System and method for resecuring distributed system responsive to compromise event

Methods and systems for securing distributed systems are disclosed. The distributed systems may include data processing systems subject to compromise by malicious entities. If compromised, the data processing systems may impair the services provided by the distributed system. To secure the distribut...

Full description

Saved in:
Bibliographic Details
Main Authors Zohar, Yehiel, Ezrielev, Ofir, Serfaty, Lee
Format Patent
LanguageEnglish
Published 19.08.2025
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Methods and systems for securing distributed systems are disclosed. The distributed systems may include data processing systems subject to compromise by malicious entities. If compromised, the data processing systems may impair the services provided by the distributed system. To secure the distributed systems, the data processing systems may implement a security framework. The security framework may utilize a hierarchy that defines authority for validating trusted entities. The hierarchy may vest authority across the distributed system, and may be based on a reputation (e.g., weighted reputation) of each of the data processing systems within the distributed system. The hierarchy may be dynamically updated over time as new information regarding data processing systems is discovered. If the reputation of a data processing system meets criteria, that data processing system may be treated as being compromised. Consequently, the impact of compromise of the data processing system may be limited by the distributed authority.
Bibliography:Application Number: US202318308241