摘要:
An image capture system and methods for auto-recording media data are disclosed. A method includes receiving an activity type selection, selecting an activity-specific monitor based on the activity type selection, and capturing media data. The activity-specific monitor defines an auto-recording condition that, when satisfied, cause the image capture system to begin recording media data. The method includes executing the activity-specific monitor, the activity-specific monitor: receiving current sensor data from a sensor; determining whether the auto-recording condition defined by the activity-specific monitor are met by the current sensor data; and outputting a notification indicating that the auto-recording condition is met. The method further includes writing portions of the media data captured after the auto-recording condition is met to the persistent storage of the image capture system based on receipt of the notification.
摘要:
A method comprising: receiving from a node of a communication system, at least part of one or more data packets received at the node from an interconnection network; providing the at least part of one or more data packets to a virtualised environment comprising one or more virtualised nodes of a communication system to determine a threat level associated with the at least part of one or more data packets; and based on the determined threat level, transmitting information for controlling the node.
摘要:
A method and system are provided for causality analysis of Operating System-level (OS-level) events in heterogeneous enterprise hosts. The method includes storing (720F), by the processor, the OS-level events in a priority queue in a prioritized order based on priority scores determined from event rareness scores and event fanout scores for the OS-level events. The method includes processing (720G), by the processor, the OS-level events stored in the priority queue in the prioritized order to provide a set of potentially anomalous ones of the OS-level events within a set amount of time. The method includes generating (720G), by the processor, a dependency graph showing causal dependencies of at least the set of potentially anomalous ones of the OS-level events, based on results of the causality dependency analysis. The method includes initiating (730), by the processor, an action to improve a functioning of the hosts responsive to the dependency graph or information derived therefrom.
摘要:
Examples associated with ransomware attack monitoring are described. One example includes a monitor module to monitor files stored on the system for sequences of file accesses that match a predefined pattern of file accesses. An investigation module is activated when a number of sequences of file accesses that match the predefined pattern exceeds a first threshold. The investigation module logs actions taken by processes to modify files. A reaction module pauses a set of processes operating on the system when the number of sequences of file accesses that match the predefined pattern exceeds a second threshold. The reaction module then identifies processes associated with a suspected ransomware attack based on the logging performed by the investigation module, and resumes legitimate processes.
摘要:
Zum Erhöhen von Betriebssicherheit bei rechnergestützten Systemen (2) mit lokal angeschlossenen peripheren Eingabeeinrichtungen (3) wird einerseits eine zwischen das rechnergestützte System (2) und wenigstens einer einzigen der lokalen peripheren Eingabeeinrichtungen (3) unautorisiert physikalisch unentfernbar vom rechnergestützten System (2) schaltbare Zwischenschaltschutzeinrichtung (1) vorgeschlagen, die intern mit einem Filtermechanismus ausgestattet ist für eine autarke regelbasierte Filterung der Eingaben der angeschlossenen peripheren Eingabeeinrichtungen (3). Es wird für den gleichen Zweck zum anderen ein Verfahren vorgeschlagen, bei dem durch eine zwischen das rechnergestützte System (2) und wenigstens einer einzigen lokal angeschlossenen peripheren Eingabeeinrichtung (3) physikalisch unüberbrückbar und unautorisiert unentfernbar geschaltete Zwischenschaltschutzeinrichtung (1) eine regelbasierte, autark arbeitende Filterung der durch die lokal angeschlossenen Eingabeeinrichtungen (3) bewerkstelligten Eingaben durchgeführt wird.
摘要:
In one aspect, a computer-implemented method is disclosed. The computer-implemented method may include determining a sketch matrix that approximates a matrix representative of a reference dataset. The reference dataset may include at least one computer program having a predetermined classification. A reduced dimension representation of the reference dataset may be generated based at least on the sketch matrix. The reduced dimension representation may have fewer features than the reference dataset. A target computer program may be classified based on the reduced dimension representation. The target computer program may be classified to determine whether the target computer program is malicious. Related systems and articles of manufacture, including computer program products, are also disclosed.
摘要:
Cybersecurity systems and techniques are described. A cybersecurity method may include generating a process fingerprint of a process, wherein the process fingerprint identifies the process based, at least in part, on dynamic features of the process. Generating the process fingerprint may include performing a cryptographic hash operation on data representing dynamic features of the process. The method may further include comparing the process fingerprint to a plurality of process fingerprints, and based, at least in part, on a result of the comparison, performing a data reduction operation on data associated with the process and/or determining whether the process is a malware process.
摘要:
Fast monatlich gibt es neue Berichte von Hackern die Millionen Daten und Passwörter erbeuten konnten. Das Problem: Selbst wenn Daten ausreichend verschlüsselt sind, muss es doch irgendwo einen Schlüssel zum Entschlüsseln geben. Kann dieser entwendet werden, nützt die beste Verschlüsselung nichts. Das vorliegende Datenschutz-Gesamt-Konzept verwendet anstatt klassischer Schlüssel zukünftige Ereignisse als geheime Basis für Verschlüsselungen. Daten werden mehrmals mit variablen und teils nur kurzlebigen Schlüsseln chiffriert, die nicht dauerhaft gespeichert, sondern mit Zeitcodes chiffriert werden, welche sich aus unvorhersehbaren zukünftigen Timer-Events ergeben und somit unmöglich entwendet werden können. Verschiedene Maßnahmen sichern Schlüssel sogar während deren unmittelbaren Verwendung gegen Einsichtnahme und eine optionale Hardwareerweiterung schließt jegliche Manipulationsmöglichkeiten aus, sodass selbst bei gekaperten Systemen keine Gefahr mehr besteht.
摘要:
A processor includes an execution unit and a processing logic operatively coupled to the execution unit, the processing logic to: enter a first execution state and transition to a second execution state responsive to executing a control transfer instruction. Responsive to executing a target instruction of the control transfer instruction, the processing logic further transitions to the first execution state responsive to the target instruction being a control transfer termination instruction of a mode identical to a mode of the processing logic following the execution of the control transfer instruction; and raises an execution exception responsive to the target instruction being a control transfer termination instruction of a mode different than the mode of the processing logic following the execution of the control transfer instruction.