×

Security threat based auto scaling

  • US 10,050,999 B1
  • Filed: 09/22/2015
  • Issued: 08/14/2018
  • Est. Priority Date: 09/22/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method for auto scaling computing resources in response to a cyber-attack in a service provider environment, the method comprising:

  • identifying computing resources in the service provider environment that are being subjected to the cyber-attack, and computing resources that are predicted to be attacked at a subsequent time based on a cyber-attack vector that characterizes the cyber-attack;

    determining an expected amount of time before the computing resources in the service provider environment become compromised due to the cyber-attack;

    selecting an auto scaling event to perform in the service provider environment using heuristic scaling rules in order to mitigate the cyber-attack, wherein an amount of time to perform the selected auto scaling event is less than the expected amount of time before the computing resources become compromised;

    initiating performance of the auto scaling event in the service provider environment;

    recalculating the expected amount of time before the computing resources become compromised based on the auto scaling event selected for performance in the service provider environment;

    notifying an operator of the cyber-attack, along with a recalculated expected amount of time before the computing resources become compromised, and the auto scaling event selected to mitigate the cyber-attack;

    detecting an expected amount of time for the cyber-attack to be completed in view of the auto scaling event performed in the service provider environment; and

    determining to throttle or shut down the auto scaling event performed to mitigate the cyber-attack based on the expected amount of time for the cyber-attack to be completed.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×