Identifying a security vulnerability in a computer system

    公开(公告)号:US11983277B2

    公开(公告)日:2024-05-14

    申请号:US16513454

    申请日:2019-07-16

    IPC分类号: G06F21/57

    CPC分类号: G06F21/577 G06F2221/034

    摘要: Some examples relate to identifying a security vulnerability in a computer system. In an example, via a NAND flash memory, a computer system may be scanned to obtain information related to a software program, based on a rule set defined in a management controller (e.g., baseboard management controller (BMC)) on the computer system. The NAND flash memory may obtain metrics related to the software program via the BMC. The NAND flash memory may analyze the information related to the software program along with the metrics related to the software program to identify a security vulnerability in the computer system. The NAND flash memory may provide the information related to the security vulnerability in the computer system to the BMC.

    Workload aware security patch management

    公开(公告)号:US11562077B2

    公开(公告)日:2023-01-24

    申请号:US16844321

    申请日:2020-04-09

    摘要: Example implementations relate to method and system for securing a workload from a security vulnerability based on management of critical patches for the workload. The method includes obtaining information of existing patches for each of a plurality of infrastructure resources that are required to execute the workload, where the infrastructure resources are segregated as multiple layers. The method further includes determining dependency of the infrastructure resources across the multiple layers and identifying the security vulnerability related to the infrastructure resources. The method further includes evaluating perceived criticalities of first and second new patches for the security vulnerability based a workload weightage, a resource age of the infrastructure resources, and an actual criticality of the first and second new patches. Further, the method includes installing the first new patch followed by the second new patch on the infrastructure resources based on the perceived criticalities, in an order of the determined dependency.

    WORKLOAD AWARE SECURITY PATCH MANAGEMENT

    公开(公告)号:US20210319111A1

    公开(公告)日:2021-10-14

    申请号:US16844321

    申请日:2020-04-09

    IPC分类号: G06F21/57 G06F9/50 G06F8/65

    摘要: Example implementations relate to method and system for securing a workload from a security vulnerability based on management of critical patches for the workload. The method includes obtaining information of existing patches for each of a plurality of infrastructure resources that are required to execute the workload, where the infrastructure resources are segregated as multiple layers. The method further includes determining dependency of the infrastructure resources across the multiple layers and identifying the security vulnerability related to the infrastructure resources. The method further includes evaluating perceived criticalities of first and second new patches for the security vulnerability based a workload weightage, a resource age of the infrastructure resources, and an actual criticality of the first and second new patches. Further, the method includes installing the first new patch followed by the second new patch on the infrastructure resources based on the perceived criticalities, in an order of the determined dependency.

    IDENTIFYING A SECURITY VULNERABILITY IN A COMPUTER SYSTEM

    公开(公告)号:US20210019421A1

    公开(公告)日:2021-01-21

    申请号:US16513454

    申请日:2019-07-16

    IPC分类号: G06F21/57

    摘要: Some examples relate to identifying a security vulnerability in a computer system. In an example, via a NAND flash memory, a computer system may be scanned to obtain information related to a software program, based on a rule set defined in a management controller (e.g., baseboard management controller (BMC)) on the computer system. The NAND flash memory may obtain metrics related to the software program via the BMC. The NAND flash memory may analyze the information related to the software program along with the metrics related to the software program to identify a security vulnerability in the computer system. The NAND flash memory may provide the information related to the security vulnerability in the computer system to the BMC.

    Detection of event storms
    16.
    发明授权

    公开(公告)号:US11314573B2

    公开(公告)日:2022-04-26

    申请号:US16206989

    申请日:2018-11-30

    IPC分类号: G06F11/07 H04L41/0631

    摘要: In an example, a first number of events associated with a first event type that are received in the first time window is compared against a first threshold. The first event type is one of a plurality of event types, and each event type corresponds to an amount of resource consumed by an event associated with the event type. It is detected whether events associated with the first event type received in the first time window are part of an event storm based on the first number of events and the first threshold.

    SYSTEM AND METHOD FOR SECURE MANAGEMENT OF A RACK

    公开(公告)号:US20210243912A1

    公开(公告)日:2021-08-05

    申请号:US16779495

    申请日:2020-01-31

    IPC分类号: H05K7/14 G06F9/54 G08B25/00

    摘要: Example implementations relate to method and controller for secure management of a rack. The method includes generating a first unique identifier corresponding to a rack profile of the rack hosting rack devices including physical devices and logical devices, in accordance with a rack topology, wherein the rack profile is based on configuration of the rack devices and the rack topology. Further, the method includes receiving information corresponding to the rack profile of the rack from peripheral devices disposed in the rack, wherein the information is based on monitored condition of the rack devices and the rack topology. The method further includes generating a second unique identifier based on the information, and determining variation in the rack profile based on comparison of the first and second unique identifiers. Further, the method includes generating an alert signal in the rack, in response to determination of the variation in the rack profile.