and scheduling backup for the set of virtual machines during the opportunistic window.

    Ransomware infection detection in filesystems

    公开(公告)号:US11120131B2

    公开(公告)日:2021-09-14

    申请号:US16049574

    申请日:2018-07-30

    Applicant: Rubrik, Inc.

    Abstract: Described herein is a system that detects ransomware infection in filesystems. The system detects ransomware infection by using backup data of machines. The system detects ransomware infection in two stages. In the first stage, the system analyzes a filesystem's behavior. The filesystem's behavior can be obtained by loading the backup data and crawling the filesystem to create a filesystem metadata including information about file operations during a time interval. The filesystem determines a pattern of the file operations and compares the pattern to a normal patter to analyze the filesystem's behavior. If the filesystem's behavior is abnormal, the system proceeds to the second stage to analyze the content of the files to look for signs of encryption in the filesystem. The system combines the analysis of both stages to determine whether the filesystem is infected by ransomware.

Patent Agency Ranking