18300802. VIRTUAL ENCAPSULATED INSTANCES FOR MITIGATION OF CYBERATTACKS simplified abstract (International Business Machines Corporation)

From WikiPatents
Revision as of 05:32, 18 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

VIRTUAL ENCAPSULATED INSTANCES FOR MITIGATION OF CYBERATTACKS

Organization Name

International Business Machines Corporation

Inventor(s)

Mauro Marzorati of Lutz FL (US)

Paul Llamas Virgen of Guadalajara (MX)

Pedro Mauricio Manjarrez Gutierrez of Guadalajara (MX)

Karla Paulina Calderon Vaca of Zapopan (MX)

VIRTUAL ENCAPSULATED INSTANCES FOR MITIGATION OF CYBERATTACKS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18300802 titled 'VIRTUAL ENCAPSULATED INSTANCES FOR MITIGATION OF CYBERATTACKS

Simplified Explanation

The patent application describes a method for mitigating cyberattacks by responding to detected attacks on a system, identifying compromised software components, simulating risks associated with these components, encapsulating them in a secure environment, and redirecting malicious network traffic to this environment.

  • Responding to verification of a detected attack on a system
  • Detecting modifications to software components made by malicious network traffic
  • Identifying the malicious network traffic
  • Determining compromised software components
  • Performing digital twin simulation to evaluate risks
  • Creating an encapsulated environment
  • Provisioning software components to encapsulate
  • Redirecting malicious network traffic to the encapsulated environment

Potential Applications

This technology can be applied in various industries where cybersecurity is crucial, such as finance, healthcare, and government sectors. It can also be used by organizations to protect their systems and data from cyber threats.

Problems Solved

This technology addresses the problem of mitigating cyberattacks and protecting systems from malicious network traffic. By identifying compromised software components and redirecting attacks to a secure environment, it helps prevent potential damage and data breaches.

Benefits

The benefits of this technology include enhanced cybersecurity measures, improved threat detection and response capabilities, and increased protection of sensitive information. It can help organizations minimize the impact of cyberattacks and maintain the integrity of their systems.

Commercial Applications

"Mitigating Cyberattacks through Software Component Encapsulation" can be utilized by cybersecurity companies, IT departments, and organizations looking to enhance their security measures. It has implications for the cybersecurity market and can be a valuable tool in safeguarding digital assets.

Questions about Mitigating Cyberattacks through Software Component Encapsulation

How does this technology improve upon existing cybersecurity measures?

This technology enhances cybersecurity by identifying compromised software components and redirecting attacks to a secure environment, effectively isolating threats and minimizing potential damage.

What are the potential implications of this technology for the cybersecurity industry?

This technology has the potential to revolutionize cybersecurity practices by providing a proactive approach to mitigating cyberattacks and protecting systems from malicious network traffic.


Original Abstract Submitted

According to one embodiment, a method, computer system, and computer program product for mitigating cyberattacks is provided. The present invention may include responding to a verification of a detected attack on a system, by detecting one or more modifications to one or more software components made by malicious network traffic; identifying the malicious network traffic; determining one or more compromised software components based on the detected one or more modifications and the identified malicious network traffic; performing digital twin simulation to evaluate one or more risks associated with the one or more compromised software components in order to identify the one or more software components to encapsulate; creating an encapsulated environment; provisioning the one or more software components to encapsulate to the encapsulated environment; and redirecting the malicious network traffic to the encapsulated environment.