Method for controlling risk in a computer security...

Data processing: artificial intelligence – Neural network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S025000

Reexamination Certificate

active

07577623

ABSTRACT:
A computer implemented method, data processing system, and computer program product for monitoring system events and providing real-time response to security threats. System data is collected by monitors in the computing system. The expert system of the present invention compares the data against information in a knowledge base to identify a security threat to a system resource in a form of a system event and an action for mitigating effects of the system event. A determination is made as to whether a threat risk value of the system event is greater than an action risk value of the action for mitigating the system event. If the threat risk value is greater, a determination is made as to whether a trust value set by a user is greater than the action risk value. If the trust value is greater, the expert system executes the action against the security threat.

REFERENCES:
patent: 2004/0103058 (2004-05-01), Hamilton
“Internet Snoop Deceiver”, IBM Research Disclosure 428117, Dec. 1999, pp. 1682.
Tsudik et al., “AudES—an Expert System for Security Auditing”, http://sunsite.rediris.es/sites/ftp.cert.dfn.de/pub/docs/misc/audes/ps.gz, retrieved Sep. 23, 2005, pp. 1-9.
“RPC: Remote Procedure Call Protocol specification: Version 2”, The Network Working Group, RFC 1057, Sun Microsystems, Inc., Jun. 1988, pp. 1-20.
Zhang et al., “Intrusion Detection Ssytem based on Fuzzy Defualt Logic”, 2003, IEEE International Conference on Fuzzy Systems, pp. 1350-1356.
Axelsson, “Intrusion Detection Systems: A Survey and Taxonomy”, 2000, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, pp. 1-27.
McKay-Hubbard et al., “Models of Trust for Knowledge-Based Government Services”, 2003, p. 307.
Dimmock et al., “Using Trust and Risk in Role-Based Access Control Policites”, 2004, pp. 1-7.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for controlling risk in a computer security... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for controlling risk in a computer security..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for controlling risk in a computer security... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4054367

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.