• 首页
  • 英国
  • Computer-implemented security methods and systems

Computer-implemented security methods and systems

2022-12-14  |  百检 168浏览

作者:Daniel Bastos | Behnam Azvine | Fadi El-Moussa

发明人:Daniel Bastos | Behnam Azvine | Fadi El-Moussa

所有人:British Telecommunications public limited company 年:2022,

语种:英语

公开国家:GB 国家:英国

专利申请号:GB2011025-0 专利申请日期:2020-07-17

公开(公告)号:GB-2597909-A 公开日期:2022-02-16

分类号:G06F-21/55 国际主分类号:G06F-21/55 国际分类号:G06F-21/55 | G06F-21/82 | G06N-20/00

摘要:Abstract Title: Updating a network security policy according to changes in threat factor weighting coefficients.One method involves a machine learning algorithm updating weighting coefficients associated with threat factors, threat factors having values defined for requests for peripheral devices to connect to networked devices coupled to a secure network; updating a security policy associated with the secure network in respect of a particular threat factor when that threat factor’s weighting coefficient changes by more than a predetermined amount in a predetermined period; and automatically approving or denying requests for peripheral devices to connect to the networked devices in dependence on that policy. Another method involves obtaining a peripheral connection request profile, obtaining a threat score associated with the request, where the threat score is determined from a weighted combination of threat factors dependent on contents of a field of the profile and having a weighting coefficient; denying the request when the threat score is above a threshold, otherwise, obtaining a policy decision based on profile and secure network policy comparison and providing request approval or denial according to the policy decision. Storing the profile in a database in association with an approval/denial indication of the request, updating weighting coefficients in dependence on the database contents, and updating the policy in response to changing weighting coefficients.