-
公开(公告)号:US10581859B2
公开(公告)日:2020-03-03
申请号:US15670196
申请日:2017-08-07
Applicant: International Business Machines Corporation
Inventor: Ashish Kundu , Byung Chul Tak
Abstract: Embodiments of the present invention provide systems and methods for thwarting attempts at the unauthorized access to the restricted resources within the target server in a multi-node system. Real-time detection of the user ID and thread ID associated with attempts to access the restricted resources within the target server in a multi-node system is achieved by analyzing causality, message queue, and event-driven patterns.
-
公开(公告)号:US20190272686A1
公开(公告)日:2019-09-05
申请号:US15909728
申请日:2018-03-01
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Ashish Kundu , Ruchi Mahindru , Valentina Salapura , Manas R. Kumar Singh
IPC: G07C5/08
Abstract: A computer-implemented method includes obtaining fault information regarding a fault associated with a first drone. The computer-implemented method additionally includes obtaining context parameter data of the first drone. The computer-implemented method additionally includes, responsive to obtaining the fault information and the context parameter data, determining to apply a first test case of a plurality of test cases based on a first risk value determined for the first test case using the context parameter data. The first test case is associated with the fault. The computer-implemented method additionally includes causing the first drone to initiate execution of the first test case.
-
公开(公告)号:US20190121355A1
公开(公告)日:2019-04-25
申请号:US15787756
申请日:2017-10-19
Applicant: International Business machines Corporation
Inventor: Michael S. Gordon , James R. Kozloski , Ashish Kundu , Clifford A. Pickover
Abstract: Using an imaging device of a user device associated with a public user, an image of an autonomous vehicle (AV) operating in an area is captured. The public user associated with the user device is other than an occupant or controller of the AV. Image processing of the image is performed to extract a set of visual characteristics of the AV. A visual characteristic in the set of visual characteristics is insufficient to uniquely identify the AV. From a set of AVs a subset of candidate AVs is selected where each candidate AV in the subset of candidate AVs matches within a tolerance at least one visual characteristic in the set of visual characteristics, the subset of candidate AVs including the AV. A stop command is sent to the AV, causing the AV to execute a stopping operation resulting in a change in a velocity of the AV.
-
公开(公告)号:US10193776B2
公开(公告)日:2019-01-29
申请号:US15823799
申请日:2017-11-28
Applicant: International Business Machines Corporation
Inventor: Arup Acharya , Ashish Kundu
IPC: H04L29/06 , H04L12/26 , H04L29/08 , H04L12/721 , H04L12/725
Abstract: A computer-implemented method of obfuscating communication traffic patterns may include detecting, at a first communications device, data communication sessions with a second communications device via the computer server using a network protocol. At the first device, a first traffic pattern is accessed based on the data communication sessions over a first predefined time period. At the first communications device, a second traffic pattern is accessed based on the data communication sessions over a second predefined time period that occurs after the first predefined time period. At the first communications device, based on a randomization process, a dummy data communication pattern is generated for transmission to the second communication devices, whereby the dummy data communication pattern is appended to the second traffic pattern for obfuscating a traffic pattern change between the first and the second traffic pattern at the computer server used to establish the communication sessions.
-
公开(公告)号:US20180361250A1
公开(公告)日:2018-12-20
申请号:US15626396
申请日:2017-06-19
Applicant: International Business Machines Corporation
Inventor: Kevin W. Brew , Michael S. Gordon , James R. Kozloski , Ashish Kundu , Clifford A. Pickover
Abstract: Embodiments of the invention are directed to a computer-implemented method for monitoring game activity of a game system. A non-limiting example of the method includes monitoring, by a processing device, game activity of the game system. The processing device determines characteristics of the game activity, along with expected characteristics of the game activity. The processing device analyzes the characteristics of the game activity and the expected characteristics of the game activity. Based at least in part on analyzing the characteristics of the game activity and the expected characteristics of the game activity, an entity that is controlling the game system is determined.
-
公开(公告)号:US20180330103A1
公开(公告)日:2018-11-15
申请号:US16041394
申请日:2018-07-20
Applicant: International Business Machines Corporation
Inventor: Suresh N. Chari , Ashish Kundu , Ian M. Molloy , Dimitrios Pendarakis , Josyula R. Rao
CPC classification number: G06F21/577 , G06F2221/034 , H04L41/12 , H04L63/1433
Abstract: Generating an attack graph to protect sensitive data objects from attack is provided. The attack graph that includes nodes representing components in a set of components of a regulated service and edges between nodes representing relationships between related components in the set of components is generated based on vulnerability and risk metrics corresponding to each component. A risk score is calculated for each component represented by a node in the attack graph based on sensitivity rank and criticality rank corresponding to each respective component. Risk scores are aggregated for each component along each edge path connecting a node of a particular component to a node of a related component. In response to determining that an aggregated risk score of a component is greater than or equal to a risk threshold, an action is performed to mitigate a risk to sensitive data corresponding to the component posed by an attack.
-
公开(公告)号:US10109195B2
公开(公告)日:2018-10-23
申请号:US15800214
申请日:2017-11-01
Applicant: International Business Machines Corporation
Inventor: Michael S. Gordon , James R. Kozloski , Ashish Kundu , Peter K. Malkin , Clifford A. Pickover
Abstract: A processor-implemented method and/or computer program product selectively blocks a self-driving vehicle's access to a roadway. A vehicle interrogation hardware device receives an autonomous capability signal from an approaching self-driving vehicle. One or more processors compare the predefined roadway conditions to current roadway conditions of the access-controlled roadway. In response to the predefined roadway conditions matching the current roadway conditions of the access-controlled roadway within a predetermined range, the processor(s) determine whether the level of autonomous capability of the approaching self-driving vehicle is adequate to safely maneuver the approaching self-driving vehicle through the current roadway conditions of the access-controlled roadway. In response determining that the level of autonomous capability of the self-driving vehicle is not adequate to safely maneuver the approaching self-driving vehicle through the current roadway conditions of the access-controlled roadway, an automatic barricade controlling device positions an automatic barricade to block the approaching self-driving vehicle from accessing the access-controlled roadway.
-
公开(公告)号:US20180285984A1
公开(公告)日:2018-10-04
申请号:US15471477
申请日:2017-03-28
Applicant: International Business Machines Corporation
Inventor: Naga A. Ayachitula , Mahesh Gajwani , Ashish Kundu , Abhishek Malvankar
Abstract: A method for utilizing data analytics to identify unauthorized consumption of content comprises obtaining social network activity data from one or more social networks. The obtained social network activity data is analyzed to identify one or more users involved with content associated with a content provider. A determination is made as to whether or not the one or more users are authorized to access the content based at least in part on the analysis.
-
公开(公告)号:US20180099669A1
公开(公告)日:2018-04-12
申请号:US15838500
申请日:2017-12-12
Applicant: International Business Machines Corporation
Inventor: Michael S. Gordon , James R. Kozloski , Ashish Kundu , Peter K. Malkin , Clifford A. Pickover
IPC: B60W30/182 , B60W40/04 , G05D1/00 , G05D1/02 , B60W30/095 , B60W50/00
CPC classification number: B60W30/182 , B60W30/0956 , B60W40/04 , B60W50/0098 , B60W2050/0014 , B60W2550/30 , B60W2550/408 , B60W2750/30 , B62D15/02 , G05D1/0214 , G05D2201/0213
Abstract: A method controls an operational mode of a self-driving vehicle (SDV). One or more physical detectors detect an erratically driven vehicle (EDV) that is being operated in an unsafe manner within a predetermined distance of an SDV that is initially being operated in an evasive autonomous mode. One or more processors retrieve traffic pattern data for other SDVs, and examine the traffic pattern data to 1) determine a first traffic flow of the other SDVs while operating in the evasive autonomous mode, and 2) determine a second traffic flow of the other SDVs while operating in a manual mode. In response to determining that the first traffic flow has a higher accident rate than the second traffic flow, an operational mode device changes the operational mode of the SDV from the evasive autonomous mode to the manual mode.
-
公开(公告)号:US20180091399A1
公开(公告)日:2018-03-29
申请号:US15823825
申请日:2017-11-28
Applicant: International Business Machines Corporation
Inventor: Arup Acharya , Ashish Kundu
IPC: H04L12/26 , H04L29/08 , H04L12/721 , H04L29/06
CPC classification number: H04L43/08 , H04L43/00 , H04L45/306 , H04L45/70 , H04L63/0421 , H04L63/10 , H04L63/1408 , H04L63/1475 , H04L65/1006 , H04L65/1069 , H04L67/10 , H04L67/14 , H04L67/148
Abstract: A computer-implemented method of obfuscating communication traffic patterns may include detecting, at a first communications device, data communication sessions with a second communications device via the computer server using a network protocol. At the first device, a first traffic pattern is accessed based on the data communication sessions over a first predefined time period. At the first communications device, a second traffic pattern is accessed based on the data communication sessions over a second predefined time period that occurs after the first predefined time period. At the first communications device, based on a randomization process, a dummy data communication pattern is generated for transmission to the second communication devices, whereby the dummy data communication pattern is appended to the second traffic pattern for obfuscating a traffic pattern change between the first and the second traffic pattern at the computer server used to establish the communication sessions.
-
-
-
-
-
-
-
-
-