Pereira, 2025 - Google Patents
Attack Framework for Kafka-based Event-driven ArchitecturesPereira, 2025
View PDF- Document ID
- 17650168512336861417
- Author
- Pereira N
- Publication year
External Links
Snippet
Nowadays the entire world is connected within itself. Not only can we sense a growth in the use of the internet as a whole, but also of cyber-threats, threatening to disrupt normal day-to- day use of software systems. Because of this, knowing what kinds of systems we use and …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chadwick et al. | A cloud-edge based data security architecture for sharing and analysing cyber threat information | |
Datta et al. | Valve: Securing function workflows on serverless computing platforms | |
US12126643B1 (en) | Leveraging generative artificial intelligence (‘AI’) for securing a monitored deployment | |
JP4789933B2 (en) | Apparatus and method for developing, testing and monitoring secure software | |
Almorsy et al. | Supporting automated vulnerability analysis using formalized vulnerability signatures | |
US12058160B1 (en) | Generating computer code for remediating detected events | |
US20240348654A1 (en) | Security policy analysis | |
Elahi et al. | A modeling ontology for integrating vulnerabilities into security requirements conceptual foundations | |
US12323449B1 (en) | Code analysis feedback loop for code created using generative artificial intelligence (‘AI’) | |
US12309185B1 (en) | Architecture for a generative artificial intelligence (AI)-enabled assistant | |
Das et al. | Security as Code: DevSecOps Patterns with AWS | |
CN112837194A (en) | Intelligent system | |
Kim et al. | Security challenges of intent-based networking | |
Cavalli et al. | Design of a secure shield for internet and web-based services using software reflection | |
Pace | Zero Trust networks with Istio | |
US12212585B2 (en) | Method, product, and system for analyzing a computer network to identify attack paths using a software representation that embodies network configuration and policy data for security management | |
Caracciolo | Policy as Code, how to automate cloud compliance verification with open-source tools | |
Pereira | Attack Framework for Kafka-based Event-driven Architectures | |
Nunes | Blended security analysis for web applications: Techniques and tools | |
Büchler | Semi-automatic security testing of web applications with fault models and properties | |
US12418555B1 (en) | Guiding query creation for a generative artificial intelligence (AI)-enabled assistant | |
US12219070B2 (en) | Method, product, and system for generating detection signatures based on attack paths in a computer network identified using a software representation that embodies network configuration and policy data for security management using detection signature templates | |
US12328322B2 (en) | Method, product, and system for network security management using software representation that embodies network configuration and policy data | |
US12348545B1 (en) | Customizable generative artificial intelligence (‘AI’) assistant | |
Pidlubnyi | Increasing Security and Reducing Risks Running Services in a Potential Containerized Environment While Meeting Regulatory Standards |