GB2555174B - Reconfigured virtual machine to mitigate attack - Google Patents

Reconfigured virtual machine to mitigate attack

Info

Publication number
GB2555174B
GB2555174B GB1711847.2A GB201711847A GB2555174B GB 2555174 B GB2555174 B GB 2555174B GB 201711847 A GB201711847 A GB 201711847A GB 2555174 B GB2555174 B GB 2555174B
Authority
GB
United Kingdom
Prior art keywords
virtual machine
reconfigured virtual
mitigate attack
mitigate
attack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
GB1711847.2A
Other versions
GB201711847D0 (en
GB2555174A (en
Inventor
El-Moussa Fadi
Herwono Ian
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
British Telecommunications PLC
Original Assignee
British Telecommunications PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GBGB1614021.2A external-priority patent/GB201614021D0/en
Application filed by British Telecommunications PLC filed Critical British Telecommunications PLC
Publication of GB201711847D0 publication Critical patent/GB201711847D0/en
Publication of GB2555174A publication Critical patent/GB2555174A/en
Application granted granted Critical
Publication of GB2555174B publication Critical patent/GB2555174B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/044Recurrent networks, e.g. Hopfield networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/047Probabilistic or stochastic networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/088Non-supervised learning, e.g. competitive learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Mathematical Physics (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Molecular Biology (AREA)
  • Computing Systems (AREA)
  • Virology (AREA)
  • Probability & Statistics with Applications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
GB1711847.2A 2016-08-16 2017-07-24 Reconfigured virtual machine to mitigate attack Active GB2555174B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB1614021.2A GB201614021D0 (en) 2016-08-16 2016-08-16 Reconfigured virtual machine to mitigate attack
EP16184383 2016-08-16

Publications (3)

Publication Number Publication Date
GB201711847D0 GB201711847D0 (en) 2017-09-06
GB2555174A GB2555174A (en) 2018-04-25
GB2555174B true GB2555174B (en) 2019-02-13

Family

ID=59771579

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1711847.2A Active GB2555174B (en) 2016-08-16 2017-07-24 Reconfigured virtual machine to mitigate attack

Country Status (1)

Country Link
GB (1) GB2555174B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114363062B (en) * 2021-12-31 2024-07-09 深信服科技股份有限公司 Domain name detection method, system, equipment and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100199351A1 (en) * 2009-01-02 2010-08-05 Andre Protas Method and system for securing virtual machines by restricting access in connection with a vulnerability audit
US20130055398A1 (en) * 2011-08-26 2013-02-28 Rapid7, LLC. Systems and methods for performing vulnerability scans on virtual machines
US8479276B1 (en) * 2010-12-29 2013-07-02 Emc Corporation Malware detection using risk analysis based on file system and network activity
US20160164894A1 (en) * 2014-12-03 2016-06-09 Guardicore Ltd. Automatic network attack detection and remediation using information collected by honeypots

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100199351A1 (en) * 2009-01-02 2010-08-05 Andre Protas Method and system for securing virtual machines by restricting access in connection with a vulnerability audit
US8479276B1 (en) * 2010-12-29 2013-07-02 Emc Corporation Malware detection using risk analysis based on file system and network activity
US20130055398A1 (en) * 2011-08-26 2013-02-28 Rapid7, LLC. Systems and methods for performing vulnerability scans on virtual machines
US20160164894A1 (en) * 2014-12-03 2016-06-09 Guardicore Ltd. Automatic network attack detection and remediation using information collected by honeypots

Also Published As

Publication number Publication date
GB201711847D0 (en) 2017-09-06
GB2555174A (en) 2018-04-25

Similar Documents

Publication Publication Date Title
GB2548700B (en) Virtual machine security
GB201712278D0 (en) Configuration parameters for virtual machines
SG11201706848VA (en) Executing commands within virtual machine instances
GB2545838B (en) Hypervisor and virtual machine protection
GB201419272D0 (en) Working machine
GB2524269B (en) Virtual reality
HK1251315B (en) Virtual machine systems
GB201419271D0 (en) Working machine
GB201419276D0 (en) Working Machine
EP3175614A4 (en) Virtual changes to a real object
ZA201507128B (en) Gaming machine
EP3386364C0 (en) Surface maintenance machine
GB201418349D0 (en) Virtual component alignment
GB201419273D0 (en) Working machine
GB201410893D0 (en) Working machine joystick assembly
PL3332474T3 (en) Virtual capacitance
GB201512177D0 (en) Machine to machine virtual private network
GB201419275D0 (en) Working Machine
EP3549244C0 (en) Improvements to rotary generators
GB2538045B (en) Improvements to letter-plates
GB201503144D0 (en) Virtual barrier
GB201503831D0 (en) Virtual trying on experience
GB201420316D0 (en) Virtual reality headset
GB2555174B (en) Reconfigured virtual machine to mitigate attack
PL3137067T3 (en) Citicoline to improve motor function