Microsoft Technology Licensing, LLC (20240330445). MALICIOUS ACTIVITY DETECTION FOR CLOUD COMPUTING PLATFORMS simplified abstract
Contents
MALICIOUS ACTIVITY DETECTION FOR CLOUD COMPUTING PLATFORMS
Organization Name
Microsoft Technology Licensing, LLC
Inventor(s)
Shalom Shay Shavit of Yehud (IL)
Ram Haim Pliskin of Rishon Lezion (IL)
Daniel Davraev of Or Yehuda (IL)
MALICIOUS ACTIVITY DETECTION FOR CLOUD COMPUTING PLATFORMS - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240330445 titled 'MALICIOUS ACTIVITY DETECTION FOR CLOUD COMPUTING PLATFORMS
Simplified Explanation: The patent application discusses the detection of malicious activity in cloud computing platforms by analyzing control plane operations executed by cloud applications associated with entities. By generating property sets and calculating malicious activity scores, the system can identify potentially malicious operations and generate security alerts.
Key Features and Innovation:
- Detection of malicious activity in cloud computing platforms
- Analysis of control plane operations executed by cloud applications
- Generation of property sets based on logs
- Calculation of malicious activity scores to determine anomalous operations
- Generation of security alerts for potentially malicious activities
Potential Applications: This technology can be applied in various industries where cloud computing platforms are used, such as cybersecurity, IT management, and data protection.
Problems Solved: The technology addresses the challenge of detecting and preventing malicious activity in cloud computing platforms, enhancing overall security and protecting sensitive data.
Benefits:
- Improved security in cloud computing environments
- Early detection of potentially malicious activities
- Enhanced protection of sensitive information
- Efficient monitoring and alert generation for anomalous operations
Commercial Applications: Title: Cloud Security Monitoring System This technology can be commercialized as a cloud security monitoring system for businesses, IT service providers, and organizations handling sensitive data. It can offer real-time threat detection and response capabilities, enhancing overall cybersecurity posture.
Prior Art: While specific prior art related to this technology may not be mentioned in the abstract, researchers can explore existing literature on cloud security, anomaly detection, and threat intelligence to understand the background of this innovation.
Frequently Updated Research: Researchers in the field of cloud security and anomaly detection may conduct ongoing studies to enhance the accuracy and efficiency of malicious activity detection in cloud computing platforms. Stay updated on recent advancements in threat detection technologies to leverage the latest innovations in this area.
Questions about Malicious Activity Detection in Cloud Computing Platforms: 1. How does the system determine the malicious activity score for control plane operations? 2. What are the key benefits of using this technology for cloud security monitoring?
Original Abstract Submitted
malicious activity detection is enabled for cloud computing platforms. a first log comprising a record of a first control plane operation executed by a cloud application associated with an entity is obtained. a plurality of second logs, each comprising a record of a respective second control plane operation executed in association with the entity, is obtained. a first property set is generated based on the first log and a second property set is generated based on the plurality of second logs. a malicious activity score indicative of a degree to which the first control plane operation is anomalous with respect to the entity is determined based on the first property set and the second property set. a determination that the first control plane operation potentially corresponds to malicious activity is made based on the malicious activity score and a security alert is generated.