20240054227. IDENTIFICATION OF A RESOURCE ATTACK PATH BY CONNECTING CODE, CONFIGURATION, AND TELEMETRY simplified abstract (MICROSOFT TECHNOLOGY LICENSING, LLC)

From WikiPatents
Jump to navigation Jump to search

IDENTIFICATION OF A RESOURCE ATTACK PATH BY CONNECTING CODE, CONFIGURATION, AND TELEMETRY

Organization Name

MICROSOFT TECHNOLOGY LICENSING, LLC

Inventor(s)

Karen Lowe Dahmen of Sammamish WA (US)

George Wilburn of Austin TX (US)

IDENTIFICATION OF A RESOURCE ATTACK PATH BY CONNECTING CODE, CONFIGURATION, AND TELEMETRY - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240054227 titled 'IDENTIFICATION OF A RESOURCE ATTACK PATH BY CONNECTING CODE, CONFIGURATION, AND TELEMETRY

Simplified Explanation

The abstract describes a method for identifying resource attack paths in cloud computing environments to address malicious attacks based on vulnerabilities in computer program instructions.

  • A vulnerability identifier scans computer program instructions to identify vulnerabilities.
  • A resource mapper generates a resource map linking program instructions to cloud resources.
  • An attack path identifier uses telemetry events to identify attack paths based on vulnerabilities and resource maps.
  • A security event remediator takes remediation actions in response to identified attack paths.

Potential Applications

  • Cloud security
  • Malware detection and prevention
  • Incident response in cloud environments

Problems Solved

  • Identifying vulnerabilities in cloud computing resources
  • Detecting and mitigating malicious attacks in the cloud
  • Improving overall security posture in cloud environments

Benefits

  • Enhanced security in cloud computing
  • Proactive identification and mitigation of potential attacks
  • Improved incident response capabilities in cloud environments


Original Abstract Submitted

computing resources deployed on the cloud can be susceptible to different types of malicious attacks based on vulnerabilities introduced in computer program instructions that define the computing resources. to address these types of attacks, methods, systems, apparatuses, and computer-readable storage mediums are described for identifying a resource attack path. a vulnerability identifier scans a set of computer program instructions to identify a vulnerability therein. a resource mapper generates a resource map that identifies a relationship between a portion of the set of computer program instructions and a resource executing in a cloud. an attack path identifier obtains a log that identifies telemetry events in the cloud. the attack path identifier further identifies an attack path based at least on the identified vulnerability, the resource map, and the log. a security event remediator performs a remediation action in response to the identifying the attack path.