Auto Migration of Services Within a Virtual Data Center
First Claim
1. A method comprising:
- detecting that virtual data center services provided to one of the at least two customers of are being subjected to an attack, wherein the virtual data center services are provided to the least two customers using a same first set of physical servers via a first network element; and
responsive to detecting that virtual data center services provided to the one of the at least two customers are being subjected to an attack, causing the virtual data center services provided to the one of the at least two customers to be migrated to a second set of physical servers that is not accessible via the first network element.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are provided herein for detecting that virtual data center services provided to one of at least two customers are being subjected to an attack, wherein the virtual data center services are provided to the least two customers using a same first set of physical servers via a first network element such as a physical access switch, and responsive to detecting that virtual data center services provided to the one of the at least two customers are being subjected to an attack (e.g., a virus or denial of service attack), the technique causes the virtual data center services provided to the one of the at least two customers to be migrated to, e.g., instantiated on, a second set of physical servers that is not accessible via the first network element.
-
Citations
20 Claims
-
1. A method comprising:
-
detecting that virtual data center services provided to one of the at least two customers of are being subjected to an attack, wherein the virtual data center services are provided to the least two customers using a same first set of physical servers via a first network element; and responsive to detecting that virtual data center services provided to the one of the at least two customers are being subjected to an attack, causing the virtual data center services provided to the one of the at least two customers to be migrated to a second set of physical servers that is not accessible via the first network element. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-readable memory medium storing instructions that, when executed by a processor, cause the processor to:
-
detect that virtual data center services provided to one of at least two customers are being subjected to an attack, wherein the virtual data center services are provided to the least two customers using a same first set of physical servers via a first network element; and responsive to detecting that the virtual data center services provided to the one of the at least two customers are being subjected to an attack, cause the virtual data center services provided to the one of the at least two customers to be migrated to a second set of physical servers that is not accessible via the first network element. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. An apparatus comprising:
-
a network interface unit configured to communications over a network with at least a resource manager; and a processor circuit configured to be coupled to the network interface unit, wherein the processor is configured to; detect that virtual data center services provided to one of at least two customers are being subjected to an attack, wherein the virtual data center services are provided to the least two customers using a same first set of physical servers via a first network element; and responsive to detecting that virtual data center services provided to the one of the at least two customers are being subjected to an attack, cause, via the network interface unit communicating with the resource manager, the virtual data center services provided to the one of the at least two customers to be migrated to a second set of physical servers that is not accessible via the first network element. - View Dependent Claims (17, 18, 19, 20)
-
Specification