-
公开(公告)号:US10469355B2
公开(公告)日:2019-11-05
申请号:US15811437
申请日:2017-11-13
Applicant: Amazon Technologies, Inc.
Inventor: Hardeep Singh Uppal , Prashanth Acharya , Craig Wesley Howard
IPC: H04L12/26 , H04L12/707 , H04L12/24
Abstract: A system, method, and computer-readable medium for point of presence (POP) based traffic surge detection and mitigation are provided. The system detects a traffic surge for a target group of resources directed at a source POP based on the target group's rank shifts and volume changes among recent time intervals. The system mitigates the detected traffic surge by identifying destination POPs with spare capacity and routing at least a portion of incoming requests for the target group of resources to the destination POPs in accordance with their spare capacities.
-
公开(公告)号:US20180159757A1
公开(公告)日:2018-06-07
申请号:US15811437
申请日:2017-11-13
Applicant: Amazon Technologies, Inc.
Inventor: Hardeep Singh Uppal , Prashanth Acharya , Craig Wesley Howard
IPC: H04L12/26 , H04L12/707
CPC classification number: H04L43/16 , H04L41/0896 , H04L45/22
Abstract: A system, method, and computer-readable medium for point of presence (POP) based traffic surge detection and mitigation are provided. The system detects a traffic surge for a target group of resources directed at a source POP based on the target group's rank shifts and volume changes among recent time intervals. The system mitigates the detected traffic surge by identifying destination POPs with spare capacity and routing at least a portion of incoming requests for the target group of resources to the destination POPs in accordance with their spare capacities.
-
公开(公告)号:US09887931B1
公开(公告)日:2018-02-06
申请号:US14673121
申请日:2015-03-30
Applicant: Amazon Technologies, Inc.
Inventor: Hardeep Singh Uppal , Prashanth Acharya , Craig Wesley Howard
IPC: H04L12/911 , H04L12/707 , H04L29/08 , H04L29/12
CPC classification number: H04L67/10 , H04L12/5691 , H04L41/0893 , H04L41/0896 , H04L43/16 , H04L61/1511 , H04L67/1036 , H04L67/322
Abstract: A system, method, and computer-readable medium for point of presence (POP) based traffic surge detection and mitigation are provided. The system detects a traffic surge for a target group of resources directed at a source POP based on the target group's rank shifts and volume changes among recent time intervals. The system mitigates the detected traffic surge by identifying destination POPs with spare capacity and routing at least a portion of incoming requests for the target group of resources to the destination POPs in accordance with their spare capacities.
-
公开(公告)号:US09819567B1
公开(公告)日:2017-11-14
申请号:US14673305
申请日:2015-03-30
Applicant: Amazon Technologies, Inc.
Inventor: Hardeep Singh Uppal , Prashanth Acharya , Craig Wesley Howard
IPC: G06F15/16 , H04L12/26 , H04L12/707
CPC classification number: H04L43/16 , H04L41/0896 , H04L45/22
Abstract: A system, method, and computer-readable medium for point of presence (POP) based traffic surge detection and mitigation are provided. The system detects a traffic surge for a target group of resources directed at a source POP based on the target group's rank shifts and volume changes among recent time intervals. The system mitigates the detected traffic surge by identifying destination POPs with spare capacity and routing at least a portion of incoming requests for the target group of resources to the destination POPs in accordance with their spare capacities.
-
公开(公告)号:US10819751B2
公开(公告)日:2020-10-27
申请号:US16001825
申请日:2018-06-06
Applicant: Amazon Technologies, Inc.
Inventor: Bryan Mark Benson , Kalyanaraman Prasad , Andrew Chen , Wenchuan Weng , Prashanth Acharya , Andrew L. Thomas , Hatem Mohamed Moustafa Eyada , Venkatesh Vijayaraghavan
Abstract: A processing device receives an event notification indicating a security configuration change of a cloud computing resource associated with a member account. In response, the processing device identifies a security policy associated with an administrative account corresponding to the member account and evaluates the security policy against the security configuration change to determine compliance with the policy. If not in compliance, the processing device generates a change event indicating a repair to the security configuration of the cloud computing resource to bring the security configuration into compliance with the security policy.
-
公开(公告)号:US09887932B1
公开(公告)日:2018-02-06
申请号:US14673159
申请日:2015-03-30
Applicant: Amazon Technologies, Inc.
Inventor: Hardeep Singh Uppal , Prashanth Acharya , Craig Wesley Howard
IPC: H04L12/911 , H04L12/917 , H04L12/26 , H04L29/12 , H04L29/08
CPC classification number: H04L47/76 , H04L43/16 , H04L61/1511 , H04L67/10 , H04L67/1036 , H04L67/322
Abstract: A system, method, and computer-readable medium for point of presence (POP) based traffic surge detection and mitigation are provided. The system detects a traffic surge for a target group of resources directed at a source POP based on the target group's rank shifts and volume changes among recent time intervals. The system mitigates the detected traffic surge by identifying destination POPs with spare capacity and routing at least a portion of incoming requests for the target group of resources to the destination POPs in accordance with their spare capacities.
-
公开(公告)号:US20190306194A1
公开(公告)日:2019-10-03
申请号:US16001825
申请日:2018-06-06
Applicant: Amazon Technologies, Inc.
Inventor: Bryan Mark Benson , Kalyanaraman Prasad , Andrew Chen , Wenchuan Weng , Prashanth Acharya , Andrew L. Thomas , Hatem Mohamed Moustafa Eyada , Venkatesh Vijayaraghavan
Abstract: A processing device receives an event notification indicating a security configuration change of a cloud computing resource associated with a member account. In response, the processing device identifies a security policy associated with an administrative account corresponding to the member account and evaluates the security policy against the security configuration change to determine compliance with the policy. If not in compliance, the processing device generates a change event indicating a repair to the security configuration of the cloud computing resource to bring the security configuration into compliance with the security policy.
-
-
-
-
-
-