SYSTEM AND METHOD FOR THREAT DETECTION THROUGH DATA STORAGE ANALYSIS

Methods and systems for managing data access based threats are disclosed. To manage the data access based threats, a data processing system may include a network interface controller (NIC). The network interface controller may present emulated storages that may be used for data storage. The emulated...

Full description

Saved in:
Bibliographic Details
Main Authors SHAH, MAUNISH A, GLIMCHER, BORIS, CHAWLA, GAURAV
Format Patent
LanguageEnglish
Published 25.04.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Methods and systems for managing data access based threats are disclosed. To manage the data access based threats, a data processing system may include a network interface controller (NIC). The network interface controller may present emulated storages that may be used for data storage. The emulated storage devices may utilize storage resources of storage devices. The NIC may actively screen for access patterns in use of the emulated storage devices that indicate compute complexes may be compromised. When doing so, the processing may be done locally on the NIC.
Bibliography:Application Number: US202218048657