Data processing: artificial intelligence – Neural network
Reexamination Certificate
2008-04-28
2009-08-18
Vincent, David R (Department: 2129)
Data processing: artificial intelligence
Neural network
C726S025000
Reexamination Certificate
active
07577623
ABSTRACT:
A computer implemented method, data processing system, and computer program product for monitoring system events and providing real-time response to security threats. System data is collected by monitors in the computing system. The expert system of the present invention compares the data against information in a knowledge base to identify a security threat to a system resource in a form of a system event and an action for mitigating effects of the system event. A determination is made as to whether a threat risk value of the system event is greater than an action risk value of the action for mitigating the system event. If the threat risk value is greater, a determination is made as to whether a trust value set by a user is greater than the action risk value. If the trust value is greater, the expert system executes the action against the security threat.
REFERENCES:
patent: 2004/0103058 (2004-05-01), Hamilton
“Internet Snoop Deceiver”, IBM Research Disclosure 428117, Dec. 1999, pp. 1682.
Tsudik et al., “AudES—an Expert System for Security Auditing”, http://sunsite.rediris.es/sites/ftp.cert.dfn.de/pub/docs/misc/audes/ps.gz, retrieved Sep. 23, 2005, pp. 1-9.
“RPC: Remote Procedure Call Protocol specification: Version 2”, The Network Working Group, RFC 1057, Sun Microsystems, Inc., Jun. 1988, pp. 1-20.
Zhang et al., “Intrusion Detection Ssytem based on Fuzzy Defualt Logic”, 2003, IEEE International Conference on Fuzzy Systems, pp. 1350-1356.
Axelsson, “Intrusion Detection Systems: A Survey and Taxonomy”, 2000, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, pp. 1-27.
McKay-Hubbard et al., “Models of Trust for Knowledge-Based Government Services”, 2003, p. 307.
Dimmock et al., “Using Trust and Risk in Role-Based Access Control Policites”, 2004, pp. 1-7.
Genty Denise Marie
Mullen Shawn Patrick
Reddy Bhargavi Bheemreddy
Wilson Jacqueline Hegedus
Baca Matthew W.
Brown, Jr. Nathan H
International Business Machines - Corporation
Vincent David R
Yee & Associates P.C.
LandOfFree
Method for controlling risk in a computer security... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for controlling risk in a computer security..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for controlling risk in a computer security... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4054367