Data processing: artificial intelligence – Neural network
Reexamination Certificate
2006-01-18
2008-12-02
Vincent, David (Department: 2129)
Data processing: artificial intelligence
Neural network
C726S025000
Reexamination Certificate
active
07461036
ABSTRACT:
A computer implemented method for monitoring system events and providing real-time response to security threats. System data is collected by monitors in the computing system. The expert system of the present invention compares the data against information in a knowledge base to identify a security threat to a system resource in a form of a system event and an action for mitigating effects of the system event. A determination is made as to whether a threat risk value of the system event is greater than an action risk value of the action for mitigating the system event. If the threat risk value is greater, a determination is made as to whether a trust value set by a user is greater than the action risk value. If the trust value is greater, the expert system executes the action against the security threat.
REFERENCES:
patent: 2004/0103058 (2004-05-01), Hamilton
Zhang Jian et al., Intrusion Detection System based on Fuzzy Default Logic, 2003, The IEEE International Conference on Fuzzy Systems, pp. 1350-1356.
Stefan Axelsson, Intrusion Detection Systems: A Survey and Taxonomy, 2000, Department of Computer Engineering Chalmers University of Technology Goteborg, Sweden.
McKay-Hubbard et al., Models of Trust for Knowledge-Based Government Services, 2003, p. 307.
Dimmock et al., “Using Trust and Risk in Role-Based Access Control Policies”, 2004.
“Internet Snoop Deceiver”, IBM Research Disclosure 428117, Dec. 1999, pp. 1682.
Tsudik et al., “AudEs—an Expert System for Security Auditing”, http://sunsite.rediris.es/sites/ftp.cert.dfn.de/pub/docs/misc/audes/ps.gz, retrieved Sep. 23, 2005, pp. 1-9.
“RPC: Remote Procedure Call Protocol specification: Version 2”, The Network Working Group, RFC 1057, Sun Microsystems, Inc., Jun. 1988, pp. 1-20.
Genty Denise Marie
Mullen Shawn Patrick
Reddy Bhargavi Bheemreddy
Wilson Jacqueline Hegedus
Baca Matthew W.
Brown, Jr Nathan H
Glanzman Gerald H.
International Business Machines - Corporation
Vincent David
LandOfFree
Method for controlling risk in a computer security... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for controlling risk in a computer security..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for controlling risk in a computer security... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4050377