18081317. METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION simplified abstract (SAMSUNG ELECTRONICS CO., LTD.)

From WikiPatents
Revision as of 05:06, 26 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION

Organization Name

SAMSUNG ELECTRONICS CO., LTD.

Inventor(s)

Ilgu Hong of Santa Clara CA (US)

Changho Choi of San Jose CA (US)

METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18081317 titled 'METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION

Simplified Explanation

The abstract describes a method for identifying and mitigating attacks from user devices on a computational storage device.

  • The method involves receiving a computational storage request from a user device.
  • It identifies the request as an attack by comparing the total attack value of the user device to a threshold.
  • The total attack value is determined based on the number of attacks received from the user device.
  • If the comparison shows that the user device is an attacker, it takes appropriate action to mitigate the attack.

Potential Applications

This technology could be applied in cybersecurity systems to protect computational storage devices from malicious attacks.

Problems Solved

This technology helps in identifying and mitigating attacks from user devices, thus enhancing the security of computational storage systems.

Benefits

The benefits of this technology include improved security for computational storage devices, reduced risk of data breaches, and enhanced overall system reliability.

Potential Commercial Applications

One potential commercial application of this technology is in cloud computing environments where computational storage devices are used extensively.

Possible Prior Art

One possible prior art for this technology could be existing methods for detecting and preventing attacks on storage devices in computer networks.

Unanswered Questions

How does the method differentiate between legitimate and malicious requests from user devices?

The method likely uses various algorithms and heuristics to analyze the behavior of user devices and determine if they are launching attacks.

What measures are taken to mitigate attacks once a user device is identified as an attacker?

The method may involve blocking or isolating the attacker device, alerting system administrators, or implementing additional security measures to prevent further attacks.


Original Abstract Submitted

A computational storage device (CSD) and a method thereof are provided. The method includes receiving, from a user device, a computational storage (CS) request, identifying the CS request as an attack, comparing a total attack value of the user device to a threshold, wherein the total attack value is based on a number of attacks received from the user device, and identifying the user device as an attacker based on the comparison.