Zhou, 2013 - Google Patents
Towards a Data-centric Approach to Attribution in the CloudZhou, 2013
View PDF- Document ID
 - 206696702055779176
 - Author
 - Zhou W
 - Publication year
 - Publication venue
 - Secure Cloud Computing
 
External Links
Snippet
With an increasing number of applications being mirgrated to cloud, it becomes evident that  faults in these applications or the underlying cloud platform can be costly. In cases where a  system fault occurs, administrators often find themselves needing to answer attribution … 
    Classifications
- 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
 - G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
 - G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
 - G06F17/30386—Retrieval requests
 - G06F17/30424—Query processing
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
 - G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
 - G06F17/30067—File systems; File servers
 - G06F17/30129—Details of further file system functionalities
 - G06F17/30144—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
 - G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
 - G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
 - G06F17/30289—Database design, administration or maintenance
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/60—Protecting data
 - G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
 - G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
 - G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
 - G06F17/30861—Retrieval from the Internet, e.g. browsers
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
 - G06F21/577—Assessing vulnerabilities and evaluating computer system security
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/55—Detecting local intrusion or implementing counter-measures
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F11/00—Error detection; Error correction; Monitoring
 - G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
 - G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F9/00—Arrangements for programme control, e.g. control unit
 - G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
 - G06F9/46—Multiprogramming arrangements
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F8/00—Arrangements for software engineering
 - G06F8/70—Software maintenance or management
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
 
 - 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
 
 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| US12034754B2 (en) | Using static analysis for vulnerability detection | |
| US11741238B2 (en) | Dynamically generating monitoring tools for software applications | |
| US11849000B2 (en) | Using real-time monitoring to inform static analysis | |
| US11792284B1 (en) | Using data transformations for monitoring a cloud compute environment | |
| US12126695B1 (en) | Enhancing security of a cloud deployment based on learnings from other cloud deployments | |
| US11909752B1 (en) | Detecting deviations from typical user behavior | |
| US11895135B2 (en) | Detecting anomalous behavior of a device | |
| US20240080329A1 (en) | Cloud Resource Risk Scenario Assessment and Remediation | |
| US20220294816A1 (en) | Ingesting event data into a data warehouse | |
| US20230075355A1 (en) | Monitoring a Cloud Environment | |
| US11765249B2 (en) | Facilitating developer efficiency and application quality | |
| US11894984B2 (en) | Configuring cloud deployments based on learnings obtained by monitoring other cloud deployments | |
| US11818156B1 (en) | Data lake-enabled security platform | |
| Zhou et al. | Secure network provenance | |
| US12095796B1 (en) | Instruction-level threat assessment | |
| US12095794B1 (en) | Universal cloud data ingestion for stream processing | |
| US12355797B2 (en) | System for collecting computer network entity information employing abstract models | |
| US12309236B1 (en) | Analyzing log data from multiple sources across computing environments | |
| Liao et al. | Towards provenance-based anomaly detection in MapReduce | |
| US12021888B1 (en) | Cloud infrastructure entitlement management by a data platform | |
| US12130878B1 (en) | Deduplication of monitored communications data in a cloud environment | |
| WO2023038957A1 (en) | Monitoring a software development pipeline | |
| US12368745B1 (en) | Using natural language queries to conduct an investigation of a monitored system | |
| US12363148B1 (en) | Operational adjustment for an agent collecting data from a cloud compute environment monitored by a data platform | |
| US12355626B1 (en) | Tracking infrastructure as code (IaC) asset lifecycles |