-
公开(公告)号:IL297006A
公开(公告)日:2022-12-01
申请号:IL29700622
申请日:2022-10-02
Applicant: IBM , ADAM PAQUIN , PEYTON DUNCAN , KEVIN SHEN , JONATHAN BEES , SRINIVAS BABU TUMMALAPENTA
Inventor: ADAM PAQUIN , PEYTON DUNCAN , KEVIN SHEN , JONATHAN BEES , SRINIVAS BABU TUMMALAPENTA
IPC: G06F40/35
Abstract: A method protects a computer asset by identifying a particular signature, which is software that causes a particular gateway to block an intrusion from reaching a particular computer asset, and installs the particular signature on the particular gateway, thus protecting the computer asset from the intrusion.
-
公开(公告)号:GB2589799A
公开(公告)日:2021-06-09
申请号:GB202101502
申请日:2019-10-02
Applicant: IBM
Inventor: AANKUR BHATIA , SRINIVAS BABU TUMMALAPENTA , HUYANH DINH NGO , CARLOS AGUILERA
Abstract: A method improves a security of a computer system by building a new set of rules for the computer system. One or more processors input a plurality of client profiles to an artificial intelligence (Al) system, where the plurality of client profiles are based on an analysis of respective client environments comprising client assets and an intrusion detection alert history of a plurality of clients. The processor(s) match a new client profile to a respective client profile from the plurality of client profiles. The processor(s) build a new set of rules for the new client based on a similarity measure of the new client profile to the respective client profile. The processor(s) subsequently receive information indicating that a violation of the new set of rules has occurred and then execute a security feature of the computer system in order to resolve the violation of the new set of rules.
-
公开(公告)号:IL297006B1
公开(公告)日:2025-03-01
申请号:IL29700622
申请日:2022-10-02
Applicant: IBM , ADAM PAQUIN , PEYTON DUNCAN , KEVIN SHEN , JONATHAN BEES , SRINIVAS BABU TUMMALAPENTA
Inventor: ADAM PAQUIN , PEYTON DUNCAN , KEVIN SHEN , JONATHAN BEES , SRINIVAS BABU TUMMALAPENTA
IPC: G06F40/35
Abstract: A method protects a computer asset by identifying a particular signature, which is software that causes a particular gateway to block an intrusion from reaching a particular computer asset, and installs the particular signature on the particular gateway, thus protecting the computer asset from the intrusion.
-
公开(公告)号:GB2615046B
公开(公告)日:2025-01-08
申请号:GB202306536
申请日:2021-08-31
Applicant: IBM
Inventor: MUHAMMED FATIH BULUT , MILTON H HERNANDEZ , ROBERT FILEPP , SAI ZENG , STEVEN OCEPEK , SRINIVAS BABU TUMMALAPENTA , DANIEL S RILEY
Abstract: Systems and techniques that facilitate automated health-check risk assessment of computing assets are provided that can generate a baseline health-check risk score that corresponds to non-compliance of a computing asset with a stipulated control, and can adjust the baseline health-check risk score based on a weakness factor of the stipulated control, an environmental factor of the computing asset, a criticality factor of the computing asset, and a maturity factor of the computing asset.
-
-
-