[go: up one dir, main page]

GB2568965B - Software container application security - Google Patents

Software container application security Download PDF

Info

Publication number
GB2568965B
GB2568965B GB1720174.0A GB201720174A GB2568965B GB 2568965 B GB2568965 B GB 2568965B GB 201720174 A GB201720174 A GB 201720174A GB 2568965 B GB2568965 B GB 2568965B
Authority
GB
United Kingdom
Prior art keywords
application security
software container
container application
software
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
GB1720174.0A
Other versions
GB2568965A (en
GB201720174D0 (en
Inventor
Du Xiaofeng
El-Moussa Fadi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
British Telecommunications PLC
Original Assignee
British Telecommunications PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by British Telecommunications PLC filed Critical British Telecommunications PLC
Priority to GB1720174.0A priority Critical patent/GB2568965B/en
Publication of GB201720174D0 publication Critical patent/GB201720174D0/en
Publication of GB2568965A publication Critical patent/GB2568965A/en
Application granted granted Critical
Publication of GB2568965B publication Critical patent/GB2568965B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/049Temporal neural networks, e.g. delay elements, oscillating neurons or pulsed inputs

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Biophysics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Biomedical Technology (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Molecular Biology (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Virology (AREA)
  • Debugging And Monitoring (AREA)
GB1720174.0A 2017-12-04 2017-12-04 Software container application security Active GB2568965B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1720174.0A GB2568965B (en) 2017-12-04 2017-12-04 Software container application security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1720174.0A GB2568965B (en) 2017-12-04 2017-12-04 Software container application security

Publications (3)

Publication Number Publication Date
GB201720174D0 GB201720174D0 (en) 2018-01-17
GB2568965A GB2568965A (en) 2019-06-05
GB2568965B true GB2568965B (en) 2020-05-27

Family

ID=60950451

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1720174.0A Active GB2568965B (en) 2017-12-04 2017-12-04 Software container application security

Country Status (1)

Country Link
GB (1) GB2568965B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023109460A1 (en) * 2021-12-13 2023-06-22 International Business Machines Corporation Clustered container protection

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112764878B (en) * 2021-01-13 2024-04-23 中科曙光(南京)计算技术有限公司 A risk prediction method for big data all-in-one container cluster based on deep learning

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1814055A2 (en) * 2006-01-31 2007-08-01 Deutsche Telekom AG Improved method and system for detecting malicious behavioral patterns in a computer, using machine learning
US20170068816A1 (en) * 2015-09-04 2017-03-09 University Of Delaware Malware analysis and detection using graph-based characterization and machine learning
US20170116412A1 (en) * 2015-10-01 2017-04-27 Twistlock, Ltd. Profiling of spawned processes in container images and enforcing security policies respective thereof
CN106951783A (en) * 2017-03-31 2017-07-14 国家电网公司 A kind of Method for Masquerade Intrusion Detection and device based on deep neural network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1814055A2 (en) * 2006-01-31 2007-08-01 Deutsche Telekom AG Improved method and system for detecting malicious behavioral patterns in a computer, using machine learning
US20170068816A1 (en) * 2015-09-04 2017-03-09 University Of Delaware Malware analysis and detection using graph-based characterization and machine learning
US20170116412A1 (en) * 2015-10-01 2017-04-27 Twistlock, Ltd. Profiling of spawned processes in container images and enforcing security policies respective thereof
CN106951783A (en) * 2017-03-31 2017-07-14 国家电网公司 A kind of Method for Masquerade Intrusion Detection and device based on deep neural network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
arXiv; 06/07/16; USA; AHMAD, S. et al.; "Real-Time Anomaly Detection for Streaming Analytics"; 1-10 *
IEEE Access; 6; 30/01/18; Wang, C. et al.; "A Distributed Anomaly Detection System for In-Vehicle Network Using HTM"; 9091-9098. *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023109460A1 (en) * 2021-12-13 2023-06-22 International Business Machines Corporation Clustered container protection
GB2628723A (en) * 2021-12-13 2024-10-02 Ibm Clustered container protection
GB2628723B (en) * 2021-12-13 2025-01-22 Ibm Clustered container protection

Also Published As

Publication number Publication date
GB2568965A (en) 2019-06-05
GB201720174D0 (en) 2018-01-17

Similar Documents

Publication Publication Date Title
AP00971S1 (en) Container
AU201714611S (en) Container
GB2568965B (en) Software container application security
GB201709214D0 (en) Container
GB2568967B (en) Software container application encryption
GB2560742B (en) Container
GB201712748D0 (en) Container
GB201706977D0 (en) Container
GB201817800D0 (en) Container
GB2566016B (en) Container
GB2564382B (en) Container
GB201720474D0 (en) Container
AU201716600S (en) container
GB201715252D0 (en) Container
GB201714622D0 (en) Container
PH32017000762S1 (en) Container
PH32017000760S1 (en) Container
PH32017000761S1 (en) Container
PH32017000763S1 (en) Container
PH32017000764S1 (en) Container
GB201713445D0 (en) Container
AU201714612S (en) Container
AU201714613S (en) Container
AU201714614S (en) Container
GB201710612D0 (en) Container