INSIDER ATTACK RESISTANT SYSTEM AND METHOD FOR CLOUD SERVICES INTEGRITY CHECKING
First Claim
1. A system, comprising:
- a memory that stores instructions; and
a processor that executes the instructions to perform operations, the operations comprising;
executing, during a first mode, a set of operations associated with a service to check an integrity of the service, wherein the set of operations are executed based on a minimum level of access to a peripheral that is required for at least one operation in the set of operations to be executed, wherein the minimum level of access is established by suspending access to a network port;
executing, when the system is in a second mode, the set of operations associated with the service based on a full level of access to the peripheral; and
determining whether a failure of the at least one operation in the set of operations has occurred.
1 Assignment
0 Petitions
Accused Products
Abstract
An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.
-
Citations
20 Claims
-
1. A system, comprising:
-
a memory that stores instructions; and a processor that executes the instructions to perform operations, the operations comprising; executing, during a first mode, a set of operations associated with a service to check an integrity of the service, wherein the set of operations are executed based on a minimum level of access to a peripheral that is required for at least one operation in the set of operations to be executed, wherein the minimum level of access is established by suspending access to a network port; executing, when the system is in a second mode, the set of operations associated with the service based on a full level of access to the peripheral; and determining whether a failure of the at least one operation in the set of operations has occurred. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method, comprising:
-
executing, during a first mode, a set of operations associated with a service to check an integrity of the service, wherein the set of operations are executed based on a minimum level of access to a peripheral that is required for at least one operation in the set of operations to be executed, wherein the minimum level of access is established by suspending access to a network port; executing, when the system is in a second mode, the set of operations associated with the service based on a full level of access to the peripheral; and determining, based on the executing of the set of operations, that a change in a system behavior associated with the service has occurred, wherein the determining is performed by utilizing instructions from a memory that are executed by a processor. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A computer-readable device comprising instructions, which when executed by a processor, cause the processor to perform operations comprising:
-
executing, during a first mode, a set of operations associated with a service to check an integrity of the service, wherein the set of operations are executed based on a minimum level of access to a peripheral that is required for at least one operation in the set of operations to be executed, wherein the minimum level of access is established by suspending access to a network port; executing, when the system is in a second mode, the set of operations associated with the service based on a full level of access to the peripheral; and logging each result for each operation in the set of operations.
-
Specification