US 12,081,573 B2
Migration of traffic flows
Michael Kaplan, Basking Ridge, NJ (US); David Shur, Basking Ridge, NJ (US); Vikram Kaul, Basking Ridge, NJ (US); and Thomas Bowen, Basking Ridge, NJ (US)
Assigned to Peraton Labs Inc., Basking Ridge, NJ (US)
Filed by Peraton Labs Inc., Basking Ridge, NJ (US)
Filed on Nov. 14, 2022, as Appl. No. 18/055,209.
Application 18/055,209 is a continuation of application No. 16/246,388, filed on Jan. 11, 2019, granted, now 11,503,051.
Claims priority of provisional application 62/616,284, filed on Jan. 11, 2018.
Prior Publication US 2023/0076399 A1, Mar. 9, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); H04L 41/08 (2022.01); H04L 41/0806 (2022.01); H04L 43/062 (2022.01); H04L 43/08 (2022.01); H04L 43/0876 (2022.01); H04L 45/00 (2022.01); H04L 47/00 (2022.01); H04L 41/082 (2022.01); H04L 43/16 (2022.01)
CPC H04L 63/1425 (2013.01) [H04L 41/08 (2013.01); H04L 41/0806 (2013.01); H04L 43/062 (2013.01); H04L 43/08 (2013.01); H04L 43/0876 (2013.01); H04L 45/00 (2013.01); H04L 47/00 (2013.01); H04L 63/10 (2013.01); H04L 63/1491 (2013.01); H04L 41/082 (2013.01); H04L 43/16 (2013.01)] 23 Claims
OG exemplary drawing
 
1. A method comprising:
obtaining data traffic monitoring data, the data traffic monitoring data being in dependence on monitoring of traffic received by a virtual machine processing resource of a computing environment, wherein the method includes performing the monitoring of traffic and detecting in dependence on the monitoring of traffic that suspicious traffic has been received;
instantiating a virtual machine utility processing resource;
obtaining a state of the virtual machine processing resource and provisioning the virtual machine utility processing resource to include the state of the virtual machine processing resource so that the virtual machine utility processing resource and the virtual machine processing resource have a common state; and
configuring the computing environment to route data traffic to the virtual machine utility processing resource, wherein the configuring the computing environment to route data traffic to the virtual machine utility processing resource includes configuring the computing environment to route data from a certain client to the virtual machine utility processing resource, the certain client determined to be sending suspicious traffic, wherein the instantiating a virtual machine utility processing resource, the obtaining the state of the virtual machine processing resource, the provisioning the virtual machine utility processing resource to include the state of the virtual machine processing resource, and the configuring the computing environment to route data traffic to the virtual machine utility processing resource are performed in response to the detecting in dependence on the monitoring of traffic that suspicious traffic has been received.