18081317. METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION simplified abstract (SAMSUNG ELECTRONICS CO., LTD.)
Contents
- 1 METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION
Organization Name
Inventor(s)
Ilgu Hong of Santa Clara CA (US)
Changho Choi of San Jose CA (US)
METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION - A simplified explanation of the abstract
This abstract first appeared for US patent application 18081317 titled 'METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION
Simplified Explanation
The abstract describes a method for identifying and mitigating attacks from user devices on a computational storage device.
- The method involves receiving a computational storage request from a user device.
- It identifies the request as an attack by comparing the total attack value of the user device to a threshold.
- The total attack value is determined based on the number of attacks received from the user device.
- If the comparison shows that the user device is an attacker, it takes appropriate action to mitigate the attack.
Potential Applications
This technology could be applied in cybersecurity systems to protect computational storage devices from malicious attacks.
Problems Solved
This technology helps in identifying and mitigating attacks from user devices, thus enhancing the security of computational storage systems.
Benefits
The benefits of this technology include improved security for computational storage devices, reduced risk of data breaches, and enhanced overall system reliability.
Potential Commercial Applications
One potential commercial application of this technology is in cloud computing environments where computational storage devices are used extensively.
Possible Prior Art
One possible prior art for this technology could be existing methods for detecting and preventing attacks on storage devices in computer networks.
Unanswered Questions
How does the method differentiate between legitimate and malicious requests from user devices?
The method likely uses various algorithms and heuristics to analyze the behavior of user devices and determine if they are launching attacks.
What measures are taken to mitigate attacks once a user device is identified as an attacker?
The method may involve blocking or isolating the attacker device, alerting system administrators, or implementing additional security measures to prevent further attacks.
Original Abstract Submitted
A computational storage device (CSD) and a method thereof are provided. The method includes receiving, from a user device, a computational storage (CS) request, identifying the CS request as an attack, comparing a total attack value of the user device to a threshold, wherein the total attack value is based on a number of attacks received from the user device, and identifying the user device as an attacker based on the comparison.