Method for controlling risk in a computer security...

Data processing: artificial intelligence – Neural network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S025000

Reexamination Certificate

active

07461036

ABSTRACT:
A computer implemented method for monitoring system events and providing real-time response to security threats. System data is collected by monitors in the computing system. The expert system of the present invention compares the data against information in a knowledge base to identify a security threat to a system resource in a form of a system event and an action for mitigating effects of the system event. A determination is made as to whether a threat risk value of the system event is greater than an action risk value of the action for mitigating the system event. If the threat risk value is greater, a determination is made as to whether a trust value set by a user is greater than the action risk value. If the trust value is greater, the expert system executes the action against the security threat.

REFERENCES:
patent: 2004/0103058 (2004-05-01), Hamilton
Zhang Jian et al., Intrusion Detection System based on Fuzzy Default Logic, 2003, The IEEE International Conference on Fuzzy Systems, pp. 1350-1356.
Stefan Axelsson, Intrusion Detection Systems: A Survey and Taxonomy, 2000, Department of Computer Engineering Chalmers University of Technology Goteborg, Sweden.
McKay-Hubbard et al., Models of Trust for Knowledge-Based Government Services, 2003, p. 307.
Dimmock et al., “Using Trust and Risk in Role-Based Access Control Policies”, 2004.
“Internet Snoop Deceiver”, IBM Research Disclosure 428117, Dec. 1999, pp. 1682.
Tsudik et al., “AudEs—an Expert System for Security Auditing”, http://sunsite.rediris.es/sites/ftp.cert.dfn.de/pub/docs/misc/audes/ps.gz, retrieved Sep. 23, 2005, pp. 1-9.
“RPC: Remote Procedure Call Protocol specification: Version 2”, The Network Working Group, RFC 1057, Sun Microsystems, Inc., Jun. 1988, pp. 1-20.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for controlling risk in a computer security... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for controlling risk in a computer security..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for controlling risk in a computer security... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4050377

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.