Method and System For Traffic Management Via Virtual Machine Migration
First Claim
1. A method for networking, the method comprising:
- performing by one or more circuits in a management device of a network;
detecting an abnormal traffic pattern in traffic communicated by a first virtual machine that utilizes a first set of network resources;
responsive to said detecting said abnormal pattern, initializing a second virtual machine that utilizes a second set of network resources, wherein;
said second virtual machine takes over functions performed by said first virtual machine; and
said initialization of said second virtual machine is based on an analysis of said traffic.
7 Assignments
0 Petitions
Accused Products
Abstract
Aspects of a method and system for traffic management via virtual machine migration include detecting an abnormal traffic pattern in traffic communicated by a first virtual machine that utilizes a first set of network resources. Responsive to the detection of the abnormal pattern, a second virtual machine that utilizes a second set of network resources may be initialized. The second virtual machine may take over functions performed by the first virtual machine and initialization of the second virtual machine is based on an analysis of the traffic. The second virtual machine may be initialized utilizing stored virtual machine sate information in instances that the abnormal traffic is a result of a malicious attack. The second virtual machine may be initialized utilizing current virtual machine state information in instances that the abnormal traffic is not a result of a malicious attack.
-
Citations
22 Claims
-
1. A method for networking, the method comprising:
performing by one or more circuits in a management device of a network; detecting an abnormal traffic pattern in traffic communicated by a first virtual machine that utilizes a first set of network resources; responsive to said detecting said abnormal pattern, initializing a second virtual machine that utilizes a second set of network resources, wherein; said second virtual machine takes over functions performed by said first virtual machine; and said initialization of said second virtual machine is based on an analysis of said traffic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
12. A system for networking, the system comprising:
one or more circuits for use in a management device of a network, wherein said one or more circuits are operable to; detect an abnormal traffic pattern in traffic communicated by a first virtual machine that utilizes a first set of network resources; responsive to said detecting said abnormal pattern, initialize a second virtual machine that utilizes a second set of network resources, wherein; said second virtual machine takes over functions performed by said first virtual machine; and said initialization of said second virtual machine is based on an analysis of said traffic.
Specification