A method for detecting system problems and a method for allocating foglets
A system problem and system configuration technology, applied in the directions of resource allocation, error detection/correction, response error generation, etc., can solve problems such as low latency threshold, hindering cloud solution performance requirements, and inefficiency of fog network.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0058] In this example, the system includes software agents whose role is to detect anomalies in network traffic while keeping overhead low by deploying dedicated agents only when needed. By default, software agents observe and follow simple communication patterns, so that the computational overhead these agents introduce remains low. Once the software agent observes that certain communications do not conform to previously learned patterns, for example, a sudden increase in the use of a specific operational technology (OT) communication protocol, deeper inspection is required. To this end, a set of resting software agents dedicated to inspecting specific OT communication protocols are now awakened and deployed on devices (or fog nodes) that provide better observability of problems. The goal is to assess whether the observed behavior is indeed an intrusion. Once the check is complete, these software agents are removed from their physical devices and become "resting fog agents"...
example 2
[0060]In this example, the system contains software agents whose role is to detect anomalies in network traffic with the goal of early detection and localization of intrusions while keeping system observability low by regulating the number and location of agents deployed. overhead. To reduce overhead, proxies are deployed at network aggregation points in systems such as edge routers to observe all traffic passing between different parts of the system. By observing traffic, the agent learns normal business patterns. Once there is an expected change in the traffic pattern from a certain part of the system, for example, a sudden increase in traffic indicating a denial of service attack or some system nodes suddenly using a new communication protocol, a deeper system inspection is required to learn more about the anomaly and locate potential intrusion. A new set of software agents are then created or woken from quiescence and deployed deep into that part of the system to identif...
example 3
[0062] In Example 3, the system is a fog system in supervisory mode, and a software agent in the form of a Network Anomaly Detection Sensor (NADS) agent is placed on the fog nodes such that at least one of the two endpoints of each Ethernet connection is cover. The agent monitors all network traffic at its location and periodically (eg, every second) evaluates whether the current system is functioning properly. Whether the situation is normal is assessed based on a normal model, which is either designed according to the system configuration or learned by machine learning methods during or before operation (for example, during commissioning). In supervisory mode, normal models are based on simple key performance indicators (KPIs), such as packets per second and number of distinct source-destination pairs (in Ethernet and IP headers).
[0063] If the NADS agent detects an anomaly, it notifies the coordinator software agent. The coordinator software agent in turn initiates a de...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



