US8402529B1 | 2013-03-19 | |||
US20140096131A1 | 2014-04-03 | |||
US20100306849A1 | 2010-12-02 |
Claims Following is the claim for this invention: - 1. In this invention we have different applications running in a cloud deployment and these applications communicate over the network with other applications. Communication takes place with the help of messages and messages may contain virus programs, etc. which may cause application program execution to halt. Here we have Workflow Tracker Programs running on different virtual machines which tracks the workflow of the virtual machine when a message is received or sent and when it detects an incorrect workflow it halts the program executing it, logs the message which caused that workflow and sends the message to the Threat Visibility Engine running on a remote virtual machine in cloud along with the incorrect workflow that could have harmed the system. Threat Visibility Engine then analyses each message and its incorrect workflow, and logs what system violation could have occurred if the workflow was executed and what could have been the damages in terms of system performance. Also Workflow Tracker Program will also raise an alarm indicating the application program that has been halted which was executing the incorrect workflow. The above novel technique of providing visibility in different threats to different systems in cloud is the claim for this invention. |
In this invention we have different applications running in a cloud
deployment and these applications communicate over the network with other applications. Communication takes place with the help of messages and messages may contain virus programs, etc. which may cause application program execution to halt. Here we have Workflow Tracker Programs running on different virtual machines which tracks the workflow of the virtual machine when a message is received or sent and when it detects an incorrect workflow it halts the program executing it, logs the message which caused that workflow and sends the message to the Threat Visibility Engine running on a remote virtual machine in cloud along with the incorrect workflow that could have harmed the system. Threat Visibility Engine then analyses each message and its incorrect workflow, and logs what system violation could have occurred if the workflow was executed and what could have been the damages in terms of system performance. Also Workflow Tracker Program will also raise an alarm indicating the application program that has been halted which was executing the incorrect workflow.
Next Patent: EVENT BASED TASK SCHEDULER FOR CLOUD