摘要:
A method and apparatus for modeling a behavior of a computer program that is executed in a computer system is described. The method and apparatus for modeling a behavior of a computer program may be used to detect a malicious program based on the behavior of the computer program. A method includes collecting system use information about resources of the computer system the computer program uses; extracting a behavior signature of the computer program from the collected system use information; and encoding the extracted behavior signature to generate a behavior vector. As a result, behaviors of a particular computer program may be modeled to enable a malicious program detection program and to determine whether the computer program is either normal or malicious.
摘要:
An apparatus and method of diagnosing whether a program executed in a computer system is malware and repairing the computer system infected by malware. The apparatus includes a receiving unit which receives a first behavior vector for the malware from a malware control server; a determination unit which determines whether a diagnostic target program corresponds to malware based on the received first behavior vector and a second behavior vector for the diagnostic target program; and a repair unit which repairs the computer system based on a result of the determination.A behavior of a computer program executed in the computer system may be modeled in real time.
摘要:
An apparatus and method of diagnosing whether a computer program executed in a computer system is a malicious program and more particularly, an apparatus and method of diagnosing whether a computer program is a malicious program using a behavior of a computer program, and an apparatus and method of generating malicious code diagnostic data is provided. The apparatus for diagnosing a malicious code may include a behavior vector generation unit which generates a first behavior vector based on a behavior signature extracted from a diagnostic target program; a diagnostic data storage unit which stores a plurality of second behavior vectors for a plurality of sample programs predetermined to be malicious or normal; and a code diagnostic unit which diagnoses whether the diagnostic target program is a malicious code by comparing the first behavior vector with the plurality of second behavior vectors.
摘要:
A method and apparatus for modeling a behavior of a computer program that is executed in a computer system is described. The method and apparatus for modeling a behavior of a computer program may be used to detect a malicious program based on the behavior of the computer program. A method includes collecting system use information about resources of the computer system the computer program uses; extracting a behavior signature of the computer program from the collected system use information; and encoding the extracted behavior signature to generate a behavior vector. As a result, behaviors of a particular computer program may be modeled to enable a malicious program detection program and to determine whether the computer program is either normal or malicious.
摘要:
An apparatus and method of diagnosing whether a computer program executed in a computer system is a malicious program and more particularly, an apparatus and method of diagnosing whether a computer program is a malicious program using a behavior of a computer program, and an apparatus and method of generating malicious code diagnostic data is provided. The apparatus for diagnosing a malicious code may include a behavior vector generation unit which generates a first behavior vector based on a behavior signature extracted from a diagnostic target program; a diagnostic data storage unit which stores a plurality of second behavior vectors for a plurality of sample programs predetermined to be malicious or normal; and a code diagnostic unit which diagnoses whether the diagnostic target program is a malicious code by comparing the first behavior vector with the plurality of second behavior vectors.
摘要:
Aspects of the present invention dynamically reduce a frequency at which IT infrastructure automatically generates alerts. Historical data across a plurality of data sources in the IT infrastructure is analyzed. An opportunity to reduce the frequency at which the IT infrastructure automatically generates the alerts is identified. A new alert policy addressing the opportunity to reduce alert frequency is generated. An impact of the new alert policy on a set of predefined service level objectives (SLOs) and service level agreements (SLAs) is evaluated. The new alert policy is deployed in the IT infrastructure.
摘要:
An exemplary method of responding to a request for a value of at least one metric associated with at least one process includes a step of determining whether responding to the request requires updating the value of the at least one metric. When responding to the request does not require updating the value of the at least one metric, a response is determined based at least in part on at least one stored value of the at least one metric. When responding to the request does require updating the value of the at least one metric, the value of the at least one metric is updated and a response is determined based at least in part on the at least one updated value of the at least one metric. Updating the value of the at least one metric, at least when responding to the request requires updating the value of the at least one metric, includes steps of determining at least one new value of the at least one metric based at least in part on at least one stored value of the at least one metric and storing the at least one new value of the at least one metric. The method also includes a step of responding to the request with the determined response.
摘要:
Access is obtained to a parallel corpus including a problem corpus and a solution corpus. A first plurality of topics are mined from the problem corpus and a second plurality of topics are mined from the solution corpus. A transition probability from the first plurality of topics to the second plurality of topics is determined, to identify a most appropriate one of the topics from the solution corpus for a given one of the topics from the problem corpus.
摘要:
An exemplary method of responding to a request for a value of at least one metric associated with at least one process includes a step of determining whether responding to the request requires updating the value of the at least one metric. When responding to the request does not require updating the value of the at least one metric, a response is determined based at least in part on at least one stored value of the at least one metric. When responding to the request does require updating the value of the at least one metric, the value of the at least one metric is updated and a response is determined based at least in part on the at least one updated value of the at least one metric. Updating the value of the at least one metric, at least when responding to the request requires updating the value of the at least one metric, includes steps of determining at least one new value of the at least one metric based at least in part on at least one stored value of the at least one metric and storing the at least one new value of the at least one metric. The method also includes a step of responding to the request with the determined response.
摘要:
A system and method for facilitating automatic objective-based feature improvement, the method including receiving a request to identify an optimal alternative for each of one or more features of a computer-implemented entity, determining an alternative feature range for each of the one or more features, the alternative feature range defining a range of possible alternative features available with respect to the feature, selecting one or more alternative features for each feature from the alternative feature range of the feature, generating a plurality of alternative sets, each including an alternative feature for at least one of the one or more features, selecting a plurality of user groups from a pool of users and assigning each user group of the plurality of users groups to one of the plurality of alternative sets based on user characteristics of the users and historical information regarding the interaction of the user with the computer-implemented entity.