Apparatus, methods and computer programs for identifying or managing vulnerabilities within a data processing network

作者: Shivakumara Venkateshamurthy , Tejasvi Aswathanarayana , Sudarshan Palliyil

DOI:

关键词: HackerResource (project management)VulnerabilityComputer scienceUploadHash functionData processingService (systems architecture)Computer securityWeb browser

摘要: Provided are methods, apparatus and computer programs for identifying vulnerabilities to viruses of hacking. Hash values computed stored resources on systems within a network. If first resource or collection (such as files comprising an operating system, Web Browser mail server) is associated with vulnerability, hash the compared identify which have vulnerability. Messages may be sent people responsible vulnerable systems, vulnerability removed by automatic downloading patches service packs.

参考文章(20)
Matt Bishop, An Overview of Computer Viruses in a Research Environment An Overview of Computer Viruses in a Research Environment. ,(1991)
Himabindu Pucha, Y. Charlie Hu, Saumitra M. Das, Exploiting the synergy between peer-to-peer and mobile ad hoc networks hot topics in operating systems. pp. 7- 7 ,(2003)
Lee Codel Lawson Tarbotton, Igor Muttik, Daniel Joseph Wolff, Data scanning for updatable predefined properties ,(2001)
Ari Hyppönen, Risto Siilasmaa, Urmas Rahu, Mikko Kuisha, Mikko Hyppönen, Computer virus screening ,(1998)
Tejasvi Aswathanarayana, Sudarshan Palliyil, Shivakumara Shamurthy, Apparatus, methods and computer programs for identifying matching resources within a data processing network ,(2003)