Unlock instant, AI-driven research and patent intelligence for your innovation.

Intrusion Detection and Mitigation in Data Processing

An intrusion detection system, database technology, applied in the direction of electrical digital data processing, digital transmission systems, instruments, etc., can solve the problem that HIDS cannot monitor a large number of calls

Active Publication Date: 2022-02-18
INT BUSINESS MASCH CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, traditional HIDS cannot monitor the large number of calls made in a network environment that may execute hundreds of different containers and / or virtual machines

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion Detection and Mitigation in Data Processing
  • Intrusion Detection and Mitigation in Data Processing
  • Intrusion Detection and Mitigation in Data Processing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Aspects of this disclosure relate to computer security, and more particularly, to intrusion detection systems. Aspects of the present disclosure develop one or more security policies based on selectively intercepted events generated in a controlled (eg, training, synthetic, simulated, or pre-production) execution environment. Each security policy can consist of one or more rules. Each rule can include a set of conditions. A client machine can use one or more security policies. In some embodiments, the client machine is a server in a production environment. The relationship between rules, security policies, and client machines can be described by a many-to-many relationship stored in the security policy database. The generated security policy can be enforced in an execution environment running on one or more client machines. A security policy may be enforced by intercepting certain types of events associated with the execution environment and comparing the intercepte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

a security manager configured to generate a plurality of learned security policies and provide at least one learned security policy and a security agent to a client machine, such that the at least one learned security policy is performed by the security agent on the client machine security policy. The security manager is configured to receive alerts from the security agent indicating abnormal behavior on the client machine.

Description

technical field [0001] The present invention relates to computer security, and in particular to intrusion detection systems. Background technique [0002] A computer security system protects the confidentiality (e.g., protection from privacy breaches), data integrity (e.g., protection from data corruption) and the availability of data (e.g. protection against functional interruption). However, unauthorized intrusion into computer systems may result in data disclosure and / or limited functionality. [0003] Unauthorized intrusions can exploit various attack vectors such as, but not limited to, workstation compromise, credential theft, exploitation (e.g., buffer overflow, stack overflow, etc.), vulnerabilities (e.g., exploiting a coding weakness in an application, kernel, etc.), and Escape-to-host attacks. [0004] Traditional intrusion detection systems can suffer from many challenges, such as generating an excessive number of alerts, requiring significant expertise (e.g., ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCG06F21/53G06F21/554G06F2221/034H04L63/1416H04L63/1441H04L63/205
Inventor A·舒尔曼-佩莱格S·瑞格维S·考哈尼曼R·佩莱格Z·巴瑟尔
Owner INT BUSINESS MASCH CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More