Data center architecture that supports attack detection and mitigation
A data center and data technology, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems of increasing procurement cost and operating cost, hardware equipment can not be synchronized, preventing legitimate business, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0082] Example 1: A method performed by at least one computing device in a data center, the at least one computing device configured to form at least a portion of an interposer in the data center, the interposer computing by means of a plurality of servers Illustrated by a device, the method includes receiving, at the at least one computing device in the intermediary layer, a plurality of data packets of a traffic flow, the traffic flow being transmitted between: a first computing device or a first service hosted by a data center; and a second computing device or a second service; in response to receiving the plurality of data packets, processing the plurality of data packets to facilitate an identification attack; and when identified Upon the attack, a signal is generated indicating that the attack has been identified.
example 2
[0083] Example 2: The method of example 1, the interposer being in-band as the traffic flow traverses the data center.
example 3
[0084] Example 3: The method of any of Examples 1 or 2, wherein the plurality of server computing devices are further configured to execute respective software load balancers.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


