GB2568114B - Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector - Google Patents

Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector Download PDF

Info

Publication number
GB2568114B
GB2568114B GB1718427.6A GB201718427A GB2568114B GB 2568114 B GB2568114 B GB 2568114B GB 201718427 A GB201718427 A GB 201718427A GB 2568114 B GB2568114 B GB 2568114B
Authority
GB
United Kingdom
Prior art keywords
training
define
learning algorithm
configuration vector
virtual machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
GB1718427.6A
Other versions
GB2568114A (en
GB201718427D0 (en
Inventor
Shackleton Mark
El-Moussa Fadi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
British Telecommunications PLC
Original Assignee
British Telecommunications PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by British Telecommunications PLC filed Critical British Telecommunications PLC
Priority to GB1718427.6A priority Critical patent/GB2568114B/en
Publication of GB201718427D0 publication Critical patent/GB201718427D0/en
Publication of GB2568114A publication Critical patent/GB2568114A/en
Application granted granted Critical
Publication of GB2568114B publication Critical patent/GB2568114B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer And Data Communications (AREA)
GB1718427.6A 2017-11-07 2017-11-07 Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector Expired - Fee Related GB2568114B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1718427.6A GB2568114B (en) 2017-11-07 2017-11-07 Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1718427.6A GB2568114B (en) 2017-11-07 2017-11-07 Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector

Publications (3)

Publication Number Publication Date
GB201718427D0 GB201718427D0 (en) 2017-12-20
GB2568114A GB2568114A (en) 2019-05-08
GB2568114B true GB2568114B (en) 2020-05-06

Family

ID=60664652

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1718427.6A Expired - Fee Related GB2568114B (en) 2017-11-07 2017-11-07 Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector

Country Status (1)

Country Link
GB (1) GB2568114B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11132444B2 (en) * 2018-04-16 2021-09-28 International Business Machines Corporation Using gradients to detect backdoors in neural networks

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160239330A1 (en) * 2015-02-12 2016-08-18 Alcatel-Lucent Usa Inc. Dynamic Reconfiguration Of Resources In A Virtualized Network
US20170147816A1 (en) * 2015-11-23 2017-05-25 Armor Defense Inc. Extracting Malicious Instructions on a Virtual Machine
US20170279826A1 (en) * 2016-03-22 2017-09-28 Symantec Corporation Protecting dynamic and short-lived virtual machine instances in cloud environments

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160239330A1 (en) * 2015-02-12 2016-08-18 Alcatel-Lucent Usa Inc. Dynamic Reconfiguration Of Resources In A Virtualized Network
US20170147816A1 (en) * 2015-11-23 2017-05-25 Armor Defense Inc. Extracting Malicious Instructions on a Virtual Machine
US20170279826A1 (en) * 2016-03-22 2017-09-28 Symantec Corporation Protecting dynamic and short-lived virtual machine instances in cloud environments

Also Published As

Publication number Publication date
GB2568114A (en) 2019-05-08
GB201718427D0 (en) 2017-12-20

Similar Documents

Publication Publication Date Title
SG11202005204SA (en) Improved decoder-side motion vector derivation
ZA201906240B (en) Constraining motion vector information derived by decoder-side motion vector derivation
GB2560400B (en) Vector processing unit
EP3659074A4 (en) Vector computational unit
EP3639519C0 (en) Motion vector prediction
GB201711880D0 (en) Machine learning for attack mitigation in virtual machine
IL264683B (en) Vector multiply-add instruction
GB2549809B (en) Vector
GB201614093D0 (en) Vector
IL261311B (en) Vector predication instruction
IL256663B (en) Vector arithmethic instruction
GB201617464D0 (en) Minature vector sensor
GB202010009D0 (en) Vector
GB202019108D0 (en) Vector
IL274178A (en) Vector add-with-carry instruction
IL256440B (en) Vector operand bitsize control
IL267038A (en) Vector generating instruction
GB2562122B (en) Training machine
GB2568114B (en) Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector
GB201705927D0 (en) Vector
GB2568115B (en) Training a machine learning algorithm to select the security configuration for a virtual machine
EP3704244C0 (en) Vector construct
GB2564352B (en) Virtual numbers for intelligence operations
GB202108176D0 (en) Vector
GB202019286D0 (en) Expresison vector

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20231107