Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_59c6a921f33fe0adc58c2b6177184515 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-56 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F16-9024 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F16-9014 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1441 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0442 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3247 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3239 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1416 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-566 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-554 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-52 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L29-06 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-56 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-18 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-52 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F12-14 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04N7-167 |
filingDate |
2017-05-22-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_06161823e57fdeed13f69e7b93cdf874 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_9fcdaf895e609030bf755d0d3520850d |
publicationDate |
2017-12-07-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
WO-2017210005-A1 |
titleOfInvention |
Systems and methods for detecting attacks in big data systems |
abstract |
Various examples of methods and systems are provided for an attack detection system that can detect attacks in big data systems. The attack detection system can include security modules coupled to data nodes of the big data system. The attack detection system can identify a process executing on the respective data node. A process signature can be generated for the process executing on the data node. A determination of whether a big data system is being attacked can be based at least in part on a comparison of the process signature with at least one other process signature for the same process executing on another security module. The other process signatures are received via secure communication from the other security module. |
isCitedBy |
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-110830416-A http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2022094708-A1 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-108737156-A http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-116361256-B http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11657148-B2 http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-116361256-A |
priorityDate |
2016-05-31-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |