GB2582460B - Dynamic re-composition of patch groups using stream clustering - Google Patents

Dynamic re-composition of patch groups using stream clustering Download PDF

Info

Publication number
GB2582460B
GB2582460B GB2006140.4A GB202006140A GB2582460B GB 2582460 B GB2582460 B GB 2582460B GB 202006140 A GB202006140 A GB 202006140A GB 2582460 B GB2582460 B GB 2582460B
Authority
GB
United Kingdom
Prior art keywords
dynamic
composition
patch groups
stream clustering
clustering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
GB2006140.4A
Other languages
English (en)
Other versions
GB202006140D0 (en
GB2582460A (en
Inventor
Hwang Jinho
Faith Bulut Mohammed
Sreedhar Vugranam
Zeng Sai
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of GB202006140D0 publication Critical patent/GB202006140D0/en
Publication of GB2582460A publication Critical patent/GB2582460A/en
Application granted granted Critical
Publication of GB2582460B publication Critical patent/GB2582460B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/561Virus type analysis
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3495Performance evaluation by tracing or monitoring for systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3404Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for parallel or distributed programming
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Computing Systems (AREA)
  • Debugging And Monitoring (AREA)
  • Stored Programmes (AREA)
GB2006140.4A 2017-09-29 2018-09-25 Dynamic re-composition of patch groups using stream clustering Active GB2582460B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15/721,566 US10540496B2 (en) 2017-09-29 2017-09-29 Dynamic re-composition of patch groups using stream clustering
PCT/IB2018/057407 WO2019064176A1 (en) 2017-09-29 2018-09-25 DYNAMIC RE-COMPOSITION OF CORRECTIVE GROUPS USING A FLOW REGROUP

Publications (3)

Publication Number Publication Date
GB202006140D0 GB202006140D0 (en) 2020-06-10
GB2582460A GB2582460A (en) 2020-09-23
GB2582460B true GB2582460B (en) 2021-01-20

Family

ID=65896062

Family Applications (1)

Application Number Title Priority Date Filing Date
GB2006140.4A Active GB2582460B (en) 2017-09-29 2018-09-25 Dynamic re-composition of patch groups using stream clustering

Country Status (6)

Country Link
US (3) US10540496B2 (enExample)
JP (1) JP7129474B2 (enExample)
CN (1) CN111164597B (enExample)
DE (1) DE112018004284B4 (enExample)
GB (1) GB2582460B (enExample)
WO (1) WO2019064176A1 (enExample)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12184683B2 (en) * 2020-05-05 2024-12-31 The United States Of America As Represented By The Secretary Of The Army Cybersecurity resilience by integrating adversary and defender actions, deep learning, and graph thinking
CN112333279A (zh) * 2020-11-11 2021-02-05 平安科技(深圳)有限公司 服务器调配方法、装置、设备及存储介质
US11783068B2 (en) * 2021-03-24 2023-10-10 Bank Of America Corporation System for dynamic exposure monitoring
US12333018B2 (en) * 2021-10-15 2025-06-17 Capital One Services, Llc Security vulnerability communication and remediation with machine learning
DE102022203086A1 (de) * 2022-03-29 2023-10-05 Volkswagen Aktiengesellschaft Risikoanalyse eines verteilten Untersuchungsgegenstands
US12169709B2 (en) * 2022-03-30 2024-12-17 Kyndryl, Inc. Contextually cognitive edge server manager

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7000247B2 (en) * 2001-12-31 2006-02-14 Citadel Security Software, Inc. Automated computer vulnerability resolution system
US7424706B2 (en) * 2003-07-16 2008-09-09 Microsoft Corporation Automatic detection and patching of vulnerable files
CN102404715A (zh) * 2011-11-18 2012-04-04 广东步步高电子工业有限公司 基于良性蠕虫的手机蠕虫病毒对抗方法

Family Cites Families (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7313822B2 (en) * 2001-03-16 2007-12-25 Protegrity Corporation Application-layer security method and system
WO2003107211A1 (en) * 2002-06-18 2003-12-24 Esecurityonline Methods and systems for managing enterprise assets
KR100599451B1 (ko) * 2004-07-23 2006-07-12 한국전자통신연구원 이동형 저장장치를 이용한 인터넷 웜 치료 및 시스템 패치장치 및 그 방법
US9325728B1 (en) * 2005-01-27 2016-04-26 Leidos, Inc. Systems and methods for implementing and scoring computer network defense exercises
JP2006350543A (ja) 2005-06-14 2006-12-28 Mitsubishi Electric Corp ログ分析装置
US7647637B2 (en) 2005-08-19 2010-01-12 Sun Microsystems, Inc. Computer security technique employing patch with detection and/or characterization mechanism for exploit of patched vulnerability
US7712137B2 (en) * 2006-02-27 2010-05-04 Microsoft Corporation Configuring and organizing server security information
US8312545B2 (en) * 2006-04-06 2012-11-13 Juniper Networks, Inc. Non-signature malware detection system and method for mobile platforms
US8132260B1 (en) * 2006-06-12 2012-03-06 Redseal Systems, Inc. Methods and apparatus for prioritization of remediation techniques for network security risks
US7900259B2 (en) * 2007-03-16 2011-03-01 Prevari Predictive assessment of network risks
US8689330B2 (en) * 2007-09-05 2014-04-01 Yahoo! Inc. Instant messaging malware protection
US8839225B2 (en) 2008-01-23 2014-09-16 International Business Machines Corporation Generating and applying patches to a computer program code concurrently with its execution
US20090282457A1 (en) * 2008-05-06 2009-11-12 Sudhakar Govindavajhala Common representation for different protection architectures (crpa)
JP5148442B2 (ja) 2008-09-30 2013-02-20 株式会社東芝 脆弱性対応優先度表示装置及びプログラム
US8769683B1 (en) * 2009-07-07 2014-07-01 Trend Micro Incorporated Apparatus and methods for remote classification of unknown malware
US9317692B2 (en) * 2009-12-21 2016-04-19 Symantec Corporation System and method for vulnerability risk analysis
US8793681B2 (en) * 2011-06-24 2014-07-29 International Business Machines Corporation Determining best practices for applying computer software patches
US9069969B2 (en) * 2012-06-13 2015-06-30 International Business Machines Corporation Managing software patch installations
US20140025796A1 (en) 2012-07-19 2014-01-23 Commvault Systems, Inc. Automated grouping of computing devices in a networked data storage system
US9083689B2 (en) * 2012-12-28 2015-07-14 Nok Nok Labs, Inc. System and method for implementing privacy classes within an authentication framework
KR101901911B1 (ko) * 2013-05-21 2018-09-27 삼성전자주식회사 악성 프로그램을 탐지하는 방법 및 장치
US20150066575A1 (en) * 2013-08-28 2015-03-05 Bank Of America Corporation Enterprise risk assessment
US10489861B1 (en) * 2013-12-23 2019-11-26 Massachusetts Mutual Life Insurance Company Methods and systems for improving the underwriting process
US20160328227A1 (en) 2014-01-08 2016-11-10 Hewlett Packard Enterprise Development Lp Dynamically Applying A Software Patch To A Computer Program
US10462158B2 (en) * 2014-03-19 2019-10-29 Nippon Telegraph And Telephone Corporation URL selection method, URL selection system, URL selection device, and URL selection program
US10445505B2 (en) * 2014-09-22 2019-10-15 Mcafee, Llc Process vulnerability assessment
KR102443172B1 (ko) 2014-09-24 2022-09-14 오라클 인터내셔날 코포레이션 멀티테넌트 어플리케이션 서버 환경에서 패치를 지원하는 시스템 및 방법
US9430219B2 (en) 2014-12-16 2016-08-30 Sap Se Revision safe upgrade in a hybrid cloud landscape
US9521160B2 (en) 2014-12-29 2016-12-13 Cyence Inc. Inferential analysis using feedback for extracting and combining cyber risk information
US9699209B2 (en) 2014-12-29 2017-07-04 Cyence Inc. Cyber vulnerability scan analyses with actionable feedback
US9923912B2 (en) * 2015-08-28 2018-03-20 Cisco Technology, Inc. Learning detector of malicious network traffic from weak labels
US10084811B1 (en) * 2015-09-09 2018-09-25 United Services Automobile Association (Usaa) Systems and methods for adaptive security protocols in a managed system
US10021120B1 (en) * 2015-11-09 2018-07-10 8X8, Inc. Delayed replication for protection of replicated databases
US10142362B2 (en) * 2016-06-02 2018-11-27 Zscaler, Inc. Cloud based systems and methods for determining security risks of users and groups
US10728261B2 (en) * 2017-03-02 2020-07-28 ResponSight Pty Ltd System and method for cyber security threat detection
US11436113B2 (en) * 2018-06-28 2022-09-06 Twitter, Inc. Method and system for maintaining storage device failure tolerance in a composable infrastructure
US10853046B2 (en) * 2018-12-13 2020-12-01 Salesforce.Com, Inc. Deployment of software applications on server clusters

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7000247B2 (en) * 2001-12-31 2006-02-14 Citadel Security Software, Inc. Automated computer vulnerability resolution system
US7424706B2 (en) * 2003-07-16 2008-09-09 Microsoft Corporation Automatic detection and patching of vulnerable files
CN102404715A (zh) * 2011-11-18 2012-04-04 广东步步高电子工业有限公司 基于良性蠕虫的手机蠕虫病毒对抗方法

Also Published As

Publication number Publication date
CN111164597A (zh) 2020-05-15
DE112018004284T5 (de) 2020-05-14
US11620381B2 (en) 2023-04-04
GB202006140D0 (en) 2020-06-10
WO2019064176A1 (en) 2019-04-04
US20190102548A1 (en) 2019-04-04
JP2020535515A (ja) 2020-12-03
US20200110877A1 (en) 2020-04-09
JP7129474B2 (ja) 2022-09-01
US10540496B2 (en) 2020-01-21
US20210150029A1 (en) 2021-05-20
CN111164597B (zh) 2024-08-23
DE112018004284B4 (de) 2024-12-24
US10977366B2 (en) 2021-04-13
GB2582460A (en) 2020-09-23

Similar Documents

Publication Publication Date Title
GB2582460B (en) Dynamic re-composition of patch groups using stream clustering
IL255404A (en) Citrus hydrogel in an internal multi-phase emulsion configuration
EP3200095A4 (en) Streaming application update method, master node, and stream computing system
EP3331549A4 (en) Improved microbe-binding molecules and uses thereof
EP3111596A4 (en) Dynamic allocation of network bandwidth
EP3097545A4 (en) Systems and methods of socially-driven product offerings
EP3295294A4 (en) Stream computing system and method
EP3451114A4 (en) COLLAR COMPUTERS
EP3250315A4 (en) Flavor encapsulation using electrostatic atomization
EP3317277A4 (en) Somatostatin modulators and uses thereof
EP3206740A4 (en) Nebulizers and uses thereof
EP3375530A4 (en) ELECTROSTATIC SPRAYING DEVICE AND ELECTROSTATIC SPRAYING METHOD
EP3344806A4 (en) GLYCAN NETWORKS AND METHODS OF USE
EP3261443A4 (en) Desacetoxytubulysin h and analogs thereof
EP3169941A4 (en) Ventilation and drying system and method of using the same
EP3210634A4 (en) Microcarrier adjustment method, microcarrier, and application thereof
EP3117041A4 (en) Dynamic road marker
EP3204892A4 (en) Systems and methods of dynamic image segmentation
EP3317278A4 (en) Somatostatin modulators and uses thereof
EP3717453A4 (en) CREATINE PRODRUGS, COMPOSITIONS, AND METHOD OF USING THEREOF
EP3237391A4 (en) Creatine prodrugs, compositions and methods of use thereof
EP3322710A4 (en) PROCESSABLE POLYMERS AND METHOD FOR THEIR PREPARATION AND USE
EP3294392A4 (en) Nebulizers and uses thereof
EP3169359A4 (en) An improved thermostable spray dried rotavirus vaccine formulation and process thereof
EP3099703A4 (en) Teicoplanin analogs and uses thereof

Legal Events

Date Code Title Description
746 Register noted 'licences of right' (sect. 46/1977)

Effective date: 20210209

732E Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)

Free format text: REGISTERED BETWEEN 20220922 AND 20220928