GB2568114B - Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector - Google Patents
Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector Download PDFInfo
- Publication number
- GB2568114B GB2568114B GB1718427.6A GB201718427A GB2568114B GB 2568114 B GB2568114 B GB 2568114B GB 201718427 A GB201718427 A GB 201718427A GB 2568114 B GB2568114 B GB 2568114B
- Authority
- GB
- United Kingdom
- Prior art keywords
- training
- define
- learning algorithm
- configuration vector
- virtual machine
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 239000013598 vector Substances 0.000 title 2
- 238000010801 machine learning Methods 0.000 title 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45587—Isolation or security of virtual machine instances
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer And Data Communications (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1718427.6A GB2568114B (en) | 2017-11-07 | 2017-11-07 | Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1718427.6A GB2568114B (en) | 2017-11-07 | 2017-11-07 | Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector |
Publications (3)
Publication Number | Publication Date |
---|---|
GB201718427D0 GB201718427D0 (en) | 2017-12-20 |
GB2568114A GB2568114A (en) | 2019-05-08 |
GB2568114B true GB2568114B (en) | 2020-05-06 |
Family
ID=60664652
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1718427.6A Expired - Fee Related GB2568114B (en) | 2017-11-07 | 2017-11-07 | Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2568114B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11132444B2 (en) * | 2018-04-16 | 2021-09-28 | International Business Machines Corporation | Using gradients to detect backdoors in neural networks |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160239330A1 (en) * | 2015-02-12 | 2016-08-18 | Alcatel-Lucent Usa Inc. | Dynamic Reconfiguration Of Resources In A Virtualized Network |
US20170147816A1 (en) * | 2015-11-23 | 2017-05-25 | Armor Defense Inc. | Extracting Malicious Instructions on a Virtual Machine |
US20170279826A1 (en) * | 2016-03-22 | 2017-09-28 | Symantec Corporation | Protecting dynamic and short-lived virtual machine instances in cloud environments |
-
2017
- 2017-11-07 GB GB1718427.6A patent/GB2568114B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160239330A1 (en) * | 2015-02-12 | 2016-08-18 | Alcatel-Lucent Usa Inc. | Dynamic Reconfiguration Of Resources In A Virtualized Network |
US20170147816A1 (en) * | 2015-11-23 | 2017-05-25 | Armor Defense Inc. | Extracting Malicious Instructions on a Virtual Machine |
US20170279826A1 (en) * | 2016-03-22 | 2017-09-28 | Symantec Corporation | Protecting dynamic and short-lived virtual machine instances in cloud environments |
Also Published As
Publication number | Publication date |
---|---|
GB2568114A (en) | 2019-05-08 |
GB201718427D0 (en) | 2017-12-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202005204SA (en) | Improved decoder-side motion vector derivation | |
ZA201906240B (en) | Constraining motion vector information derived by decoder-side motion vector derivation | |
GB2560400B (en) | Vector processing unit | |
EP3659074A4 (en) | Vector computational unit | |
EP3639519C0 (en) | Motion vector prediction | |
GB201711880D0 (en) | Machine learning for attack mitigation in virtual machine | |
IL264683B (en) | Vector multiply-add instruction | |
GB2549809B (en) | Vector | |
GB201614093D0 (en) | Vector | |
IL261311B (en) | Vector predication instruction | |
IL256663B (en) | Vector arithmethic instruction | |
GB201617464D0 (en) | Minature vector sensor | |
GB202010009D0 (en) | Vector | |
GB202019108D0 (en) | Vector | |
IL274178A (en) | Vector add-with-carry instruction | |
IL256440B (en) | Vector operand bitsize control | |
IL267038A (en) | Vector generating instruction | |
GB2562122B (en) | Training machine | |
GB2568114B (en) | Training a machine learning algorithm to define vulnerability vectors for a virtual machine configuration vector | |
GB201705927D0 (en) | Vector | |
GB2568115B (en) | Training a machine learning algorithm to select the security configuration for a virtual machine | |
EP3704244C0 (en) | Vector construct | |
GB2564352B (en) | Virtual numbers for intelligence operations | |
GB202108176D0 (en) | Vector | |
GB202019286D0 (en) | Expresison vector |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20231107 |