US 12,328,336 B2
System and method for security management in distributed systems
Yehiel Zohar, Sderot (IL); Ofir Ezrielev, Be'er Sheva (IL); and Lee Serfaty, Be'er Sheva (IL)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Apr. 27, 2023, as Appl. No. 18/308,225.
Prior Publication US 2024/0364734 A1, Oct. 31, 2024
Int. Cl. H04L 29/06 (2006.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/1441 (2013.01) [H04L 9/3247 (2013.01); H04L 63/105 (2013.01); H04L 63/1425 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for managing security of a distributed system, the method comprising:
identifying a compromised data processing system of data processing systems of the distributed system;
identifying a portion of the data processing systems that may be also compromised based on a representation of the data processing systems in a hierarchy;
revising the hierarchy based on the portion of the data processing systems and the compromised data processing system to obtain a revised hierarchy;
refreshing security data for the data processing systems using the revised hierarchy; and
verifying communications obtained by the data processing systems using the refreshed security data.