×

System and method for providing a self-monitoring, self-reporting, and self-repairing virtual asset configured for extrusion and intrusion detection and threat scoring in a cloud computing environment

  • US 9,923,909 B2
  • Filed: 04/28/2017
  • Issued: 03/20/2018
  • Est. Priority Date: 02/03/2014
  • Status: Active Grant
First Claim
Patent Images

1. A system for virtual asset management comprising:

  • one or more processors; and

    at least one memory coupled to at least one of the one or more processors, the at least one memory having stored therein instructions which when executed by any set of the one or more processors, perform a process including;

    providing a cloud computing environment including one or more virtual assets instantiated and executing within the cloud computing environment by a computing processor, the one or more virtual assets comprising, at instantiation;

    virtual asset self-monitoring logic, the virtual asset self-monitoring logic including data and instructions for detecting one or more trigger events of the virtual asset;

    virtual asset self-reporting logic, the virtual asset self-reporting logic including data and instructions for generating trigger event reporting data if one of the one or more trigger events is detected in the virtual asset by the virtual asset self-monitoring logic;

    self-reporting communications channel creation logic, the self-reporting communications channel creation logic including data and instructions for opening a self-reporting communications channel between the virtual asset and a virtual asset monitoring system responsive to one of the one or more trigger events being detected in the virtual asset by the virtual asset self-monitoring logic; and

    trigger event reporting data transfer logic, the trigger event reporting data transfer logic including data and instructions for transferring the trigger event reporting data from the virtual asset to the virtual asset monitoring system if one of the one or more trigger events is detected in the virtual asset by the virtual asset self-monitoring logic;

    detecting, by monitoring message traffic sent from the virtual asset, at least one message that satisfies one or more predefined trigger parameters;

    classifying one or more portions of the detected at least one message as being suspect, the classified portions of the detected message satisfying the one or more predefined trigger parameters;

    assigning a threat score to the suspect message at least partially based on a potential impact of the suspect message'"'"'s potential security threat on the virtual asset;

    enabling, by providing the threat score to the virtual asset, the extrusion detection capable virtual asset to secure against the suspect message;

    for each suspect message, generating suspect message copy data representing a copy of at least a portion of the suspect message; and

    transferring the suspect message copy data to one or more analysis systems for further analysis.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×