Netskope, Inc. (20240323221). SIMULATION AND VISUALIZATION OF MALWARE SPREAD THROUGH SHARING OF DATA OBJECTS IN CLOUD APPLICATIONS simplified abstract

From WikiPatents
Revision as of 06:00, 27 September 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

SIMULATION AND VISUALIZATION OF MALWARE SPREAD THROUGH SHARING OF DATA OBJECTS IN CLOUD APPLICATIONS

Organization Name

Netskope, Inc.

Inventor(s)

Sean Hittel of Calgary (CA)

Ravindra K. Balupari of San Jose CA (US)

SIMULATION AND VISUALIZATION OF MALWARE SPREAD THROUGH SHARING OF DATA OBJECTS IN CLOUD APPLICATIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240323221 titled 'SIMULATION AND VISUALIZATION OF MALWARE SPREAD THROUGH SHARING OF DATA OBJECTS IN CLOUD APPLICATIONS

Simplified Explanation: The technology described in the patent application involves simulating the spread of malware in cloud applications by analyzing data sharing between users and tracing connections to simulate the spread of malware based on these connections.

  • Tracing connections between users by constructing a directed graph based on sharing data for files shared via sync and share mechanisms of cloud applications.
  • Simulating the spread of malware based on the traced connections to simulate user exposure to, infection by, and transmission of the malware.
  • Creating connections through syncing and sharing files via the sync and share mechanisms.
  • Spreading malware by syncing and sharing infected files via the sync and share mechanisms.

Potential Applications: This technology can be used in cybersecurity to analyze and simulate the spread of malware in cloud applications, helping organizations understand potential vulnerabilities and improve their security measures.

Problems Solved: The technology addresses the need for advanced methods to analyze and simulate the spread of malware in cloud applications, providing insights into user exposure and potential infection pathways.

Benefits: - Enhanced cybersecurity measures - Improved understanding of malware spread in cloud applications - Proactive identification of vulnerabilities

Commercial Applications: The technology can be utilized by cybersecurity firms, cloud service providers, and organizations with sensitive data to enhance their security protocols and protect against malware threats.

Prior Art: Readers can explore prior research on malware propagation in cloud applications, graph theory in cybersecurity, and simulation techniques for cybersecurity threats to gain a deeper understanding of the technology.

Frequently Updated Research: Stay informed about the latest advancements in malware analysis, graph-based cybersecurity solutions, and simulation tools for cybersecurity threats to enhance the effectiveness of this technology.

Questions about Malware Spread Simulation in Cloud Applications: 1. How does this technology improve cybersecurity measures in cloud applications? 2. What are the key benefits of simulating malware spread based on user connections in cloud applications?


Original Abstract Submitted

the technology disclosed relates to simulating spread of a malware in cloud applications. in particular, the technology disclosed relates to accessing sharing data for files shared between users via sync and share mechanisms of cloud applications, tracing connections between the users by traversing a directed graph constructed based on the sharing data, and simulating spread of a malware based on the traced connections to simulate user exposure to, infection by, and transmission of the malware. the connections are created as a result of syncing and sharing the files via the sync and share mechanisms. the malware is spread by syncing and sharing of infected ones of the files via the sync and share mechanisms.