DYNAMIC RE-COMPOSITION OF PATCH GROUPS USING STREAM CLUSTERING

    公开(公告)号:US20210150029A1

    公开(公告)日:2021-05-20

    申请号:US17135553

    申请日:2020-12-28

    IPC分类号: G06F21/56 G06F21/57 G06F11/34

    摘要: Techniques for dynamic server groups that can be patched together using stream clustering algorithms, and learning components in order to reuse the repeatable patterns using machine learning are provided herein. In one example, in response to a first risk associated with a first server device, a risk assessment component patches a server group to mitigate a vulnerability of the first server device and a second server device, wherein the server group is comprised of the first server device and the second server device. Additionally, a monitoring component monitors data associated with a second risk to the server group to mitigate the second risk to the server group.

    COMPLIANCE PROCESS RISK ASSESSMENT

    公开(公告)号:US20210075814A1

    公开(公告)日:2021-03-11

    申请号:US16563504

    申请日:2019-09-06

    IPC分类号: H04L29/06 G06N20/00

    摘要: Systems, computer-implemented methods, and computer program products that can facilitate compliance process risk assessment are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a metric assignment component that assigns one or more risk assessment metrics based on vulnerability data of a compliance process. The computer executable components can further comprise a risk assignment component that assigns a risk score of the compliance process based on the one or more risk assessment metrics.

    Context based risk assessment of a computing resource vulnerability

    公开(公告)号:US11956266B2

    公开(公告)日:2024-04-09

    申请号:US17078603

    申请日:2020-10-23

    IPC分类号: H04L9/00 H04L9/40

    摘要: According to an embodiment, a computer-implemented method can comprise: inspecting, using a processor, a set of container images respectively associated with pods; identifying, using the processor, a first subset of the pods that contain a vulnerability; classifying, using the processor, the first subset of the pods as primary-infected pods; generating, using the processor, a first list of namespaces in which the primary-infected pods are deployed within a network; checking, using the processor, network policies in connection with the first list of namespaces to determine secondary-suspect pods that have ability to communicate with the primary-infected pods; generating, using the processor, a list of secondary-suspect namespaces in which the secondary-suspect pods are deployed within the network; identifying, using the processor, one or more secondary-suspect pods that communicated with one or more primary-infected pods; and generating, using the processor, a list of secondary-infected pods.