JP2020535515A5 - - Google Patents
Download PDFInfo
- Publication number
- JP2020535515A5 JP2020535515A5 JP2020516821A JP2020516821A JP2020535515A5 JP 2020535515 A5 JP2020535515 A5 JP 2020535515A5 JP 2020516821 A JP2020516821 A JP 2020516821A JP 2020516821 A JP2020516821 A JP 2020516821A JP 2020535515 A5 JP2020535515 A5 JP 2020535515A5
- Authority
- JP
- Japan
- Prior art keywords
- risk
- server group
- server
- computer
- mitigate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims 12
- 238000012544 monitoring process Methods 0.000 claims 5
- 238000012986 modification Methods 0.000 claims 4
- 230000004048 modification Effects 0.000 claims 4
- 238000004590 computer program Methods 0.000 claims 3
- 238000012502 risk assessment Methods 0.000 claims 3
- 230000004044 response Effects 0.000 claims 2
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/721,566 | 2017-09-29 | ||
| US15/721,566 US10540496B2 (en) | 2017-09-29 | 2017-09-29 | Dynamic re-composition of patch groups using stream clustering |
| PCT/IB2018/057407 WO2019064176A1 (en) | 2017-09-29 | 2018-09-25 | DYNAMIC RE-COMPOSITION OF CORRECTIVE GROUPS USING A FLOW REGROUP |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2020535515A JP2020535515A (ja) | 2020-12-03 |
| JP2020535515A5 true JP2020535515A5 (enExample) | 2021-01-21 |
| JP7129474B2 JP7129474B2 (ja) | 2022-09-01 |
Family
ID=65896062
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2020516821A Active JP7129474B2 (ja) | 2017-09-29 | 2018-09-25 | サーバ・グループを管理するためのシステム、方法、コンピュータ・プログラム、および記録媒体 |
Country Status (6)
| Country | Link |
|---|---|
| US (3) | US10540496B2 (enExample) |
| JP (1) | JP7129474B2 (enExample) |
| CN (1) | CN111164597B (enExample) |
| DE (1) | DE112018004284B4 (enExample) |
| GB (1) | GB2582460B (enExample) |
| WO (1) | WO2019064176A1 (enExample) |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12184683B2 (en) * | 2020-05-05 | 2024-12-31 | The United States Of America As Represented By The Secretary Of The Army | Cybersecurity resilience by integrating adversary and defender actions, deep learning, and graph thinking |
| CN112333279A (zh) * | 2020-11-11 | 2021-02-05 | 平安科技(深圳)有限公司 | 服务器调配方法、装置、设备及存储介质 |
| US11783068B2 (en) * | 2021-03-24 | 2023-10-10 | Bank Of America Corporation | System for dynamic exposure monitoring |
| US12333018B2 (en) * | 2021-10-15 | 2025-06-17 | Capital One Services, Llc | Security vulnerability communication and remediation with machine learning |
| DE102022203086A1 (de) * | 2022-03-29 | 2023-10-05 | Volkswagen Aktiengesellschaft | Risikoanalyse eines verteilten Untersuchungsgegenstands |
| US12169709B2 (en) * | 2022-03-30 | 2024-12-17 | Kyndryl, Inc. | Contextually cognitive edge server manager |
Family Cites Families (40)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7313822B2 (en) * | 2001-03-16 | 2007-12-25 | Protegrity Corporation | Application-layer security method and system |
| BR0215388A (pt) | 2001-12-31 | 2004-12-07 | Citadel Security Software Inc | Método e sistema para solucionar vulnerabilidades em um computador, e, meio legìvel por computador |
| WO2003107211A1 (en) * | 2002-06-18 | 2003-12-24 | Esecurityonline | Methods and systems for managing enterprise assets |
| US7424706B2 (en) * | 2003-07-16 | 2008-09-09 | Microsoft Corporation | Automatic detection and patching of vulnerable files |
| KR100599451B1 (ko) * | 2004-07-23 | 2006-07-12 | 한국전자통신연구원 | 이동형 저장장치를 이용한 인터넷 웜 치료 및 시스템 패치장치 및 그 방법 |
| US9325728B1 (en) * | 2005-01-27 | 2016-04-26 | Leidos, Inc. | Systems and methods for implementing and scoring computer network defense exercises |
| JP2006350543A (ja) | 2005-06-14 | 2006-12-28 | Mitsubishi Electric Corp | ログ分析装置 |
| US7647637B2 (en) | 2005-08-19 | 2010-01-12 | Sun Microsystems, Inc. | Computer security technique employing patch with detection and/or characterization mechanism for exploit of patched vulnerability |
| US7712137B2 (en) * | 2006-02-27 | 2010-05-04 | Microsoft Corporation | Configuring and organizing server security information |
| US8312545B2 (en) * | 2006-04-06 | 2012-11-13 | Juniper Networks, Inc. | Non-signature malware detection system and method for mobile platforms |
| US8132260B1 (en) * | 2006-06-12 | 2012-03-06 | Redseal Systems, Inc. | Methods and apparatus for prioritization of remediation techniques for network security risks |
| US7900259B2 (en) * | 2007-03-16 | 2011-03-01 | Prevari | Predictive assessment of network risks |
| US8689330B2 (en) * | 2007-09-05 | 2014-04-01 | Yahoo! Inc. | Instant messaging malware protection |
| US8839225B2 (en) | 2008-01-23 | 2014-09-16 | International Business Machines Corporation | Generating and applying patches to a computer program code concurrently with its execution |
| US20090282457A1 (en) * | 2008-05-06 | 2009-11-12 | Sudhakar Govindavajhala | Common representation for different protection architectures (crpa) |
| JP5148442B2 (ja) | 2008-09-30 | 2013-02-20 | 株式会社東芝 | 脆弱性対応優先度表示装置及びプログラム |
| US8769683B1 (en) * | 2009-07-07 | 2014-07-01 | Trend Micro Incorporated | Apparatus and methods for remote classification of unknown malware |
| US9317692B2 (en) * | 2009-12-21 | 2016-04-19 | Symantec Corporation | System and method for vulnerability risk analysis |
| US8793681B2 (en) * | 2011-06-24 | 2014-07-29 | International Business Machines Corporation | Determining best practices for applying computer software patches |
| CN102404715A (zh) | 2011-11-18 | 2012-04-04 | 广东步步高电子工业有限公司 | 基于良性蠕虫的手机蠕虫病毒对抗方法 |
| US9069969B2 (en) * | 2012-06-13 | 2015-06-30 | International Business Machines Corporation | Managing software patch installations |
| US20140025796A1 (en) | 2012-07-19 | 2014-01-23 | Commvault Systems, Inc. | Automated grouping of computing devices in a networked data storage system |
| US9083689B2 (en) * | 2012-12-28 | 2015-07-14 | Nok Nok Labs, Inc. | System and method for implementing privacy classes within an authentication framework |
| KR101901911B1 (ko) * | 2013-05-21 | 2018-09-27 | 삼성전자주식회사 | 악성 프로그램을 탐지하는 방법 및 장치 |
| US20150066575A1 (en) * | 2013-08-28 | 2015-03-05 | Bank Of America Corporation | Enterprise risk assessment |
| US10489861B1 (en) * | 2013-12-23 | 2019-11-26 | Massachusetts Mutual Life Insurance Company | Methods and systems for improving the underwriting process |
| US20160328227A1 (en) | 2014-01-08 | 2016-11-10 | Hewlett Packard Enterprise Development Lp | Dynamically Applying A Software Patch To A Computer Program |
| US10462158B2 (en) * | 2014-03-19 | 2019-10-29 | Nippon Telegraph And Telephone Corporation | URL selection method, URL selection system, URL selection device, and URL selection program |
| US10445505B2 (en) * | 2014-09-22 | 2019-10-15 | Mcafee, Llc | Process vulnerability assessment |
| KR102443172B1 (ko) | 2014-09-24 | 2022-09-14 | 오라클 인터내셔날 코포레이션 | 멀티테넌트 어플리케이션 서버 환경에서 패치를 지원하는 시스템 및 방법 |
| US9430219B2 (en) | 2014-12-16 | 2016-08-30 | Sap Se | Revision safe upgrade in a hybrid cloud landscape |
| US9521160B2 (en) | 2014-12-29 | 2016-12-13 | Cyence Inc. | Inferential analysis using feedback for extracting and combining cyber risk information |
| US9699209B2 (en) | 2014-12-29 | 2017-07-04 | Cyence Inc. | Cyber vulnerability scan analyses with actionable feedback |
| US9923912B2 (en) * | 2015-08-28 | 2018-03-20 | Cisco Technology, Inc. | Learning detector of malicious network traffic from weak labels |
| US10084811B1 (en) * | 2015-09-09 | 2018-09-25 | United Services Automobile Association (Usaa) | Systems and methods for adaptive security protocols in a managed system |
| US10021120B1 (en) * | 2015-11-09 | 2018-07-10 | 8X8, Inc. | Delayed replication for protection of replicated databases |
| US10142362B2 (en) * | 2016-06-02 | 2018-11-27 | Zscaler, Inc. | Cloud based systems and methods for determining security risks of users and groups |
| US10728261B2 (en) * | 2017-03-02 | 2020-07-28 | ResponSight Pty Ltd | System and method for cyber security threat detection |
| US11436113B2 (en) * | 2018-06-28 | 2022-09-06 | Twitter, Inc. | Method and system for maintaining storage device failure tolerance in a composable infrastructure |
| US10853046B2 (en) * | 2018-12-13 | 2020-12-01 | Salesforce.Com, Inc. | Deployment of software applications on server clusters |
-
2017
- 2017-09-29 US US15/721,566 patent/US10540496B2/en active Active
-
2018
- 2018-09-25 GB GB2006140.4A patent/GB2582460B/en active Active
- 2018-09-25 CN CN201880062930.6A patent/CN111164597B/zh active Active
- 2018-09-25 JP JP2020516821A patent/JP7129474B2/ja active Active
- 2018-09-25 DE DE112018004284.7T patent/DE112018004284B4/de active Active
- 2018-09-25 WO PCT/IB2018/057407 patent/WO2019064176A1/en not_active Ceased
-
2019
- 2019-12-04 US US16/703,200 patent/US10977366B2/en not_active Expired - Fee Related
-
2020
- 2020-12-28 US US17/135,553 patent/US11620381B2/en active Active
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP2020535515A5 (enExample) | ||
| US11568042B2 (en) | System and methods for sandboxed malware analysis and automated patch development, deployment and validation | |
| US12445466B2 (en) | Asset remediation trend map generation and utilization for threat mitigation | |
| US9977905B2 (en) | Method and system for identification of security vulnerabilities | |
| US20230171292A1 (en) | Holistic external network cybersecurity evaluation and scoring | |
| US10887340B2 (en) | Methods, systems, and media for inhibiting attacks on embedded devices | |
| US11005877B2 (en) | Persistent cross-site scripting vulnerability detection | |
| US10917428B2 (en) | Holistic computer system cybersecurity evaluation and scoring | |
| US12210623B2 (en) | Attack kill chain generation and utilization for threat analysis | |
| JP6338073B2 (ja) | コンピュータ・ネットワークを用いてコンピュータ・ソフトウェア・アプリケーションをテストするための方法、システム及びコンピュータ・プログラム | |
| US12462016B2 (en) | System and methods for sandboxed software analysis with automated vulnerability detection and patch development, deployment and validation | |
| US20150302191A1 (en) | Program execution apparatus and program analysis apparatus | |
| US20160026554A1 (en) | Indicating a readiness of a change for implementation into a computer program | |
| JP2016113122A (ja) | 車載ネットワークの試験装置 | |
| JP2024520564A (ja) | Iotデバイスを管理するためのシステム | |
| GB2582460A (en) | Dynamic re-composition of patch groups using stream clustering | |
| US9158641B2 (en) | Cloud auto-test system, method and non-transitory computer readable storage medium of the same | |
| CN104239801A (zh) | 0day漏洞的识别方法以及装置 | |
| US20170199730A1 (en) | Application Modification | |
| US11882143B1 (en) | Cybersecurity system and method for protecting against zero-day attacks | |
| US9589133B2 (en) | Preventing return-oriented programming exploits | |
| US9372990B2 (en) | Detecting heap spraying on a computer | |
| US20200242253A1 (en) | System Vulnerability Mitigation | |
| CN117370701A (zh) | 浏览器风险检测方法、装置、计算机设备和存储介质 | |
| Mulazzani | New challenges in digital forensics: online storage and anonymous communication |