JP2020535515A5 - - Google Patents

Download PDF

Info

Publication number
JP2020535515A5
JP2020535515A5 JP2020516821A JP2020516821A JP2020535515A5 JP 2020535515 A5 JP2020535515 A5 JP 2020535515A5 JP 2020516821 A JP2020516821 A JP 2020516821A JP 2020516821 A JP2020516821 A JP 2020516821A JP 2020535515 A5 JP2020535515 A5 JP 2020535515A5
Authority
JP
Japan
Prior art keywords
risk
server group
server
computer
mitigate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2020516821A
Other languages
English (en)
Japanese (ja)
Other versions
JP2020535515A (ja
JP7129474B2 (ja
Filing date
Publication date
Priority claimed from US15/721,566 external-priority patent/US10540496B2/en
Application filed filed Critical
Publication of JP2020535515A publication Critical patent/JP2020535515A/ja
Publication of JP2020535515A5 publication Critical patent/JP2020535515A5/ja
Application granted granted Critical
Publication of JP7129474B2 publication Critical patent/JP7129474B2/ja
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

JP2020516821A 2017-09-29 2018-09-25 サーバ・グループを管理するためのシステム、方法、コンピュータ・プログラム、および記録媒体 Active JP7129474B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US15/721,566 2017-09-29
US15/721,566 US10540496B2 (en) 2017-09-29 2017-09-29 Dynamic re-composition of patch groups using stream clustering
PCT/IB2018/057407 WO2019064176A1 (en) 2017-09-29 2018-09-25 DYNAMIC RE-COMPOSITION OF CORRECTIVE GROUPS USING A FLOW REGROUP

Publications (3)

Publication Number Publication Date
JP2020535515A JP2020535515A (ja) 2020-12-03
JP2020535515A5 true JP2020535515A5 (enExample) 2021-01-21
JP7129474B2 JP7129474B2 (ja) 2022-09-01

Family

ID=65896062

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2020516821A Active JP7129474B2 (ja) 2017-09-29 2018-09-25 サーバ・グループを管理するためのシステム、方法、コンピュータ・プログラム、および記録媒体

Country Status (6)

Country Link
US (3) US10540496B2 (enExample)
JP (1) JP7129474B2 (enExample)
CN (1) CN111164597B (enExample)
DE (1) DE112018004284B4 (enExample)
GB (1) GB2582460B (enExample)
WO (1) WO2019064176A1 (enExample)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12184683B2 (en) * 2020-05-05 2024-12-31 The United States Of America As Represented By The Secretary Of The Army Cybersecurity resilience by integrating adversary and defender actions, deep learning, and graph thinking
CN112333279A (zh) * 2020-11-11 2021-02-05 平安科技(深圳)有限公司 服务器调配方法、装置、设备及存储介质
US11783068B2 (en) * 2021-03-24 2023-10-10 Bank Of America Corporation System for dynamic exposure monitoring
US12333018B2 (en) * 2021-10-15 2025-06-17 Capital One Services, Llc Security vulnerability communication and remediation with machine learning
DE102022203086A1 (de) * 2022-03-29 2023-10-05 Volkswagen Aktiengesellschaft Risikoanalyse eines verteilten Untersuchungsgegenstands
US12169709B2 (en) * 2022-03-30 2024-12-17 Kyndryl, Inc. Contextually cognitive edge server manager

Family Cites Families (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7313822B2 (en) * 2001-03-16 2007-12-25 Protegrity Corporation Application-layer security method and system
BR0215388A (pt) 2001-12-31 2004-12-07 Citadel Security Software Inc Método e sistema para solucionar vulnerabilidades em um computador, e, meio legìvel por computador
WO2003107211A1 (en) * 2002-06-18 2003-12-24 Esecurityonline Methods and systems for managing enterprise assets
US7424706B2 (en) * 2003-07-16 2008-09-09 Microsoft Corporation Automatic detection and patching of vulnerable files
KR100599451B1 (ko) * 2004-07-23 2006-07-12 한국전자통신연구원 이동형 저장장치를 이용한 인터넷 웜 치료 및 시스템 패치장치 및 그 방법
US9325728B1 (en) * 2005-01-27 2016-04-26 Leidos, Inc. Systems and methods for implementing and scoring computer network defense exercises
JP2006350543A (ja) 2005-06-14 2006-12-28 Mitsubishi Electric Corp ログ分析装置
US7647637B2 (en) 2005-08-19 2010-01-12 Sun Microsystems, Inc. Computer security technique employing patch with detection and/or characterization mechanism for exploit of patched vulnerability
US7712137B2 (en) * 2006-02-27 2010-05-04 Microsoft Corporation Configuring and organizing server security information
US8312545B2 (en) * 2006-04-06 2012-11-13 Juniper Networks, Inc. Non-signature malware detection system and method for mobile platforms
US8132260B1 (en) * 2006-06-12 2012-03-06 Redseal Systems, Inc. Methods and apparatus for prioritization of remediation techniques for network security risks
US7900259B2 (en) * 2007-03-16 2011-03-01 Prevari Predictive assessment of network risks
US8689330B2 (en) * 2007-09-05 2014-04-01 Yahoo! Inc. Instant messaging malware protection
US8839225B2 (en) 2008-01-23 2014-09-16 International Business Machines Corporation Generating and applying patches to a computer program code concurrently with its execution
US20090282457A1 (en) * 2008-05-06 2009-11-12 Sudhakar Govindavajhala Common representation for different protection architectures (crpa)
JP5148442B2 (ja) 2008-09-30 2013-02-20 株式会社東芝 脆弱性対応優先度表示装置及びプログラム
US8769683B1 (en) * 2009-07-07 2014-07-01 Trend Micro Incorporated Apparatus and methods for remote classification of unknown malware
US9317692B2 (en) * 2009-12-21 2016-04-19 Symantec Corporation System and method for vulnerability risk analysis
US8793681B2 (en) * 2011-06-24 2014-07-29 International Business Machines Corporation Determining best practices for applying computer software patches
CN102404715A (zh) 2011-11-18 2012-04-04 广东步步高电子工业有限公司 基于良性蠕虫的手机蠕虫病毒对抗方法
US9069969B2 (en) * 2012-06-13 2015-06-30 International Business Machines Corporation Managing software patch installations
US20140025796A1 (en) 2012-07-19 2014-01-23 Commvault Systems, Inc. Automated grouping of computing devices in a networked data storage system
US9083689B2 (en) * 2012-12-28 2015-07-14 Nok Nok Labs, Inc. System and method for implementing privacy classes within an authentication framework
KR101901911B1 (ko) * 2013-05-21 2018-09-27 삼성전자주식회사 악성 프로그램을 탐지하는 방법 및 장치
US20150066575A1 (en) * 2013-08-28 2015-03-05 Bank Of America Corporation Enterprise risk assessment
US10489861B1 (en) * 2013-12-23 2019-11-26 Massachusetts Mutual Life Insurance Company Methods and systems for improving the underwriting process
US20160328227A1 (en) 2014-01-08 2016-11-10 Hewlett Packard Enterprise Development Lp Dynamically Applying A Software Patch To A Computer Program
US10462158B2 (en) * 2014-03-19 2019-10-29 Nippon Telegraph And Telephone Corporation URL selection method, URL selection system, URL selection device, and URL selection program
US10445505B2 (en) * 2014-09-22 2019-10-15 Mcafee, Llc Process vulnerability assessment
KR102443172B1 (ko) 2014-09-24 2022-09-14 오라클 인터내셔날 코포레이션 멀티테넌트 어플리케이션 서버 환경에서 패치를 지원하는 시스템 및 방법
US9430219B2 (en) 2014-12-16 2016-08-30 Sap Se Revision safe upgrade in a hybrid cloud landscape
US9521160B2 (en) 2014-12-29 2016-12-13 Cyence Inc. Inferential analysis using feedback for extracting and combining cyber risk information
US9699209B2 (en) 2014-12-29 2017-07-04 Cyence Inc. Cyber vulnerability scan analyses with actionable feedback
US9923912B2 (en) * 2015-08-28 2018-03-20 Cisco Technology, Inc. Learning detector of malicious network traffic from weak labels
US10084811B1 (en) * 2015-09-09 2018-09-25 United Services Automobile Association (Usaa) Systems and methods for adaptive security protocols in a managed system
US10021120B1 (en) * 2015-11-09 2018-07-10 8X8, Inc. Delayed replication for protection of replicated databases
US10142362B2 (en) * 2016-06-02 2018-11-27 Zscaler, Inc. Cloud based systems and methods for determining security risks of users and groups
US10728261B2 (en) * 2017-03-02 2020-07-28 ResponSight Pty Ltd System and method for cyber security threat detection
US11436113B2 (en) * 2018-06-28 2022-09-06 Twitter, Inc. Method and system for maintaining storage device failure tolerance in a composable infrastructure
US10853046B2 (en) * 2018-12-13 2020-12-01 Salesforce.Com, Inc. Deployment of software applications on server clusters

Similar Documents

Publication Publication Date Title
JP2020535515A5 (enExample)
US11568042B2 (en) System and methods for sandboxed malware analysis and automated patch development, deployment and validation
US12445466B2 (en) Asset remediation trend map generation and utilization for threat mitigation
US9977905B2 (en) Method and system for identification of security vulnerabilities
US20230171292A1 (en) Holistic external network cybersecurity evaluation and scoring
US10887340B2 (en) Methods, systems, and media for inhibiting attacks on embedded devices
US11005877B2 (en) Persistent cross-site scripting vulnerability detection
US10917428B2 (en) Holistic computer system cybersecurity evaluation and scoring
US12210623B2 (en) Attack kill chain generation and utilization for threat analysis
JP6338073B2 (ja) コンピュータ・ネットワークを用いてコンピュータ・ソフトウェア・アプリケーションをテストするための方法、システム及びコンピュータ・プログラム
US12462016B2 (en) System and methods for sandboxed software analysis with automated vulnerability detection and patch development, deployment and validation
US20150302191A1 (en) Program execution apparatus and program analysis apparatus
US20160026554A1 (en) Indicating a readiness of a change for implementation into a computer program
JP2016113122A (ja) 車載ネットワークの試験装置
JP2024520564A (ja) Iotデバイスを管理するためのシステム
GB2582460A (en) Dynamic re-composition of patch groups using stream clustering
US9158641B2 (en) Cloud auto-test system, method and non-transitory computer readable storage medium of the same
CN104239801A (zh) 0day漏洞的识别方法以及装置
US20170199730A1 (en) Application Modification
US11882143B1 (en) Cybersecurity system and method for protecting against zero-day attacks
US9589133B2 (en) Preventing return-oriented programming exploits
US9372990B2 (en) Detecting heap spraying on a computer
US20200242253A1 (en) System Vulnerability Mitigation
CN117370701A (zh) 浏览器风险检测方法、装置、计算机设备和存储介质
Mulazzani New challenges in digital forensics: online storage and anonymous communication