Abstract:
An apparatus, a method, and a computer program are provided for distinguishing relevant security threats. With conventional computer systems, distinguishing security threats from actual security threats is a complex and difficult task because of the general inability to quantify a “threat”. By the use of an intelligent conceptual clustering technique, threats can be accurately distinguished from benign behaviors. Thus, electronic commerce, and Information Technology systems generally, can be made safer without sacrificing efficiency.
Abstract:
PROBLEM TO BE SOLVED: To provide a computer system having a security means for reducing vulnerability against attacks to a computer system and preventing itself from becoming a risky computer attractive to a hacker. SOLUTION: The controller 211 of a server computer 113 manages access to VM to ensure that at any given time, only one VM is active and a new client request is received. The active VM is referred to as a primary machine 203 and is only active for the switch-over period. Once this period has elapsed, the controller designates the current primary machine as a secondary machine and starts a new primary machine from the copy of software inside a master file system 213. Then, the controller routes a subsequent client request to the new primary machine. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
A peripheral device includes an interface configured to communicate with a computer, the peripheral device; logic configured to perform an integrity verification of an operating system of the computer; and a display configured to display a result of the integrity verification. A method for integrity verification of a computer using a peripheral device includes connecting the peripheral device to the computer; sending a challenge from the device to the computer; computing attestation data using the challenge and information stored in the computer, retrieving the attestation data from the computer by a client program running on the computer; sending the attestation data to the peripheral device; and verifying the attestation data by the peripheral device.
Abstract:
An apparatus, a method, and a computer program are provided for distinguishing relevant security threats. With conventional computer systems, distinguishing security threats from actual security threats is a complex and difficult task because of the general inability to quantify a "threat". By the use of an intelligent conceptual clustering technique, threats can be accurately distinguished from benign behaviors. Thus, electronic commerce, and Information Technology systems generally, can be made safer without sacrificing efficiency.
Abstract:
Described is a technique for detecting attacks on a data communications network having a plurality of addresses for assignment to data processing systems in the network. The technique involves identifying data traffic on the network originating at any assigned address and addressed to any unassigned address. Any data traffic so identified is inspected for data indicative of an attack. On detection of data indicative of an attack, an alert signal is generated.
Abstract:
An apparatus, a method, and a computer program are provided for distinguishing relevant security threats. With conventional computer systems, distinguishing security threats from actual security threats is a complex and difficult task because of the general inability to quantify a "threat." By the use of an intelligent conceptual clustering technique, threats can be accurately distinguished from benign behaviors. Thus, electronic commerce, and Information Technology systems generally, can be made safer without sacrificing efficiency.
Abstract:
An apparatus, a method, and a computer program are provided for distinguishi ng relevant security threats. With conventional computer systems, distinguishin g security threats from actual security threats is a complex and difficult tas k because of the general inability to quantify a ~threat~. By the use of an intelligent conceptual clustering technique, threats can be accurately distinguished from benign behaviors. Thus, electronic commerce, and Information Technology systems generally, can be made safer without sacrificing efficiency.
Abstract:
Disclosed is a method of automated network deployment of cloud services CS into a network 10. The method starts by receiving a cloud service with a specific resource protection template RPT, specifying an isolation policy for isolating zones in the network. Next the customer protection parameters CPP specifying customer needs regarding protection in the network or received. The next step, is providing security requirements SR matching the received resource protection templates and the received customer protection parameters. Then the cloud service is automatically deployed into the network by using the provided security requirements. The isolation policy may specify a set of zones using IP addresses allocated to resources. The automatically deploying the cloud service may include instancing a virtualised routing application configured using the provided security requirements.
Abstract:
An apparatus, a method, and a computer program are provided for distinguishing relevant security threats. With conventional computer systems, distinguishing security threats from actual security threats is a complex and difficult task because of the general inability to quantify a ~threat~. By the use of an intelligent conceptual clustering technique, threats can be accurately distinguished from benign behaviors. Thus, electronic commerce, and Information Technology systems generally, can be made safer without sacrificing efficiency.