MY166960A - A system and method for detecting anomalies in computing resources - Google Patents
A system and method for detecting anomalies in computing resourcesInfo
- Publication number
- MY166960A MY166960A MYPI2013702278A MYPI2013702278A MY166960A MY 166960 A MY166960 A MY 166960A MY PI2013702278 A MYPI2013702278 A MY PI2013702278A MY PI2013702278 A MYPI2013702278 A MY PI2013702278A MY 166960 A MY166960 A MY 166960A
- Authority
- MY
- Malaysia
- Prior art keywords
- module
- data
- server
- armc
- computing resources
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
THE PRESENT INVENTION RELATES TO A SYSTEM (1000) AND METHOD FOR DETECTING ANOMALIES IN COMPUTING RESOURCES. THE SYSTEM (1000) COMPRISING AN AUTHENTICATION RESOURCE MANAGEMENT CONTROLLER (ARMC) SERVER (100) CONNECTED TO A FRONT END WEB USER (110) AND A DATABASE SERVER (120). THE ARMC SERVER (100) FURTHER COMPRISES AN INPUTTING MODULE (20); A MAXIMUM DISTANCE TREE NODE COUNTER (30); A SCORING MODULE (40); AN ANOMALIES CLASSIFIER MODULE (50) AND A DECISION DISPLAY MODULE (60). THE METHOD COMPRISES THE STEPS OF INPUTTING HIERARCHICAL RESOURCES DATA, NODES DATA AND LINKAGES DATA; COUNTING THE LONGEST DISTANCE BETWEEN TWO NODES FROM THE TREE HIERARCHY STRUCTURE; CALCULATING SCORE FOR EACH LINKAGE USING HIERARCHICAL BALANCED METHOD; CLASSIFYING A TARGETED NODE AS ANOMALY OR NORMAL TO A TARGETED RESOURCE ACCORDING TO SCORE CALCULATED; AND DISPLAYING A REAL TIME RESULT REPORT TO THE END USER.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2013702278A MY166960A (en) | 2013-11-27 | 2013-11-27 | A system and method for detecting anomalies in computing resources |
PCT/MY2014/000178 WO2015080564A1 (en) | 2013-11-27 | 2014-06-12 | A system and method for detecting anomalies in computing resources |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2013702278A MY166960A (en) | 2013-11-27 | 2013-11-27 | A system and method for detecting anomalies in computing resources |
Publications (1)
Publication Number | Publication Date |
---|---|
MY166960A true MY166960A (en) | 2018-07-26 |
Family
ID=51690421
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI2013702278A MY166960A (en) | 2013-11-27 | 2013-11-27 | A system and method for detecting anomalies in computing resources |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY166960A (en) |
WO (1) | WO2015080564A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111275547B (en) * | 2020-03-19 | 2023-07-18 | 重庆富民银行股份有限公司 | Wind control system and method based on isolated forest |
CN116911806B (en) * | 2023-09-11 | 2023-11-28 | 湖北华中电力科技开发有限责任公司 | Internet + based power enterprise energy information management system |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8020191B2 (en) * | 2007-06-19 | 2011-09-13 | International Business Machines Corporation | Method and system for determining policy similarities |
US8904472B2 (en) * | 2010-11-12 | 2014-12-02 | Riaz Ahmed SHAIKH | Validation of consistency and completeness of access control policy sets |
US8793489B2 (en) * | 2012-03-01 | 2014-07-29 | Humanconcepts, Llc | Method and system for controlling data access to organizational data maintained in hierarchical |
-
2013
- 2013-11-27 MY MYPI2013702278A patent/MY166960A/en unknown
-
2014
- 2014-06-12 WO PCT/MY2014/000178 patent/WO2015080564A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2015080564A1 (en) | 2015-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2012118997A3 (en) | Optimization of social media engagement | |
CN104462385A (en) | Personalized movie similarity calculation method based on user interest model | |
CN105138907B (en) | A kind of active probe is attacked the method and system of website | |
WO2013181222A4 (en) | Method of analyzing a graph with a covariance-based clustering algorithm using a modified laplacian pseudo-inverse matrix | |
CN102355459A (en) | TPM (Trusted Platform Module)-based trusted Web page realization method | |
MY195553A (en) | Method For Providing Recommend Information for Mobile Terminal Browser and System using the same | |
MY166960A (en) | A system and method for detecting anomalies in computing resources | |
CN104346443A (en) | Web text processing method and device | |
Yin et al. | Survivability analysis of weighted-edge attacks on complex networks with incomplete information | |
GB201206932D0 (en) | Comparing event data sets | |
CN104572899A (en) | Article processing method and article processing device | |
CN103810180A (en) | Website health examination evaluation standard method | |
CN105989279A (en) | Domino dedicated password cracking system based on multi-hierarchy GPU (Graphic Process Unit) cluster | |
Wang et al. | Design and implementation of targeting advertising system based on C4. 5 algorithm | |
Babu et al. | HAWKSEYE-A Machine Learning-Based Technique for Fake News Detection with IoT | |
Archfield et al. | What defines a flood? Building shared understanding across differing attributes and definitions of flooding | |
Adiga et al. | Synthetic populations for epidemic modeling | |
Mihunov | Temporal Changes in Community Resilience to Drought Hazard | |
Tamea et al. | Vulnerability of countries to food-production crises propagating in the virtual water trade network | |
Gupta et al. | Special Issue on “Computers and Management” | |
Chern et al. | Evaluation of Rainfall Characteristics in the Goddard Multi-scale Modeling Framework (GMMF) | |
Tang et al. | Investigating the Scale Dependence of SCM Simulated Clouds by Using Gridded Forcing Data at SGP | |
Harpold et al. | Utilizing LiDAR Datasets From Experimental Watersheds to Advance Ecohydrological Understanding in Seasonally Snow-Covered Forests | |
Carminati | Internet banking fraud analysis and detection | |
Ting | Website Operation Management Based on Data Mining under the Background of Big Data |