Method of managing utilization of network intrusion detection systems in a dynamic data center
First Claim
1. A method of managing utilization of network intrusion detection systems in a dynamic data center, said method comprising:
- providing a plurality of network intrusion detection systems, each being networked so that utilization of each network intrusion detection system can be based on demand for said network intrusion detection systems in said dynamic data center;
receiving a monitoring policy and a plurality of monitoring points to be monitored on a network with any of said network intrusion detection systems; and
automatically arranging the monitoring of said monitoring points using said network intrusion detection systems and said monitoring policy.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of managing utilization of network intrusion detection systems in a dynamic data center is provided. A plurality of network intrusion detection systems are provided, each being networked so that utilization of each network intrusion detection system can be based on demand for the network intrusion detection systems in the dynamic data center. A monitoring policy and a plurality of monitoring points to be monitored on a network with any of the network intrusion detection systems are received. Further, the monitoring of the monitoring points is automatically arranged using the network intrusion detection systems and the monitoring policy.
16 Citations
20 Claims
-
1. A method of managing utilization of network intrusion detection systems in a dynamic data center, said method comprising:
-
providing a plurality of network intrusion detection systems, each being networked so that utilization of each network intrusion detection system can be based on demand for said network intrusion detection systems in said dynamic data center;
receiving a monitoring policy and a plurality of monitoring points to be monitored on a network with any of said network intrusion detection systems; and
automatically arranging the monitoring of said monitoring points using said network intrusion detection systems and said monitoring policy. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-readable medium comprising computer-executable instructions stored therein for performing a method of managing utilization of network intrusion detection systems in a dynamic data center, said method comprising:
-
providing a plurality of network intrusion detection systems, each being networked so that utilization of each network intrusion detection system can be based on demand for said network intrusion detection systems in said dynamic data center;
receiving a monitoring policy and a plurality of monitoring points to be monitored on a network with any of said network intrusion detection systems; and
automatically arranging the monitoring of said monitoring points using said network intrusion detection systems and said monitoring policy. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
a dynamic data center including;
a plurality of network resources;
a plurality of network intrusion detection systems, each being networked so that utilization of each network intrusion detection system can be based on demand for said network intrusion detection systems in said dynamic data center;
a graphical user interface for receiving a monitoring policy and a plurality of monitoring points to be monitored on a network with any of said network intrusion detection systems; and
a controller for controlling said network resources and said network intrusion detection systems and for automatically arranging the monitoring of said monitoring points using said network intrusion detection systems and said monitoring policy. - View Dependent Claims (16, 17, 18, 19, 20)
Specification