INTRUSION DETECTION SYSTEM ENRICHMENT BASED ON SYSTEM LIFECYCLE

    公开(公告)号:US20220232026A1

    公开(公告)日:2022-07-21

    申请号:US17713348

    申请日:2022-04-05

    Applicant: SAP SE

    Inventor: Rouven Krebs

    Abstract: Techniques are described for automatically incorporating lifecycle information for a secured environment (SE) into an intrusion detection system monitoring the secured environment's operations. In one example, a secured environment including at least one component is monitored, where the secured environment is associated with a lifecycle operations manager (LOM) responsible for managing lifecycle operations associated with at least one component in the SE. One or more log files associated with operations of each of the at least one components are obtained, along with log files associated with lifecycle operations executed by the LOM. A determination is made as to whether the particular activities documented in the log files indicate a violation of at least one malicious action rule. In response to determining that the log files are associated with a malicious action rule, a mitigation action associated with the violation is triggered.

    Intrusion detection system enrichment based on system lifecycle

    公开(公告)号:US11316877B2

    公开(公告)日:2022-04-26

    申请号:US15665758

    申请日:2017-08-01

    Applicant: SAP SE

    Inventor: Rouven Krebs

    Abstract: Techniques are described for automatically incorporating lifecycle information for a secured environment (SE) into an intrusion detection system monitoring the secured environment's operations. In one example, a secured environment including at least one component is monitored, where the secured environment is associated with a lifecycle operations manager (LOM) responsible for managing lifecycle operations associated with at least one component in the SE. One or more log files associated with operations of each of the at least one components are obtained, along with log files associated with lifecycle operations executed by the LOM. A determination is made as to whether the particular activities documented in the log files indicate a violation of at least one malicious action rule. In response to determining that the log files are associated with a malicious action rule, a mitigation action associated with the violation is triggered.

    Model-based service registry for software systems

    公开(公告)号:US10768900B2

    公开(公告)日:2020-09-08

    申请号:US16210060

    申请日:2018-12-05

    Applicant: SAP SE

    Abstract: Methods, systems, and computer-readable storage media for receiving, by an operation controller, a call to trigger an operation, the call at least partially including an identifier associated with an operation signature, providing the operation signature based on the identifier, identifying, by the operation controller, an operation provider that provides the operation corresponding to the operation signature, validating, by the operation provider, one or more conditions for execution of the operation, and executing the operation to affect an entity within a landscape in response to the one or more conditions being valid.

    IINTRUSION DETECTION SYSTEM ENRICHMENT BASED ON SYSTEM LIFECYCLE

    公开(公告)号:US20190042736A1

    公开(公告)日:2019-02-07

    申请号:US15665700

    申请日:2017-08-01

    Applicant: SAP SE

    Abstract: Techniques are described for automatically incorporating lifecycle context information for a secured environment into an intrusion detection system monitoring the secured environment's operations. In one example, an indication of a potentially malicious action occurring in a secured environment monitored by an intrusion detection system is identified. A lifecycle-based context associated with a lifecycle operations manager (LOM) is accessed, where the LOM is responsible for managing lifecycle operations associated with components in the secured environment, and where the context stores information associated with lifecycle operations executed by the LOM. A determination is made as to whether the potentially malicious action associated with the indication is associated with information associated with an executed lifecycle operation stored in the context. In response to determining that a malicious action is associated with a lifecycle operation, a mitigation action associated with the potentially malicious action can be modified.

Patent Agency Ranking