Method for Providing Sticky Load Balancing
    23.
    发明申请
    Method for Providing Sticky Load Balancing 有权
    提供粘性负载平衡的方法

    公开(公告)号:US20150215819A1

    公开(公告)日:2015-07-30

    申请号:US14162954

    申请日:2014-01-24

    CPC classification number: H04L45/38 H04W24/02

    Abstract: Presented herein are techniques to reduce the number of redirected subscriber packet flows while performing sticky hierarchical load balancing. An Nth head end network element may be activated such that a plurality of N head end network elements are active and capable of receiving and processing one or more packet flows. A primary load balancer may then be directed to overwrite a portion of pointers of a hash table in an evenly distributed manner with pointers to the Nth head end network element such that packet flows are forwarded to the Nth head end network element, wherein the hash table retains a static number of entries as the number of head end network elements is modified.

    Abstract translation: 这里提出的是在执行粘性分层负载平衡的同时减少重定向用户分组流的数量的技术。 可以激活第N个头端网元,使得多个N个头端网元是活动的并且能够接收和处理一个或多个分组流。 然后可以引导主要负载平衡器以均匀分布的方式用指针覆盖散列表的指针的一部分,使得分组流被转发到第N个头端网元,其中散列表 随着头端网元数量的修改,保留了静态数量的条目。

    DYNAMIC PRIORITIZATION OF ATTACK PATHS IN CLOUD NATIVE APPLICATION

    公开(公告)号:US20250097252A1

    公开(公告)日:2025-03-20

    申请号:US18470884

    申请日:2023-09-20

    Abstract: Techniques for using real-time metrics and telemetry information to dynamically prioritize attack paths identified during a static analysis of a cloud native application, and using top priority attack paths identified during the static analysis to steer the dynamic analysis. The techniques may include identifying components of the cloud native application and connections between the components. The components and connections are analyzed to identify a set of attack paths. Network communications are monitored between the connections and metrics representing signals in the communications collected. A first subset of the attack paths based on a first portion of the metric indicating a real-time security vulnerability are identified. Finally, the first subset of the attack paths is prioritized over a second subset of the attack paths based at least in part on the first subset having the first portion of the metrics indicating real-time security vulnerabilities.

    ASSESSING SECURITY VULNERABILITIES IN CLOUD-NATIVE APPLICATIONS

    公开(公告)号:US20230004445A1

    公开(公告)日:2023-01-05

    申请号:US17662459

    申请日:2022-05-09

    Abstract: According to some embodiments, a method is performed by a distributed cloud-native application. The method comprises receiving a request from a user to perform an operation. The user is associated with a risk profile. The method further comprises determining a call path through the distributed cloud-native application to perform the operation and classifying a risk level associated with the determined call path based on a distributed call graph. The distributed call graph comprises a risk value for each call path through the distributed cloud-native application and each call path comprises one or more distributed cloud-native application components. The risk value is based on a weakness rating associated with each component in the call path. The method further comprises determining the risk level associated with the determined call path is acceptable based on the risk profile associated with the user and performing the operation.

    Automatic Assessment of API Service Security Standing with API Reputation Scoring

    公开(公告)号:US20220222335A1

    公开(公告)日:2022-07-14

    申请号:US17226304

    申请日:2021-04-09

    Abstract: The present disclosure is directed to assessing API service security and may include the steps of identifying an API service called by an application based on information provided by an agent embedded within the application; collecting telemetry associated with the API service, the telemetry collected from one or more telemetry sources and indicating any deficiencies in the API service; generating a reputation score for the API service based on analysis of the collected telemetry; and transmitting the reputation score to at least one of the following: the agent embedded within the application, wherein the reputation score is associated with at least one policy having at least one policy action, and wherein the reputation score is operable to be used by the agent to invoke the at least one policy action relating to use of the API service by the application; or a continuous integration/continuous delivery pipeline associated with the application.

    ON-PATH DYNAMIC POLICY ENFORCEMENT AND ENDPOINT-AWARE POLICY ENFORCEMENT FOR ENDPOINTS

    公开(公告)号:US20200322230A1

    公开(公告)日:2020-10-08

    申请号:US16782769

    申请日:2020-02-05

    Abstract: Systems, methods, and computer-readable media for locally applying endpoint-specific policies to an endpoint in a network environment. A network device local to one or more endpoints in a network environment can receive from a centralized network controller one or more network-wide endpoint policies. A first endpoint of the one or more endpoints can be configured to inject policy metadata into first data traffic. Policy metadata injected into the first traffic data can be received from the first endpoint. The network device can determine one or more first endpoint-specific polices for the first endpoint by evaluation the first policy metadata with respect to the one or more network-wide endpoint policies. As follows, the one or more first endpoint-specific policies can be applied to control data traffic associated with the first endpoint.

Patent Agency Ranking