18146796. DETECTING SUSPICIOUS DATA ACCESS BY A ROGUE CLOUD RESOURCE simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Jump to navigation Jump to search

DETECTING SUSPICIOUS DATA ACCESS BY A ROGUE CLOUD RESOURCE

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Evgeny Bogokovsky of Herzliya (IL)

Ram Haim Pliskin of Rishon lezion (IL)

Andrey Karpovsky of Haifa` (IL)

DETECTING SUSPICIOUS DATA ACCESS BY A ROGUE CLOUD RESOURCE - A simplified explanation of the abstract

This abstract first appeared for US patent application 18146796 titled 'DETECTING SUSPICIOUS DATA ACCESS BY A ROGUE CLOUD RESOURCE

Simplified Explanation

The techniques disclosed in this patent application aim to prevent the creation of rogue resources within a cloud computing environment, such as a rogue serverless function integrating with a cloud-based database to perform malicious operations like data exfiltration.

  • Key retrieval requests are analyzed for anomalies, and anomalous requests are stored in a pool for further review.
  • When a resource creation request is received, the pool of anomalous key retrieval requests is checked for a match to suspend the creation request for a security review.

Potential Applications

The technology described in this patent application could be applied in various cloud computing environments to enhance security measures and prevent unauthorized access or malicious activities.

Problems Solved

This technology addresses the issue of rogue resources being created within a cloud computing environment, which could lead to security breaches and data theft. By detecting and suspending suspicious resource creation requests, the system can prevent potential attacks before they occur.

Benefits

- Improved security within cloud computing environments - Prevention of unauthorized access and malicious activities - Early detection of potential threats before they can cause harm

Potential Commercial Applications

This technology could be valuable for cloud service providers, enterprises utilizing cloud computing, and any organization looking to enhance their cybersecurity measures in the cloud.

Possible Prior Art

One possible prior art could be the use of anomaly detection techniques in cybersecurity to identify and prevent unauthorized access or malicious activities within a network.

Unanswered Questions

How does this technology impact the performance of cloud computing environments?

The patent application does not provide information on how the implementation of these security measures may affect the performance or efficiency of cloud computing systems.

Are there any potential false positives in detecting anomalous key retrieval requests?

The patent application does not address the possibility of false positives in detecting anomalous key retrieval requests and how they may be mitigated.


Original Abstract Submitted

The techniques disclosed herein prevent a rogue resource from being created within a cloud computing environment. For example, a rogue serverless function may be prevented from integrating with a cloud-based database, thereby preventing the serverless function from performing malicious operations such as low-rate data exfiltration. The rogue serverless function is detected before it is installed, heading off the attack completely. In some configurations, a key retrieval request is received. Parameters of the key retrieval request are analyzed for anomalies, and anomalous key retrieval requests are stored in a pool. Then, when a request to create a resource is received, the pool of anomalous key retrieval requests is searched for a match. When a match is found, the resource creation request may be suspended pending a further security review.