Samsung electronics co., ltd. (20240134971). METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION simplified abstract

From WikiPatents
Revision as of 02:27, 26 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION

Organization Name

samsung electronics co., ltd.

Inventor(s)

Ilgu Hong of Santa Clara CA (US)

Changho Choi of San Jose CA (US)

METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240134971 titled 'METHOD AND SYSTEM FOR COMPUTATIONAL STORAGE ATTACK REDUCTION

Simplified Explanation

The abstract describes a method for identifying and classifying attacks from a user device on a computational storage device (CSD).

  • Computational storage device (CSD) and method for identifying attacks:
   * Receiving computational storage (CS) requests from a user device
   * Identifying CS requests as attacks
   * Comparing total attack value of user device to a threshold
   * Identifying user device as an attacker based on comparison

Potential Applications

This technology could be applied in cybersecurity systems to detect and prevent attacks on computational storage devices.

Problems Solved

1. Detection of attacks from user devices on computational storage devices 2. Identification of attackers based on attack patterns

Benefits

1. Improved security for computational storage devices 2. Early detection and prevention of attacks 3. Enhanced threat intelligence capabilities

Potential Commercial Applications

Enhancing cybersecurity systems with advanced attack detection capabilities

Possible Prior Art

Prior art in the field of cybersecurity and threat detection systems may exist, but specific examples are not provided in the abstract.

Unanswered Questions

=== How does the method handle false positives in identifying attacks from user devices? The abstract does not mention how the system distinguishes between legitimate user requests and actual attacks.

=== What measures are in place to protect user data and device integrity during the attack identification process? The abstract does not detail any safeguards or protocols to ensure that user data and device functionality are not compromised during the attack identification process.


Original Abstract Submitted

a computational storage device (csd) and a method thereof are provided. the method includes receiving, from a user device, a computational storage (cs) request, identifying the cs request as an attack, comparing a total attack value of the user device to a threshold, wherein the total attack value is based on a number of attacks received from the user device, and identifying the user device as an attacker based on the comparison.