-
公开(公告)号:US10785248B2
公开(公告)日:2020-09-22
申请号:US15466632
申请日:2017-03-22
Applicant: Oracle International Corporation
Inventor: Ajai Joy , Sarat Aramandla
Abstract: Techniques for routing a request based on a vulnerability in a processing node are disclosed. A vulnerability analyzer determines a set of detected vulnerabilities in each of a set of processing nodes. Based on the detected vulnerabilities, the vulnerability analyzer determines a respective vulnerability score for each processing node. A routing engine receives a request to be processed by at least one of the set of processing nodes. The routing engine selects a particular node for processing the request based on the detected vulnerabilities in one or more of the set of processing nodes. The routing engine may select the particular node based on the vulnerability scores of the set of processing nodes. Additionally or alternatively, the routing engine may select the particular node based on whether the particular node includes any vulnerability that may be exploited by the request.
-
公开(公告)号:US10148684B2
公开(公告)日:2018-12-04
申请号:US15417645
申请日:2017-01-27
Applicant: ORACLE INTERNATIONAL CORPORATION
Inventor: Ajai Joy , Sarat C. Aramandla
Abstract: Systems, methods, and other embodiments associated with placing a workload on one of a plurality of hosts are described. In one embodiment, a method includes analyzing hosts to identify a first host and a second host determined to meet resource requirements of the workload. The example method may also include analyzing the first host to calculate a first threat score, and analyzing the second host to calculate a second threat score. The example method may also include selecting a host with a lowest threat score and placing the workload on the selected host. The example method may also include reanalyzing the selected host to calculate an updated threat score. The example method may also include in response to determining that the updated threat score exceeds a threshold threat score, moving the workload to a third host.
-
公开(公告)号:US12244657B2
公开(公告)日:2025-03-04
申请号:US18184557
申请日:2023-03-15
Applicant: Oracle International Corporation
Inventor: Ajai Joy , Balaji Krishnan
IPC: H04L65/61
Abstract: Techniques for transitioning between message infrastructure platforms are disclosed. A platform manager transmits a data stream using a first message infrastructure platform. A platform monitor monitors transmission characteristics associated with the transmission of the data stream using the first message infrastructure platform. A platform selector selects a second message infrastructure platform based on the transmission characteristics. A platform transitioner transitions from transmitting the data stream using the first message infrastructure platform to transmitting the data stream using the second message infrastructure platform seamlessly.
-
公开(公告)号:US20180278642A1
公开(公告)日:2018-09-27
申请号:US15466632
申请日:2017-03-22
Applicant: Oracle International Corporation
Inventor: Ajai Joy , Sarat Aramandla
IPC: H04L29/06 , G06F9/50 , H04L12/721
Abstract: Techniques for routing a request based on a vulnerability in a processing node are disclosed. A vulnerability analyzer determines a set of detected vulnerabilities in each of a set of processing nodes. Based on the detected vulnerabilities, the vulnerability analyzer determines a respective vulnerability score for each processing node. A routing engine receives a request to be processed by at least one of the set of processing nodes. The routing engine selects a particular node for processing the request based on the detected vulnerabilities in one or more of the set of processing nodes. The routing engine may select the particular node based on the vulnerability scores of the set of processing nodes. Additionally or alternatively, the routing engine may select the particular node based on whether the particular node includes any vulnerability that may be exploited by the request.
-
公开(公告)号:US20240314183A1
公开(公告)日:2024-09-19
申请号:US18184557
申请日:2023-03-15
Applicant: Oracle International Corporation
Inventor: Ajai Joy , Balaji Krishnan
IPC: H04L65/61
CPC classification number: H04L65/61
Abstract: Techniques for transitioning between message infrastructure platforms are disclosed. A platform manager transmits a data stream using a first message infrastructure platform. A platform monitor monitors transmission characteristics associated with the transmission of the data stream using the first message infrastructure platform. A platform selector selects a second message infrastructure platform based on the transmission characteristics. A platform transitioner transitions from transmitting the data stream using the first message infrastructure platform to transmitting the data stream using the second message infrastructure platform seamlessly.
-
公开(公告)号:US11528293B2
公开(公告)日:2022-12-13
申请号:US16936427
申请日:2020-07-23
Applicant: Oracle International Corporation
Inventor: Ajai Joy , Sarat Aramandla
Abstract: Techniques for routing a request based on a vulnerability in a processing node are disclosed. A vulnerability analyzer determines a set of detected vulnerabilities in each of a set of processing nodes. Based on the detected vulnerabilities, the vulnerability analyzer determines a respective vulnerability score for each processing node. A routing engine receives a request to be processed by at least one of the set of processing nodes. The routing engine selects a particular node for processing the request based on the detected vulnerabilities in one or more of the set of processing nodes. The routing engine may select the particular node based on the vulnerability scores of the set of processing nodes. Additionally or alternatively, the routing engine may select the particular node based on whether the particular node includes any vulnerability that may be exploited by the request.
-
公开(公告)号:US10404736B2
公开(公告)日:2019-09-03
申请号:US16207304
申请日:2018-12-03
Applicant: ORACLE INTERNATIONAL CORPORATION
Inventor: Ajai Joy , Sarat C. Aramandla
Abstract: Systems, methods, and other embodiments associated with placing a virtual machine or workload on one of a plurality of hosts are described. In one embodiment, a method includes analyzing the hosts to identify a set of candidate hosts. Each candidate host is analyzed and a threat score is calculated for each candidate host that is indicative of a degree of vulnerability of the candidate host to information-security threats. The corresponding threat scores from the candidate hosts are compared and a host with a lowest threat score is selected, and the virtual machine is placed on the selected host. Thereafter, the selected host is reanalyzed to calculate an updated threat score based at least in part upon the placement of the virtual machine, and in response to determining that the updated threat score exceeds a threshold, the virtual machine is moved to a different host.
-
-
-
-
-
-