Polymorphic security policy action

作者: Siying Yang

DOI:

关键词: State (computer science)Computer securityAction (philosophy)Security policyComputer scienceSelection (relational algebra)

摘要: In one embodiment, a method of improving the security computing device comprises using that has received or more messages have been determined as unauthorized, obtaining plurality state data values from device, messages, and second computer; before admitting to communications network is configured protect: pseudo-random selection logic, based on values, pseudo-randomly selecting particular policy action among different stored actions; acting upon action; wherein performed devices.

参考文章(169)
Martin A. Nemzow, Ron M. Redlich, Digital information infrastructure and method ,(2009)
Mark Alexander McGloin, Olgierd Pieczul, Mary Ellen Zurko, Method and apparatus for context-aware output escaping using dynamic content marking ,(2010)
Richard Mischook, Colin Woods, Systems and methods for modifying webpage data ,(2012)
Colin Hung, Zheng Han, Cecil Leung, Systems and methods for redacting sensitive data entries ,(2011)
Chaitrali Amrutkar, Patrick Gerard Traynor, Young Seuk Kim, Systems and methods for detecting malicious mobile webpages ,(2014)
Dong Jun Lan, Meng Ye, Hai Ping Li, Ying Chen, Long Cheng, Apparatus and method for optimizing and differentiating web page browsing ,(2008)
Michael Boodaei, Amit Klein, Detection of phishing attempts ,(2012)
Michael Boodaei, Amit Klein, Method for rendering password theft ineffective ,(2007)
Gad S. Sheaffer, Shimon Gruper, David Hirshberg, Mordehai Margalit, Vlad Grigore Dabija, Shmuel Ur, Malware attack prevention using block code permutation ,(2012)