CN111164597B - 用于管理服务器组的方法和系统 - Google Patents
用于管理服务器组的方法和系统 Download PDFInfo
- Publication number
- CN111164597B CN111164597B CN201880062930.6A CN201880062930A CN111164597B CN 111164597 B CN111164597 B CN 111164597B CN 201880062930 A CN201880062930 A CN 201880062930A CN 111164597 B CN111164597 B CN 111164597B
- Authority
- CN
- China
- Prior art keywords
- server
- risk
- server group
- computer
- group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/561—Virus type analysis
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3404—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for parallel or distributed programming
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3495—Performance evaluation by tracing or monitoring for systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- General Health & Medical Sciences (AREA)
- Quality & Reliability (AREA)
- Computing Systems (AREA)
- Debugging And Monitoring (AREA)
- Stored Programmes (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/721,566 | 2017-09-29 | ||
| US15/721,566 US10540496B2 (en) | 2017-09-29 | 2017-09-29 | Dynamic re-composition of patch groups using stream clustering |
| PCT/IB2018/057407 WO2019064176A1 (en) | 2017-09-29 | 2018-09-25 | DYNAMIC RE-COMPOSITION OF CORRECTIVE GROUPS USING A FLOW REGROUP |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN111164597A CN111164597A (zh) | 2020-05-15 |
| CN111164597B true CN111164597B (zh) | 2024-08-23 |
Family
ID=65896062
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201880062930.6A Active CN111164597B (zh) | 2017-09-29 | 2018-09-25 | 用于管理服务器组的方法和系统 |
Country Status (6)
| Country | Link |
|---|---|
| US (3) | US10540496B2 (enExample) |
| JP (1) | JP7129474B2 (enExample) |
| CN (1) | CN111164597B (enExample) |
| DE (1) | DE112018004284B4 (enExample) |
| GB (1) | GB2582460B (enExample) |
| WO (1) | WO2019064176A1 (enExample) |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12184683B2 (en) * | 2020-05-05 | 2024-12-31 | The United States Of America As Represented By The Secretary Of The Army | Cybersecurity resilience by integrating adversary and defender actions, deep learning, and graph thinking |
| CN112333279A (zh) * | 2020-11-11 | 2021-02-05 | 平安科技(深圳)有限公司 | 服务器调配方法、装置、设备及存储介质 |
| US11783068B2 (en) * | 2021-03-24 | 2023-10-10 | Bank Of America Corporation | System for dynamic exposure monitoring |
| US12333018B2 (en) * | 2021-10-15 | 2025-06-17 | Capital One Services, Llc | Security vulnerability communication and remediation with machine learning |
| DE102022203086A1 (de) * | 2022-03-29 | 2023-10-05 | Volkswagen Aktiengesellschaft | Risikoanalyse eines verteilten Untersuchungsgegenstands |
| US12169709B2 (en) * | 2022-03-30 | 2024-12-17 | Kyndryl, Inc. | Contextually cognitive edge server manager |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1577272A (zh) * | 2003-07-16 | 2005-02-09 | 微软公司 | 易受攻击文件的自动检测和修复 |
Family Cites Families (39)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7313822B2 (en) * | 2001-03-16 | 2007-12-25 | Protegrity Corporation | Application-layer security method and system |
| BR0215388A (pt) | 2001-12-31 | 2004-12-07 | Citadel Security Software Inc | Método e sistema para solucionar vulnerabilidades em um computador, e, meio legìvel por computador |
| WO2003107211A1 (en) * | 2002-06-18 | 2003-12-24 | Esecurityonline | Methods and systems for managing enterprise assets |
| KR100599451B1 (ko) * | 2004-07-23 | 2006-07-12 | 한국전자통신연구원 | 이동형 저장장치를 이용한 인터넷 웜 치료 및 시스템 패치장치 및 그 방법 |
| US9325728B1 (en) * | 2005-01-27 | 2016-04-26 | Leidos, Inc. | Systems and methods for implementing and scoring computer network defense exercises |
| JP2006350543A (ja) | 2005-06-14 | 2006-12-28 | Mitsubishi Electric Corp | ログ分析装置 |
| US7647637B2 (en) | 2005-08-19 | 2010-01-12 | Sun Microsystems, Inc. | Computer security technique employing patch with detection and/or characterization mechanism for exploit of patched vulnerability |
| US7712137B2 (en) * | 2006-02-27 | 2010-05-04 | Microsoft Corporation | Configuring and organizing server security information |
| US8312545B2 (en) * | 2006-04-06 | 2012-11-13 | Juniper Networks, Inc. | Non-signature malware detection system and method for mobile platforms |
| US8132260B1 (en) * | 2006-06-12 | 2012-03-06 | Redseal Systems, Inc. | Methods and apparatus for prioritization of remediation techniques for network security risks |
| US7900259B2 (en) * | 2007-03-16 | 2011-03-01 | Prevari | Predictive assessment of network risks |
| US8689330B2 (en) * | 2007-09-05 | 2014-04-01 | Yahoo! Inc. | Instant messaging malware protection |
| US8839225B2 (en) | 2008-01-23 | 2014-09-16 | International Business Machines Corporation | Generating and applying patches to a computer program code concurrently with its execution |
| US20090282457A1 (en) * | 2008-05-06 | 2009-11-12 | Sudhakar Govindavajhala | Common representation for different protection architectures (crpa) |
| JP5148442B2 (ja) | 2008-09-30 | 2013-02-20 | 株式会社東芝 | 脆弱性対応優先度表示装置及びプログラム |
| US8769683B1 (en) * | 2009-07-07 | 2014-07-01 | Trend Micro Incorporated | Apparatus and methods for remote classification of unknown malware |
| US9317692B2 (en) * | 2009-12-21 | 2016-04-19 | Symantec Corporation | System and method for vulnerability risk analysis |
| US8793681B2 (en) * | 2011-06-24 | 2014-07-29 | International Business Machines Corporation | Determining best practices for applying computer software patches |
| CN102404715A (zh) | 2011-11-18 | 2012-04-04 | 广东步步高电子工业有限公司 | 基于良性蠕虫的手机蠕虫病毒对抗方法 |
| US9069969B2 (en) * | 2012-06-13 | 2015-06-30 | International Business Machines Corporation | Managing software patch installations |
| US20140025796A1 (en) | 2012-07-19 | 2014-01-23 | Commvault Systems, Inc. | Automated grouping of computing devices in a networked data storage system |
| US9083689B2 (en) * | 2012-12-28 | 2015-07-14 | Nok Nok Labs, Inc. | System and method for implementing privacy classes within an authentication framework |
| KR101901911B1 (ko) * | 2013-05-21 | 2018-09-27 | 삼성전자주식회사 | 악성 프로그램을 탐지하는 방법 및 장치 |
| US20150066575A1 (en) * | 2013-08-28 | 2015-03-05 | Bank Of America Corporation | Enterprise risk assessment |
| US10489861B1 (en) * | 2013-12-23 | 2019-11-26 | Massachusetts Mutual Life Insurance Company | Methods and systems for improving the underwriting process |
| US20160328227A1 (en) | 2014-01-08 | 2016-11-10 | Hewlett Packard Enterprise Development Lp | Dynamically Applying A Software Patch To A Computer Program |
| US10462158B2 (en) * | 2014-03-19 | 2019-10-29 | Nippon Telegraph And Telephone Corporation | URL selection method, URL selection system, URL selection device, and URL selection program |
| US10445505B2 (en) * | 2014-09-22 | 2019-10-15 | Mcafee, Llc | Process vulnerability assessment |
| KR102443172B1 (ko) | 2014-09-24 | 2022-09-14 | 오라클 인터내셔날 코포레이션 | 멀티테넌트 어플리케이션 서버 환경에서 패치를 지원하는 시스템 및 방법 |
| US9430219B2 (en) | 2014-12-16 | 2016-08-30 | Sap Se | Revision safe upgrade in a hybrid cloud landscape |
| US9521160B2 (en) | 2014-12-29 | 2016-12-13 | Cyence Inc. | Inferential analysis using feedback for extracting and combining cyber risk information |
| US9699209B2 (en) | 2014-12-29 | 2017-07-04 | Cyence Inc. | Cyber vulnerability scan analyses with actionable feedback |
| US9923912B2 (en) * | 2015-08-28 | 2018-03-20 | Cisco Technology, Inc. | Learning detector of malicious network traffic from weak labels |
| US10084811B1 (en) * | 2015-09-09 | 2018-09-25 | United Services Automobile Association (Usaa) | Systems and methods for adaptive security protocols in a managed system |
| US10021120B1 (en) * | 2015-11-09 | 2018-07-10 | 8X8, Inc. | Delayed replication for protection of replicated databases |
| US10142362B2 (en) * | 2016-06-02 | 2018-11-27 | Zscaler, Inc. | Cloud based systems and methods for determining security risks of users and groups |
| US10728261B2 (en) * | 2017-03-02 | 2020-07-28 | ResponSight Pty Ltd | System and method for cyber security threat detection |
| US11436113B2 (en) * | 2018-06-28 | 2022-09-06 | Twitter, Inc. | Method and system for maintaining storage device failure tolerance in a composable infrastructure |
| US10853046B2 (en) * | 2018-12-13 | 2020-12-01 | Salesforce.Com, Inc. | Deployment of software applications on server clusters |
-
2017
- 2017-09-29 US US15/721,566 patent/US10540496B2/en active Active
-
2018
- 2018-09-25 GB GB2006140.4A patent/GB2582460B/en active Active
- 2018-09-25 CN CN201880062930.6A patent/CN111164597B/zh active Active
- 2018-09-25 JP JP2020516821A patent/JP7129474B2/ja active Active
- 2018-09-25 DE DE112018004284.7T patent/DE112018004284B4/de active Active
- 2018-09-25 WO PCT/IB2018/057407 patent/WO2019064176A1/en not_active Ceased
-
2019
- 2019-12-04 US US16/703,200 patent/US10977366B2/en not_active Expired - Fee Related
-
2020
- 2020-12-28 US US17/135,553 patent/US11620381B2/en active Active
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1577272A (zh) * | 2003-07-16 | 2005-02-09 | 微软公司 | 易受攻击文件的自动检测和修复 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN111164597A (zh) | 2020-05-15 |
| DE112018004284T5 (de) | 2020-05-14 |
| US11620381B2 (en) | 2023-04-04 |
| GB202006140D0 (en) | 2020-06-10 |
| WO2019064176A1 (en) | 2019-04-04 |
| GB2582460B (en) | 2021-01-20 |
| US20190102548A1 (en) | 2019-04-04 |
| JP2020535515A (ja) | 2020-12-03 |
| US20200110877A1 (en) | 2020-04-09 |
| JP7129474B2 (ja) | 2022-09-01 |
| US10540496B2 (en) | 2020-01-21 |
| US20210150029A1 (en) | 2021-05-20 |
| DE112018004284B4 (de) | 2024-12-24 |
| US10977366B2 (en) | 2021-04-13 |
| GB2582460A (en) | 2020-09-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111164597B (zh) | 用于管理服务器组的方法和系统 | |
| US11411979B2 (en) | Compliance process risk assessment | |
| US11601468B2 (en) | Detection of an adversarial backdoor attack on a trained model at inference time | |
| JP7742204B2 (ja) | Paasクラウド環境における演算子の成功の蓋然性を予測する為の機械学習モデル | |
| CN116547948B (zh) | 计算资源漏洞的基于上下文的风险评估 | |
| US11727060B2 (en) | Graph analytics using random graph embedding | |
| US11374958B2 (en) | Security protection rule prediction and enforcement | |
| JP7332250B2 (ja) | 人工知能支援による規則生成 | |
| US10073974B2 (en) | Generating containers for applications utilizing reduced sets of libraries based on risk analysis | |
| US10649758B2 (en) | Group patching recommendation and/or remediation with risk assessment | |
| US20190026472A1 (en) | Compliance-aware runtime generation based on application patterns and risk assessment | |
| US11888872B2 (en) | Protecting computer assets from malicious attacks | |
| US20220303302A1 (en) | Shift-left security risk analysis | |
| US11551145B2 (en) | Performance based switching of a model training process | |
| US12003390B2 (en) | Orchestration engine blueprint aspects for hybrid cloud composition | |
| US11212162B2 (en) | Bayesian-based event grouping | |
| US11853017B2 (en) | Machine learning optimization framework | |
| CN118369886A (zh) | 组合策略合规性和漏洞管理以用于风险评估 | |
| US20190190797A1 (en) | Orchestration engine blueprint aspects for hybrid cloud composition | |
| US11783226B2 (en) | Model transfer learning across evolving processes | |
| US11294759B2 (en) | Detection of failure conditions and restoration of deployed models in a computing environment | |
| US11075954B2 (en) | Identifying systems where a policy as a code is applicable |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| TA01 | Transfer of patent application right |
Effective date of registration: 20220216 Address after: New York, United States Applicant after: Qindarui Co. Address before: New York grams of Armand Applicant before: International Business Machines Corp. |
|
| TA01 | Transfer of patent application right | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |