GB2568114B - Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector - Google Patents

Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector Download PDF

Info

Publication number
GB2568114B
GB2568114B GB1718427.6A GB201718427A GB2568114B GB 2568114 B GB2568114 B GB 2568114B GB 201718427 A GB201718427 A GB 201718427A GB 2568114 B GB2568114 B GB 2568114B
Authority
GB
United Kingdom
Prior art keywords
training
define
learning algorithm
configuration vector
virtual machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
GB1718427.6A
Other versions
GB201718427D0 (en
GB2568114A (en
Inventor
Shackleton Mark
El-Moussa Fadi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
British Telecommunications PLC
Original Assignee
British Telecommunications PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by British Telecommunications PLC filed Critical British Telecommunications PLC
Priority to GB1718427.6A priority Critical patent/GB2568114B/en
Publication of GB201718427D0 publication Critical patent/GB201718427D0/en
Publication of GB2568114A publication Critical patent/GB2568114A/en
Application granted granted Critical
Publication of GB2568114B publication Critical patent/GB2568114B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer And Data Communications (AREA)
GB1718427.6A 2017-11-07 2017-11-07 Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector Active GB2568114B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1718427.6A GB2568114B (en) 2017-11-07 2017-11-07 Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1718427.6A GB2568114B (en) 2017-11-07 2017-11-07 Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector

Publications (3)

Publication Number Publication Date
GB201718427D0 GB201718427D0 (en) 2017-12-20
GB2568114A GB2568114A (en) 2019-05-08
GB2568114B true GB2568114B (en) 2020-05-06

Family

ID=60664652

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1718427.6A Active GB2568114B (en) 2017-11-07 2017-11-07 Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector

Country Status (1)

Country Link
GB (1) GB2568114B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11132444B2 (en) * 2018-04-16 2021-09-28 International Business Machines Corporation Using gradients to detect backdoors in neural networks

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160239330A1 (en) * 2015-02-12 2016-08-18 Alcatel-Lucent Usa Inc. Dynamic Reconfiguration Of Resources In A Virtualized Network
US20170147816A1 (en) * 2015-11-23 2017-05-25 Armor Defense Inc. Extracting Malicious Instructions on a Virtual Machine
US20170279826A1 (en) * 2016-03-22 2017-09-28 Symantec Corporation Protecting dynamic and short-lived virtual machine instances in cloud environments

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160239330A1 (en) * 2015-02-12 2016-08-18 Alcatel-Lucent Usa Inc. Dynamic Reconfiguration Of Resources In A Virtualized Network
US20170147816A1 (en) * 2015-11-23 2017-05-25 Armor Defense Inc. Extracting Malicious Instructions on a Virtual Machine
US20170279826A1 (en) * 2016-03-22 2017-09-28 Symantec Corporation Protecting dynamic and short-lived virtual machine instances in cloud environments

Also Published As

Publication number Publication date
GB201718427D0 (en) 2017-12-20
GB2568114A (en) 2019-05-08

Similar Documents

Publication Publication Date Title
SG11202005204SA (en) Improved decoder-side motion vector derivation
ZA201906240B (en) Constraining motion vector information derived by decoder-side motion vector derivation
GB2560400B (en) Vector processing unit
EP3659074A4 (en) Vector computational unit
PL3639519T3 (en) Motion vector prediction
IL264683B (en) Vector multiply-add instruction
GB2549809B (en) Vector
GB201711880D0 (en) Machine learning for attack mitigation in virtual machine
GB201621923D0 (en) Last frame motion vector partitioning
GB201614093D0 (en) Vector
IL261311B (en) Vector predication instruction
GB201617464D0 (en) Minature vector sensor
GB201915384D0 (en) Vector
IL256663B (en) Vector arithmethic instruction
IL274178A (en) Vector add-with-carry instruction
GB2568114B (en) Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector
GB2562122B (en) Training machine
IL267038B (en) Vector generating instruction
IL256440B (en) Vector operand bitsize control
GB2568115B (en) Training a machine learning algorithm to select the security configuration for a virtual machine
GB202019108D0 (en) Vector
GB201913974D0 (en) Vector
GB201718294D0 (en) Vector construct
GB2564352B (en) Virtual numbers for intelligence operations
GB201705927D0 (en) Vector