-
公开(公告)号:US20220383093A1
公开(公告)日:2022-12-01
申请号:US17330771
申请日:2021-05-26
摘要: A computer system, program code, and a method are provided to leverage an AI model with respect to a target specification for a target standard. The AI model is configured to identify at least one candidate control associated with a corresponding standard. A map is subject to traversal to identify the candidate control in the map. Source and destination controls of the map are leveraged to identify at least one mapped control associated with the target standard. The AI model is selectively subject to training with the mapped control and the target standard.
-
公开(公告)号:US11176508B2
公开(公告)日:2021-11-16
申请号:US16299421
申请日:2019-03-12
摘要: Embodiments relate to an intelligent computer platform to utilize machine learning techniques to minimize compliance risk. Data, collected from a plurality of sources is subject to analysis and correlation to assess impact across data points. The assessment measures impact between at least two different compliance domains, facilitates understanding of cross-impact between compliance domains, and provides an estimation of compliance risk. A recommendation plan for one or more new compliance activities is created and dynamically subject to a machine learning reinforcement algorithm.
-
公开(公告)号:US20210150029A1
公开(公告)日:2021-05-20
申请号:US17135553
申请日:2020-12-28
摘要: Techniques for dynamic server groups that can be patched together using stream clustering algorithms, and learning components in order to reuse the repeatable patterns using machine learning are provided herein. In one example, in response to a first risk associated with a first server device, a risk assessment component patches a server group to mitigate a vulnerability of the first server device and a second server device, wherein the server group is comprised of the first server device and the second server device. Additionally, a monitoring component monitors data associated with a second risk to the server group to mitigate the second risk to the server group.
-
公开(公告)号:US20210075814A1
公开(公告)日:2021-03-11
申请号:US16563504
申请日:2019-09-06
发明人: Muhammed Fatih Bulut , Milton H. Hernandez , Jinho Hwang , Constantin Mircea Adam , Daniel S. Riley
摘要: Systems, computer-implemented methods, and computer program products that can facilitate compliance process risk assessment are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a metric assignment component that assigns one or more risk assessment metrics based on vulnerability data of a compliance process. The computer executable components can further comprise a risk assignment component that assigns a risk score of the compliance process based on the one or more risk assessment metrics.
-
公开(公告)号:US20200250195A1
公开(公告)日:2020-08-06
申请号:US16267482
申请日:2019-02-05
发明人: Jinho Hwang , Anup Kalia , Muhammed Fatih Bulut , Maja Vukovic , Jin Xiao , Rohit Madhukar Khandekar , Raghav Batta
IPC分类号: G06F16/2457 , G06N3/04 , G06F11/14 , G06N5/02
摘要: A system, program product, and method for use with an information handling system to detect and resolve faults in a run-time environment. As faults are detected, one or more corresponding general query responses are identified and subject to a ranking based on relevance criteria. At least one modified response is transformed into a command, selectively blended with context, and encoded as a context aware instruction. The instruction is subject to testing with corresponding output being subject to measurement.
-
6.
公开(公告)号:US20190268366A1
公开(公告)日:2019-08-29
申请号:US15904529
申请日:2018-02-26
发明人: Sai Zeng , Vugranam C. Sreedhar , Karin Murthy , Jinho Hwang , Milton H. Hernandez , Lisa M. Chavez , Muhammed Fatih Bulut , Virginia Mayo , Xinli Wang , Cindy Mullen
摘要: A system includes a memory that stores computer executable components and neural network data, and a processor executes computer executable components stored in the memory. An assessment component assesses a computer network, and classifies the computer network relative to M network classifications stored in a repository, wherein M is an integer greater than one. A risk component determines risk of vulnerability subject to change impact regarding protection against a computer virus or cyber-attack based on historical information regarding vulnerability exposure and vulnerability remediation changes relative to the classification of the computer network. A recommendation component that generates recommendations and best action to mitigate risk and impact, and remediate the vulnerabilities based on the risk assessment and business priorities.
-
公开(公告)号:US20190102548A1
公开(公告)日:2019-04-04
申请号:US15721566
申请日:2017-09-29
CPC分类号: G06F21/561 , G06F11/3404 , G06F11/3495 , G06F21/568 , G06F21/577
摘要: Techniques for dynamic server groups that can be patched together using stream clustering algorithms, and learning components in order to reuse the repeatable patterns using machine learning are provided herein. In one example, in response to a first risk associated with a first server device, a risk assessment component patches a server group to mitigate a vulnerability of the first server device and a second server device, wherein the server group is comprised of the first server device and the second server device. Additionally, a monitoring component monitors data associated with a second risk to the server group to mitigate the second risk to the server group.
-
公开(公告)号:US12032702B2
公开(公告)日:2024-07-09
申请号:US17078563
申请日:2020-10-23
发明人: Muhammed Fatih Bulut , Milton H. Hernandez , Robert Filepp , Sai Zeng , Steven Ocepek , Srinivas Babu Tummalapenta , Daniel S. Riley
IPC分类号: G06F21/57 , G06N20/00 , G06Q10/0635 , G06Q10/0637 , G06Q10/0639 , G06Q10/10 , G06Q40/02 , G06Q40/04
CPC分类号: G06F21/577 , G06N20/00 , G06F2221/034 , G06Q10/0635 , G06Q10/0637 , G06Q10/06393 , G06Q10/10 , G06Q40/02 , G06Q40/04
摘要: Systems and techniques that facilitate automated health-check risk assessment of computing assets are provided that can generate a baseline health-check risk score that corresponds to non-compliance of a computing asset with a stipulated control, and can adjust the baseline health-check risk score based on a weakness factor of the stipulated control, an environmental factor of the computing asset, a criticality factor of the computing asset, and a maturity factor of the computing asset.
-
公开(公告)号:US11956266B2
公开(公告)日:2024-04-09
申请号:US17078603
申请日:2020-10-23
发明人: Ali Kanso , Muhammed Fatih Bulut , Jinho Hwang , Shripad Nadgowda
CPC分类号: H04L63/1433 , H04L63/1416 , H04L63/20
摘要: According to an embodiment, a computer-implemented method can comprise: inspecting, using a processor, a set of container images respectively associated with pods; identifying, using the processor, a first subset of the pods that contain a vulnerability; classifying, using the processor, the first subset of the pods as primary-infected pods; generating, using the processor, a first list of namespaces in which the primary-infected pods are deployed within a network; checking, using the processor, network policies in connection with the first list of namespaces to determine secondary-suspect pods that have ability to communicate with the primary-infected pods; generating, using the processor, a list of secondary-suspect namespaces in which the secondary-suspect pods are deployed within the network; identifying, using the processor, one or more secondary-suspect pods that communicated with one or more primary-infected pods; and generating, using the processor, a list of secondary-infected pods.
-
公开(公告)号:US20230325397A1
公开(公告)日:2023-10-12
申请号:US18334949
申请日:2023-06-14
发明人: Muhammed Fatih Bulut , Hongtan Sun , Pritpal Arora , Klaus Koenig , Naga A. Ayachitula , Jonathan Richard Young , Maja Vukovic
IPC分类号: G06F16/2458 , G06N3/08 , G06N3/042 , G06N3/044
CPC分类号: G06F16/2465 , G06N3/08 , G06N3/042 , G06N3/044 , G06Q30/016
摘要: Techniques regarding providing artificial intelligence problem descriptions are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can include, at least: a query component that generates key performance indicators from a query, determines a subset of key performance indicators that individually have a performance below a threshold, and maps the subset of key performance indicators to operational metrics; a learning component that generates, using artificial intelligence, problem descriptions from one or more of the subset of key performance indicators or the operational metrics and transmits the problem descriptions to a database.
-
-
-
-
-
-
-
-
-