Microsoft technology licensing, llc (20240137376). DETECTING SUSPICIOUS DATA ACCESS BY A ROGUE CLOUD RESOURCE simplified abstract

From WikiPatents
Jump to navigation Jump to search

DETECTING SUSPICIOUS DATA ACCESS BY A ROGUE CLOUD RESOURCE

Organization Name

microsoft technology licensing, llc

Inventor(s)

Evgeny Bogokovsky of Herzliya (IL)

Ram Haim Pliskin of Rishon lezion (IL)

Andrey Karpovsky of Haifa` (IL)

DETECTING SUSPICIOUS DATA ACCESS BY A ROGUE CLOUD RESOURCE - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240137376 titled 'DETECTING SUSPICIOUS DATA ACCESS BY A ROGUE CLOUD RESOURCE

Simplified Explanation

The techniques described in this patent application aim to prevent the creation of rogue resources within a cloud computing environment, such as a rogue serverless function integrating with a cloud-based database to perform malicious operations like data exfiltration. By detecting and analyzing key retrieval requests for anomalies, anomalous requests can be stored and used to identify and suspend resource creation requests that match these anomalies, thus preventing potential security threats.

  • Key retrieval requests are analyzed for anomalies.
  • Anomalous requests are stored in a pool.
  • Pool of anomalous requests is searched for a match when a resource creation request is received.
  • Resource creation request may be suspended pending further security review.

Potential Applications

The technology described in this patent application could be applied in various cloud computing environments to enhance security measures and prevent unauthorized access or malicious activities.

Problems Solved

This technology addresses the issue of rogue resources being created within a cloud computing environment, which could lead to security breaches, data exfiltration, and other malicious activities.

Benefits

The benefits of this technology include improved security, early detection of potential threats, prevention of unauthorized access, and enhanced overall protection of cloud-based resources.

Potential Commercial Applications

Potential commercial applications of this technology could include cloud service providers, cybersecurity companies, and organizations looking to strengthen their cloud security measures.

Possible Prior Art

One possible prior art could be the use of anomaly detection techniques in cybersecurity to identify and prevent security threats within a network or system.

Unanswered Questions

How does this technology impact the performance of cloud computing environments?

This article does not provide information on how the implementation of these security measures may affect the performance or efficiency of cloud computing environments.

Are there any potential limitations or drawbacks to this technology?

The article does not address any potential limitations or drawbacks that may arise from the implementation of these security measures within a cloud computing environment.


Original Abstract Submitted

the techniques disclosed herein prevent a rogue resource from being created within a cloud computing environment. for example, a rogue serverless function may be prevented from integrating with a cloud-based database, thereby preventing the serverless function from performing malicious operations such as low-rate data exfiltration. the rogue serverless function is detected before it is installed, heading off the attack completely. in some configurations, a key retrieval request is received. parameters of the key retrieval request are analyzed for anomalies, and anomalous key retrieval requests are stored in a pool. then, when a request to create a resource is received, the pool of anomalous key retrieval requests is searched for a match. when a match is found, the resource creation request may be suspended pending a further security review.