Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
THREAT VISIBILITY ENGINE FOR CLOUD
Document Type and Number:
WIPO Patent Application WO/2019/202364
Kind Code:
A1
Abstract:
Here we have different applications running in a cloud deployment and these applications communicate over the network with other applications. Communication takes place with the help of messages and messages may contain virus programs, etc. which may cause application program execution to halt. Here we have Workflow Tracker Programs running on different virtual machines which tracks the workflow of the virtual machine when a message is received or sent and when it detects an incorrect workflow it halts the program executing it, logs the message which caused that workflow and sends the message to the Threat Visibility Engine running on a remote virtual machine in cloud along with the incorrect workflow that could have harmed the system.

Inventors:
SHARMA PRATIK (IN)
Application Number:
PCT/IB2018/052673
Publication Date:
October 24, 2019
Filing Date:
April 18, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
SHARMA PRATIK (IN)
International Classes:
G06F9/44; G06F15/16; H04L29/06
Foreign References:
US8402529B12013-03-19
US20140096131A12014-04-03
US20100306849A12010-12-02
Download PDF:
Claims:
Claims

Following is the claim for this invention: -

1. In this invention we have different applications running in a cloud

deployment and these applications communicate over the network with other applications. Communication takes place with the help of messages and messages may contain virus programs, etc. which may cause application program execution to halt. Here we have Workflow Tracker Programs running on different virtual machines which tracks the workflow of the virtual machine when a message is received or sent and when it detects an incorrect workflow it halts the program executing it, logs the message which caused that workflow and sends the message to the Threat Visibility Engine running on a remote virtual machine in cloud along with the incorrect workflow that could have harmed the system. Threat Visibility Engine then analyses each message and its incorrect workflow, and logs what system violation could have occurred if the workflow was executed and what could have been the damages in terms of system performance. Also Workflow Tracker Program will also raise an alarm indicating the application program that has been halted which was executing the incorrect workflow. The above novel technique of providing visibility in different threats to different systems in cloud is the claim for this invention.

Description:
Threat Visibility Engine for Cloud

In this invention we have different applications running in a cloud

deployment and these applications communicate over the network with other applications. Communication takes place with the help of messages and messages may contain virus programs, etc. which may cause application program execution to halt. Here we have Workflow Tracker Programs running on different virtual machines which tracks the workflow of the virtual machine when a message is received or sent and when it detects an incorrect workflow it halts the program executing it, logs the message which caused that workflow and sends the message to the Threat Visibility Engine running on a remote virtual machine in cloud along with the incorrect workflow that could have harmed the system. Threat Visibility Engine then analyses each message and its incorrect workflow, and logs what system violation could have occurred if the workflow was executed and what could have been the damages in terms of system performance. Also Workflow Tracker Program will also raise an alarm indicating the application program that has been halted which was executing the incorrect workflow.