GB2555174B - Reconfigured virtual machine to mitigate attack - Google Patents
Reconfigured virtual machine to mitigate attackInfo
- Publication number
- GB2555174B GB2555174B GB1711847.2A GB201711847A GB2555174B GB 2555174 B GB2555174 B GB 2555174B GB 201711847 A GB201711847 A GB 201711847A GB 2555174 B GB2555174 B GB 2555174B
- Authority
- GB
- United Kingdom
- Prior art keywords
- virtual machine
- reconfigured virtual
- mitigate attack
- mitigate
- attack
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/044—Recurrent networks, e.g. Hopfield networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/047—Probabilistic or stochastic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
- G06N3/088—Non-supervised learning, e.g. competitive learning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45587—Isolation or security of virtual machine instances
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Evolutionary Computation (AREA)
- Mathematical Physics (AREA)
- Biomedical Technology (AREA)
- Biophysics (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Life Sciences & Earth Sciences (AREA)
- Molecular Biology (AREA)
- Computing Systems (AREA)
- Virology (AREA)
- Probability & Statistics with Applications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB1614021.2A GB201614021D0 (en) | 2016-08-16 | 2016-08-16 | Reconfigured virtual machine to mitigate attack |
EP16184383 | 2016-08-16 |
Publications (3)
Publication Number | Publication Date |
---|---|
GB201711847D0 GB201711847D0 (en) | 2017-09-06 |
GB2555174A GB2555174A (en) | 2018-04-25 |
GB2555174B true GB2555174B (en) | 2019-02-13 |
Family
ID=59771579
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1711847.2A Active GB2555174B (en) | 2016-08-16 | 2017-07-24 | Reconfigured virtual machine to mitigate attack |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2555174B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114363062B (en) * | 2021-12-31 | 2024-07-09 | 深信服科技股份有限公司 | Domain name detection method, system, equipment and computer readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100199351A1 (en) * | 2009-01-02 | 2010-08-05 | Andre Protas | Method and system for securing virtual machines by restricting access in connection with a vulnerability audit |
US20130055398A1 (en) * | 2011-08-26 | 2013-02-28 | Rapid7, LLC. | Systems and methods for performing vulnerability scans on virtual machines |
US8479276B1 (en) * | 2010-12-29 | 2013-07-02 | Emc Corporation | Malware detection using risk analysis based on file system and network activity |
US20160164894A1 (en) * | 2014-12-03 | 2016-06-09 | Guardicore Ltd. | Automatic network attack detection and remediation using information collected by honeypots |
-
2017
- 2017-07-24 GB GB1711847.2A patent/GB2555174B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100199351A1 (en) * | 2009-01-02 | 2010-08-05 | Andre Protas | Method and system for securing virtual machines by restricting access in connection with a vulnerability audit |
US8479276B1 (en) * | 2010-12-29 | 2013-07-02 | Emc Corporation | Malware detection using risk analysis based on file system and network activity |
US20130055398A1 (en) * | 2011-08-26 | 2013-02-28 | Rapid7, LLC. | Systems and methods for performing vulnerability scans on virtual machines |
US20160164894A1 (en) * | 2014-12-03 | 2016-06-09 | Guardicore Ltd. | Automatic network attack detection and remediation using information collected by honeypots |
Also Published As
Publication number | Publication date |
---|---|
GB201711847D0 (en) | 2017-09-06 |
GB2555174A (en) | 2018-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2548700B (en) | Virtual machine security | |
GB201712278D0 (en) | Configuration parameters for virtual machines | |
SG11201706848VA (en) | Executing commands within virtual machine instances | |
GB2545838B (en) | Hypervisor and virtual machine protection | |
GB201419272D0 (en) | Working machine | |
GB2524269B (en) | Virtual reality | |
HK1251315B (en) | Virtual machine systems | |
GB201419271D0 (en) | Working machine | |
GB201419276D0 (en) | Working Machine | |
EP3175614A4 (en) | Virtual changes to a real object | |
ZA201507128B (en) | Gaming machine | |
EP3386364C0 (en) | Surface maintenance machine | |
GB201418349D0 (en) | Virtual component alignment | |
GB201419273D0 (en) | Working machine | |
GB201410893D0 (en) | Working machine joystick assembly | |
PL3332474T3 (en) | Virtual capacitance | |
GB201512177D0 (en) | Machine to machine virtual private network | |
GB201419275D0 (en) | Working Machine | |
EP3549244C0 (en) | Improvements to rotary generators | |
GB2538045B (en) | Improvements to letter-plates | |
GB201503144D0 (en) | Virtual barrier | |
GB201503831D0 (en) | Virtual trying on experience | |
GB201420316D0 (en) | Virtual reality headset | |
GB2555174B (en) | Reconfigured virtual machine to mitigate attack | |
PL3137067T3 (en) | Citicoline to improve motor function |