MY193224A - A system and method for enabling vulnerability detection of cloud container based service deployment - Google Patents
A system and method for enabling vulnerability detection of cloud container based service deploymentInfo
- Publication number
- MY193224A MY193224A MYPI2018001830A MYPI2018001830A MY193224A MY 193224 A MY193224 A MY 193224A MY PI2018001830 A MYPI2018001830 A MY PI2018001830A MY PI2018001830 A MYPI2018001830 A MY PI2018001830A MY 193224 A MY193224 A MY 193224A
- Authority
- MY
- Malaysia
- Prior art keywords
- vulnerabilities
- present
- enabling
- vulnerability detection
- vectorized
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention relates to a system and method for enabling vulnerability detection of cloud container based service. In particular, the present invention relates to a system and method that enables efficient and intelligent flow of vulnerabilities detection utilizing at least one vulnerability detection server (104) comprising at least one Data Extractor (118) for generating vectorized document of each container, at least one Data Binder (120) for generating vectorized document of each common vulnerabilities and exposures, at least one Data Converter (122) for converting vectorized documents of each container and vectorized documents of each common vulnerabilities of exposures and at least on Core module (124) for relevancy comparison. The present invention provides time to time prediction of vulnerabilities by utilizing machine learning instructions. The present invention allows vulnerabilities detection during dynamic runtime stage and static image. The most illustrative drawing is FIG. 1.0.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2018001830A MY193224A (en) | 2018-10-30 | 2018-10-30 | A system and method for enabling vulnerability detection of cloud container based service deployment |
PCT/MY2019/050078 WO2020091591A1 (en) | 2018-10-30 | 2019-10-16 | A system and method for enabling vulnerability detection of cloud container based service deployment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2018001830A MY193224A (en) | 2018-10-30 | 2018-10-30 | A system and method for enabling vulnerability detection of cloud container based service deployment |
Publications (1)
Publication Number | Publication Date |
---|---|
MY193224A true MY193224A (en) | 2022-09-26 |
Family
ID=70462651
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI2018001830A MY193224A (en) | 2018-10-30 | 2018-10-30 | A system and method for enabling vulnerability detection of cloud container based service deployment |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY193224A (en) |
WO (1) | WO2020091591A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112667348B (en) * | 2020-12-19 | 2021-10-29 | 飞算数智科技(深圳)有限公司 | MySQL containerization method and system and computer equipment |
US12314387B2 (en) | 2022-03-29 | 2025-05-27 | Dazz, Inc. | Systems and methods for cybersecurity alert deduplication, grouping, and prioritization |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150207811A1 (en) * | 2012-07-31 | 2015-07-23 | Hewlett-Packard Development Company, L.P. | Vulnerability vector information analysis |
US9928369B2 (en) * | 2015-02-09 | 2018-03-27 | Cisco Technologies, Inc. | Information technology vulnerability assessment |
US9825982B1 (en) * | 2016-04-29 | 2017-11-21 | Ciena Corporation | System and method for monitoring network vulnerabilities |
US10264009B2 (en) * | 2016-07-26 | 2019-04-16 | Booz Allen Hamilton Inc. | Automated machine learning scheme for software exploit prediction |
US9977898B1 (en) * | 2016-10-31 | 2018-05-22 | International Business Machines Corporation | Identification and recovery of vulnerable containers |
-
2018
- 2018-10-30 MY MYPI2018001830A patent/MY193224A/en unknown
-
2019
- 2019-10-16 WO PCT/MY2019/050078 patent/WO2020091591A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2020091591A1 (en) | 2020-05-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG10201901079UA (en) | Method of and server for detecting associated web resources | |
PH12019501169B1 (en) | Multi-blockchain network data processing method, apparatus, and server | |
MX2020013580A (en) | Apparatus and method for image processing, and system for training neural network. | |
HK1249633A1 (en) | A computer implemented method for processing a financial transaction and a system therefor | |
BR112022005029A2 (en) | SYSTEM TO COLLECT AND IDENTIFY SKIN CONDITIONS FROM IMAGES AND EXPERT KNOWLEDGE | |
WO2015200110A3 (en) | Techniques for machine language translation of text from an image based on non-textual context information from the image | |
US9418241B2 (en) | Unified platform for big data processing | |
CA2690081A1 (en) | Migration of legacy applications | |
EP2645247A3 (en) | Self-evolving computing service template translation | |
US9766868B2 (en) | Dynamic source code generation | |
EP3101597A3 (en) | Reading comprehension neural networks | |
SG11201804033RA (en) | Information recommendation method and apparatus | |
MY166219A (en) | Information processing device, information processing system, control method, and storage medium | |
BR112021006438A2 (en) | apparatus and method for combined visual intelligence | |
US11588753B2 (en) | Methods and systems for generating deployment architecture and template | |
GB2602762A (en) | Hypernym detection using strict partial order networks | |
GB2552598A (en) | Images for query answers | |
MY193224A (en) | A system and method for enabling vulnerability detection of cloud container based service deployment | |
MX384756B (en) | METHOD FOR CLASSIFYING THE AUTHORSHIP OF A PAINTING AND ITS CORRESPONDING USE. | |
BR112022011264A2 (en) | SMART CONVERSION OF INTERNET DOMAIN NAMES INTO VECTOR EMBODIMENTS | |
MY189491A (en) | Database data modification request processing method and apparatus | |
SA123450211B1 (en) | Systems, Devices, and Methods for Generating Cybersecurity Threat Intelligence | |
WO2018048546A8 (en) | Method and system for browser-integrated generation of controlled payment numbers | |
EP3185134A3 (en) | Computing device and corresponding method for generating data representing text | |
BR112022002204A2 (en) | ADAPTIVE RESOLUTION MANAGEMENT FORECAST SIZING |