Samsung electronics co., ltd. (20240134971). METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION simplified abstract
Contents
- 1 METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION
Organization Name
Inventor(s)
Ilgu Hong of Santa Clara CA (US)
Changho Choi of San Jose CA (US)
METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240134971 titled 'METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION
Simplified Explanation
The abstract describes a method for identifying and classifying attacks from a user device on a computational storage device (CSD).
- Computational storage device (CSD) and method for identifying attacks:
* Receiving computational storage (CS) requests from a user device * Identifying CS requests as attacks * Comparing total attack value of user device to a threshold * Identifying user device as an attacker based on comparison
Potential Applications
This technology could be applied in cybersecurity systems to detect and prevent attacks on computational storage devices.
Problems Solved
1. Detection of attacks from user devices on computational storage devices 2. Identification of attackers based on attack patterns
Benefits
1. Improved security for computational storage devices 2. Early detection and prevention of attacks 3. Enhanced threat intelligence capabilities
Potential Commercial Applications
Enhancing cybersecurity systems with advanced attack detection capabilities
Possible Prior Art
Prior art in the field of cybersecurity and threat detection systems may exist, but specific examples are not provided in the abstract.
Unanswered Questions
=== How does the method handle false positives in identifying attacks from user devices? The abstract does not mention how the system distinguishes between legitimate user requests and actual attacks.
=== What measures are in place to protect user data and device integrity during the attack identification process? The abstract does not detail any safeguards or protocols to ensure that user data and device functionality are not compromised during the attack identification process.
Original Abstract Submitted
a computational storage device (csd) and a method thereof are provided. the method includes receiving, from a user device, a computational storage (cs) request, identifying the cs request as an attack, comparing a total attack value of the user device to a threshold, wherein the total attack value is based on a number of attacks received from the user device, and identifying the user device as an attacker based on the comparison.