×

Biology based techniques for handling information security and privacy

  • US 10,110,626 B2
  • Filed: 04/26/2016
  • Issued: 10/23/2018
  • Est. Priority Date: 04/26/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method, in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions which are executed by the at least one processor to configure the data processing system to implement a local segment analysis and security (LSAS) engine that operates to:

  • collect, from one or more agents associated with computing resources in a first segment of a computing environment, status metrics indicating a current operational status of the computing resources within the first segment;

    analyze the status metrics to determine whether the first segment is the target of a first attack on one or more computing resources of the first segment;

    receive, from one or more other LSAS engines associated with one or more second segments of the computing environment, at least one message indicating a status of the one or more second segments with regard to the one or more second segments being a target of a second attack;

    determine a security response action to implement based on the received at least one message and results of the analysis; and

    automatically transmit a control message to at least one data traffic routing device of the first segment to implement the determined security response action to control a flow of data traffic to or from the first segment, wherein;

    the determined security response action is at least one of a segmentation security response action, a dilution security response action, or a scaffolding security response action,determining the security response action to implement based on the received at least one message and results of the analysis com rises performing a trend analysis on the status metrics for the first segment and applying results of the trend analysis to a plurality of rules associated with corresponding security response action indicators, and automatically selecting a security response action based on a rule in the plurality of rules whose criteria are met by the results of the trend analysis and other characteristics of at least one of the first attack or second attack,the plurality of rules represents increasing levels of security response actions as the status metrics and characteristics of at least one of the first attack or second attack indicate an increasing threat from the first attack or second attack, andat least one of the rules is associated with a security response action indicator that indicates performing at least two of the security response actions, wherein the computing environment is a cloud computing environment, and wherein the first segment is a segment of the cloud computing environment corresponding to a network or geographical topology based portion of the cloud computing environment, and wherein each of the one or more second segments are different segments of the cloud computing environment corresponding to different network or geographical topology based portions of the cloud computing environment.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×