Method of managing utilization of network intrusion detection systems in a dynamic data center
First Claim
1. A method of managing utilization of network intrusion detection systems in a dynamic data center, said method comprising:
- automatically providing a plurality of network intrusion detection systems, each being networked so that utilization of each network intrusion detection system can be based on demand for said network intrusion detection systems in said dynamic data center wherein said dynamic data center automatically provides said plurality of network intrusion detection systems by automatically provisioning said plurality of network intrusion detection systems from a pool of available network intrusion detection systems enabling automatic modification of a number of provided network intrusion detection systems based on the demand, wherein the automatic modification of the number is selected from increasing the number of provided network intrusion detection systems and decreasing the number of provided network intrusion detection systems;
automatically configuring said provided network intrusion detection systems, at least in part by,receiving a monitoring policy and a plurality of monitoring points to be monitored on a network with any of said network intrusion detection systems; and
automatically arranging the monitoring of said monitoring points using said network intrusion detection systems and said monitoring policy.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of managing utilization of network intrusion detection systems in a dynamic data center is provided. A plurality of network intrusion detection systems are provided, each being networked so that utilization of each network intrusion detection system can be based on demand for the network intrusion detection systems in the dynamic data center. A monitoring policy and a plurality of monitoring points to be monitored on a network with any of the network intrusion detection systems are received. Further, the monitoring of the monitoring points is automatically arranged using the network intrusion detection systems and the monitoring policy.
116 Citations
20 Claims
-
1. A method of managing utilization of network intrusion detection systems in a dynamic data center, said method comprising:
-
automatically providing a plurality of network intrusion detection systems, each being networked so that utilization of each network intrusion detection system can be based on demand for said network intrusion detection systems in said dynamic data center wherein said dynamic data center automatically provides said plurality of network intrusion detection systems by automatically provisioning said plurality of network intrusion detection systems from a pool of available network intrusion detection systems enabling automatic modification of a number of provided network intrusion detection systems based on the demand, wherein the automatic modification of the number is selected from increasing the number of provided network intrusion detection systems and decreasing the number of provided network intrusion detection systems; automatically configuring said provided network intrusion detection systems, at least in part by, receiving a monitoring policy and a plurality of monitoring points to be monitored on a network with any of said network intrusion detection systems; and automatically arranging the monitoring of said monitoring points using said network intrusion detection systems and said monitoring policy. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium comprising computer-executable instructions stored therein for performing a method of managing utilization of network intrusion detection systems in a dynamic data center, said method comprising:
-
automatically providing a plurality of network intrusion detection systems, each being networked so that utilization of each network intrusion detection system can be based on demand for said network intrusion detection systems in said dynamic data center wherein said dynamic data center automatically provides said plurality of network intrusion detection systems by automatically provisioning said plurality of network intrusion detection systems from a pool of available network intrusion detection systems enabling automatic modification of a number of provided network intrusion detection systems based on the demand, wherein the automatic modification of the number is selected from increasing the number of provided network intrusion detection systems and decreasing the number of provided network intrusion detection systems; automatically configuring said provided network intrusion detection systems, at least in part by, receiving a monitoring policy and a plurality of monitoring points to be monitored on a network with any of said network intrusion detection systems; and automatically arranging the monitoring of said monitoring points using said network intrusion detection systems and said monitoring policy. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
a dynamic data center including; a plurality of network resources; a plurality of network intrusion detection systems, each being networked so that utilization of each network intrusion detection system can be based on demand for said network intrusion detection systems in said dynamic data center wherein said dynamic data center automatically provides said plurality of network intrusion detection systems by automatically provisioning said plurality of network intrusion detection systems from a pool of available network intrusion detection systems enabling automatic modification of a number of provided network intrusion detection systems based on the demand, wherein the automatic modification of the number is selected from increasing the number of provided network intrusion detection systems and decreasing the number of provided network intrusion detection systems; a graphical user interface for receiving a monitoring policy and a plurality of monitoring points to be monitored on a network with any of said network intrusion detection systems; and a controller for controlling said network resources and said network intrusion detection systems and for automatically arranging the monitoring of said monitoring points using said network intrusion detection systems and said monitoring policy, wherein said graphical user interface and said controller provide at least in part automatic configuring of said provided network intrusion detection systems. - View Dependent Claims (16, 17, 18, 19, 20)
Specification