SYSTEM TO TERMINATE MALICIOUS PROCESS IN A DATA CENTER

Example methods and systems for malicious process termination are described. In one example, a computer system may detect a first instance of a malicious network activity associated with a first virtualized computing instance. Termination of a first process implemented by the first virtualized compu...

Full description

Saved in:
Bibliographic Details
Main Author GAMBHIR PAREKH, MANISHA SAMEER
Format Patent
LanguageEnglish
Published 18.01.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Example methods and systems for malicious process termination are described. In one example, a computer system may detect a first instance of a malicious network activity associated with a first virtualized computing instance. Termination of a first process implemented by the first virtualized computing instance may be triggered, the first instance of the malicious network activity being associated with the first process. The computer system may obtain event information associated with the first process and/or the first instance of the malicious network activity, and trigger termination of a second process implemented by a second virtualized computing instance based on the event information. Examples of the present disclosure may be implemented to leverage the detection of the first instance of the malicious network activity to terminate both the first process and the second process, and to block a second instance of a malicious network activity associated with the second process.
Bibliography:Application Number: US202217958538