Systems and Methods for Contextual and Cross Application Threat Detection and Prediction in Cloud Applications

作者: Ganesh Kirti , Kamalendu Biswas , Sumedha Sumedha Nalin Perera , Raja S. Alomari , Prakash Gurumurthy

DOI:

关键词:

摘要: Systems and methods for contextual cross application threat detection in cloud applications accordance with embodiments of the invention are disclosed. In one embodiment, a method detecting activity using past data from includes receiving concerning actions performed by user account associated within monitored application, external about that does not concern where is retrieved outside deriving baseline profile associating account, determining likelihood anomalous profile.

参考文章(26)
Eric Fleischman, Duane E. Wald, Donald G. Peterson, Systems and methods for cloud data security ,(2014)
Rita H. Wouhaybi, Mark D. Yarvis, James R. Blakley, John B. Vicente, Hong Li, Cloud-assisted method and service for application security verification ,(2013)
Charles S. Lingafelt, David P. Merrill, Wesley J. Ho, Linda N. Betz, Providing security services within a cloud computing environment ,(2010)
Shun Xiang Yang, Fan Jing Meng, Lin Luo, Yu Zhang, Method and apparatus for security validation ,(2010)
Jason R. McGee, Li Yi, Yu Zhang, Bo Gao, Ling Lan, Steven D. Ims, Non-intrusive method and apparatus for automatically dispatching security rules in cloud environment ,(2012)
Bruce McCorkendale, William E. Sobel, Dynamic security policy through use of empirical security events ,(2005)
Ganesh Kirti, Kamalendu Biswas, Ramana Rao Satyasai Turlapati, Rohit Gupta, Systems and methods for cloud security monitoring and threat intelligence ,(2014)
Alex Hrybyk, John S. Morrison, Eric B. Jones, Mark Lohrum, Kathleen M. Kauffman, Kenneth R. Good, Kyle J. Roach, Method and apparatus for context aware mobile security ,(2012)
Ashvinkumar J. Sanghvi, Ilarie Letca, Ferit Findik, Vitaly Voloshin, Brijesh D. Bhatia, Monitoring federation for cloud based services and applications ,(2010)