CN111164597B - 用于管理服务器组的方法和系统 - Google Patents

用于管理服务器组的方法和系统 Download PDF

Info

Publication number
CN111164597B
CN111164597B CN201880062930.6A CN201880062930A CN111164597B CN 111164597 B CN111164597 B CN 111164597B CN 201880062930 A CN201880062930 A CN 201880062930A CN 111164597 B CN111164597 B CN 111164597B
Authority
CN
China
Prior art keywords
server
risk
server group
computer
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201880062930.6A
Other languages
English (en)
Chinese (zh)
Other versions
CN111164597A (zh
Inventor
黄珍镐
M.F.布鲁特
V.斯里达尔
曾赛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qindarui Co
Original Assignee
Qindarui Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qindarui Co filed Critical Qindarui Co
Publication of CN111164597A publication Critical patent/CN111164597A/zh
Application granted granted Critical
Publication of CN111164597B publication Critical patent/CN111164597B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/561Virus type analysis
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3404Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for parallel or distributed programming
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3495Performance evaluation by tracing or monitoring for systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Computing Systems (AREA)
  • Debugging And Monitoring (AREA)
  • Stored Programmes (AREA)
CN201880062930.6A 2017-09-29 2018-09-25 用于管理服务器组的方法和系统 Active CN111164597B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US15/721,566 2017-09-29
US15/721,566 US10540496B2 (en) 2017-09-29 2017-09-29 Dynamic re-composition of patch groups using stream clustering
PCT/IB2018/057407 WO2019064176A1 (en) 2017-09-29 2018-09-25 DYNAMIC RE-COMPOSITION OF CORRECTIVE GROUPS USING A FLOW REGROUP

Publications (2)

Publication Number Publication Date
CN111164597A CN111164597A (zh) 2020-05-15
CN111164597B true CN111164597B (zh) 2024-08-23

Family

ID=65896062

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880062930.6A Active CN111164597B (zh) 2017-09-29 2018-09-25 用于管理服务器组的方法和系统

Country Status (6)

Country Link
US (3) US10540496B2 (enExample)
JP (1) JP7129474B2 (enExample)
CN (1) CN111164597B (enExample)
DE (1) DE112018004284B4 (enExample)
GB (1) GB2582460B (enExample)
WO (1) WO2019064176A1 (enExample)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12184683B2 (en) * 2020-05-05 2024-12-31 The United States Of America As Represented By The Secretary Of The Army Cybersecurity resilience by integrating adversary and defender actions, deep learning, and graph thinking
CN112333279A (zh) * 2020-11-11 2021-02-05 平安科技(深圳)有限公司 服务器调配方法、装置、设备及存储介质
US11783068B2 (en) * 2021-03-24 2023-10-10 Bank Of America Corporation System for dynamic exposure monitoring
US12333018B2 (en) * 2021-10-15 2025-06-17 Capital One Services, Llc Security vulnerability communication and remediation with machine learning
DE102022203086A1 (de) * 2022-03-29 2023-10-05 Volkswagen Aktiengesellschaft Risikoanalyse eines verteilten Untersuchungsgegenstands
US12169709B2 (en) * 2022-03-30 2024-12-17 Kyndryl, Inc. Contextually cognitive edge server manager

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1577272A (zh) * 2003-07-16 2005-02-09 微软公司 易受攻击文件的自动检测和修复

Family Cites Families (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7313822B2 (en) * 2001-03-16 2007-12-25 Protegrity Corporation Application-layer security method and system
BR0215388A (pt) 2001-12-31 2004-12-07 Citadel Security Software Inc Método e sistema para solucionar vulnerabilidades em um computador, e, meio legìvel por computador
WO2003107211A1 (en) * 2002-06-18 2003-12-24 Esecurityonline Methods and systems for managing enterprise assets
KR100599451B1 (ko) * 2004-07-23 2006-07-12 한국전자통신연구원 이동형 저장장치를 이용한 인터넷 웜 치료 및 시스템 패치장치 및 그 방법
US9325728B1 (en) * 2005-01-27 2016-04-26 Leidos, Inc. Systems and methods for implementing and scoring computer network defense exercises
JP2006350543A (ja) 2005-06-14 2006-12-28 Mitsubishi Electric Corp ログ分析装置
US7647637B2 (en) 2005-08-19 2010-01-12 Sun Microsystems, Inc. Computer security technique employing patch with detection and/or characterization mechanism for exploit of patched vulnerability
US7712137B2 (en) * 2006-02-27 2010-05-04 Microsoft Corporation Configuring and organizing server security information
US8312545B2 (en) * 2006-04-06 2012-11-13 Juniper Networks, Inc. Non-signature malware detection system and method for mobile platforms
US8132260B1 (en) * 2006-06-12 2012-03-06 Redseal Systems, Inc. Methods and apparatus for prioritization of remediation techniques for network security risks
US7900259B2 (en) * 2007-03-16 2011-03-01 Prevari Predictive assessment of network risks
US8689330B2 (en) * 2007-09-05 2014-04-01 Yahoo! Inc. Instant messaging malware protection
US8839225B2 (en) 2008-01-23 2014-09-16 International Business Machines Corporation Generating and applying patches to a computer program code concurrently with its execution
US20090282457A1 (en) * 2008-05-06 2009-11-12 Sudhakar Govindavajhala Common representation for different protection architectures (crpa)
JP5148442B2 (ja) 2008-09-30 2013-02-20 株式会社東芝 脆弱性対応優先度表示装置及びプログラム
US8769683B1 (en) * 2009-07-07 2014-07-01 Trend Micro Incorporated Apparatus and methods for remote classification of unknown malware
US9317692B2 (en) * 2009-12-21 2016-04-19 Symantec Corporation System and method for vulnerability risk analysis
US8793681B2 (en) * 2011-06-24 2014-07-29 International Business Machines Corporation Determining best practices for applying computer software patches
CN102404715A (zh) 2011-11-18 2012-04-04 广东步步高电子工业有限公司 基于良性蠕虫的手机蠕虫病毒对抗方法
US9069969B2 (en) * 2012-06-13 2015-06-30 International Business Machines Corporation Managing software patch installations
US20140025796A1 (en) 2012-07-19 2014-01-23 Commvault Systems, Inc. Automated grouping of computing devices in a networked data storage system
US9083689B2 (en) * 2012-12-28 2015-07-14 Nok Nok Labs, Inc. System and method for implementing privacy classes within an authentication framework
KR101901911B1 (ko) * 2013-05-21 2018-09-27 삼성전자주식회사 악성 프로그램을 탐지하는 방법 및 장치
US20150066575A1 (en) * 2013-08-28 2015-03-05 Bank Of America Corporation Enterprise risk assessment
US10489861B1 (en) * 2013-12-23 2019-11-26 Massachusetts Mutual Life Insurance Company Methods and systems for improving the underwriting process
US20160328227A1 (en) 2014-01-08 2016-11-10 Hewlett Packard Enterprise Development Lp Dynamically Applying A Software Patch To A Computer Program
US10462158B2 (en) * 2014-03-19 2019-10-29 Nippon Telegraph And Telephone Corporation URL selection method, URL selection system, URL selection device, and URL selection program
US10445505B2 (en) * 2014-09-22 2019-10-15 Mcafee, Llc Process vulnerability assessment
KR102443172B1 (ko) 2014-09-24 2022-09-14 오라클 인터내셔날 코포레이션 멀티테넌트 어플리케이션 서버 환경에서 패치를 지원하는 시스템 및 방법
US9430219B2 (en) 2014-12-16 2016-08-30 Sap Se Revision safe upgrade in a hybrid cloud landscape
US9521160B2 (en) 2014-12-29 2016-12-13 Cyence Inc. Inferential analysis using feedback for extracting and combining cyber risk information
US9699209B2 (en) 2014-12-29 2017-07-04 Cyence Inc. Cyber vulnerability scan analyses with actionable feedback
US9923912B2 (en) * 2015-08-28 2018-03-20 Cisco Technology, Inc. Learning detector of malicious network traffic from weak labels
US10084811B1 (en) * 2015-09-09 2018-09-25 United Services Automobile Association (Usaa) Systems and methods for adaptive security protocols in a managed system
US10021120B1 (en) * 2015-11-09 2018-07-10 8X8, Inc. Delayed replication for protection of replicated databases
US10142362B2 (en) * 2016-06-02 2018-11-27 Zscaler, Inc. Cloud based systems and methods for determining security risks of users and groups
US10728261B2 (en) * 2017-03-02 2020-07-28 ResponSight Pty Ltd System and method for cyber security threat detection
US11436113B2 (en) * 2018-06-28 2022-09-06 Twitter, Inc. Method and system for maintaining storage device failure tolerance in a composable infrastructure
US10853046B2 (en) * 2018-12-13 2020-12-01 Salesforce.Com, Inc. Deployment of software applications on server clusters

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1577272A (zh) * 2003-07-16 2005-02-09 微软公司 易受攻击文件的自动检测和修复

Also Published As

Publication number Publication date
CN111164597A (zh) 2020-05-15
DE112018004284T5 (de) 2020-05-14
US11620381B2 (en) 2023-04-04
GB202006140D0 (en) 2020-06-10
WO2019064176A1 (en) 2019-04-04
GB2582460B (en) 2021-01-20
US20190102548A1 (en) 2019-04-04
JP2020535515A (ja) 2020-12-03
US20200110877A1 (en) 2020-04-09
JP7129474B2 (ja) 2022-09-01
US10540496B2 (en) 2020-01-21
US20210150029A1 (en) 2021-05-20
DE112018004284B4 (de) 2024-12-24
US10977366B2 (en) 2021-04-13
GB2582460A (en) 2020-09-23

Similar Documents

Publication Publication Date Title
CN111164597B (zh) 用于管理服务器组的方法和系统
US11411979B2 (en) Compliance process risk assessment
US11601468B2 (en) Detection of an adversarial backdoor attack on a trained model at inference time
JP7742204B2 (ja) Paasクラウド環境における演算子の成功の蓋然性を予測する為の機械学習モデル
CN116547948B (zh) 计算资源漏洞的基于上下文的风险评估
US11727060B2 (en) Graph analytics using random graph embedding
US11374958B2 (en) Security protection rule prediction and enforcement
JP7332250B2 (ja) 人工知能支援による規則生成
US10073974B2 (en) Generating containers for applications utilizing reduced sets of libraries based on risk analysis
US10649758B2 (en) Group patching recommendation and/or remediation with risk assessment
US20190026472A1 (en) Compliance-aware runtime generation based on application patterns and risk assessment
US11888872B2 (en) Protecting computer assets from malicious attacks
US20220303302A1 (en) Shift-left security risk analysis
US11551145B2 (en) Performance based switching of a model training process
US12003390B2 (en) Orchestration engine blueprint aspects for hybrid cloud composition
US11212162B2 (en) Bayesian-based event grouping
US11853017B2 (en) Machine learning optimization framework
CN118369886A (zh) 组合策略合规性和漏洞管理以用于风险评估
US20190190797A1 (en) Orchestration engine blueprint aspects for hybrid cloud composition
US11783226B2 (en) Model transfer learning across evolving processes
US11294759B2 (en) Detection of failure conditions and restoration of deployed models in a computing environment
US11075954B2 (en) Identifying systems where a policy as a code is applicable

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220216

Address after: New York, United States

Applicant after: Qindarui Co.

Address before: New York grams of Armand

Applicant before: International Business Machines Corp.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant