Method and system for dynamic refinement of security policies
First Claim
Patent Images
1. A computerized method for dynamically refining a security policy rule set, the method comprising:
- aggregating a plurality of log entries from one or more log files to a create a single set of log entries;
grouping the log entries in the single set according to common characteristics; and
analyzing the groups of log entries to amend the security policy rule set.
1 Assignment
0 Petitions
Accused Products
Abstract
A computerized method is described for dynamically refining a security policy rule set. The security policy rule set is used to define legal and illegal actions to be taken on an application running a server from clients. The method involves aggregating a plurality of log entries from one or more log files to create a single set of log entries, grouping the log entries in the single set according to common characteristics and analyzing the groups of log entries to amend the security policy rule set. The method helps reduce the instances in which legal actions are rejected by the security policy rule set.
86 Citations
22 Claims
-
1. A computerized method for dynamically refining a security policy rule set, the method comprising:
-
aggregating a plurality of log entries from one or more log files to a create a single set of log entries;
grouping the log entries in the single set according to common characteristics; and
analyzing the groups of log entries to amend the security policy rule set. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An article of manufacture comprising a computer readable medium containing a program which when executed on a computer causes the computer to perform a method for dynamically refining a security policy rule set, the method comprising:
-
aggregating a plurality of log entries from one or more log files to a create a single set of log entries;
grouping the log entries in the single set according to common characteristics; and
analyzing the groups of log entries to amend the security policy rule set. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification