US 11,775,653 B2
Security configuration determination
Mark Shackleton, London (GB); and Fadi El-Moussa, London (GB)
Assigned to BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY, London (GB)
Appl. No. 16/762,283
Filed by BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY, London (GB)
PCT Filed Oct. 11, 2018, PCT No. PCT/EP2018/077782
§ 371(c)(1), (2) Date May 7, 2020,
PCT Pub. No. WO2019/091698, PCT Pub. Date May 16, 2019.
Claims priority of application No. 17200479 (EP), filed on Nov. 7, 2017.
Prior Publication US 2021/0182403 A1, Jun. 17, 2021
Int. Cl. G06F 21/57 (2013.01); G06F 21/54 (2013.01); G06N 20/00 (2019.01); G06F 9/455 (2018.01); G06F 18/214 (2023.01)
CPC G06F 21/577 (2013.01) [G06F 9/45558 (2013.01); G06F 18/214 (2023.01); G06F 21/54 (2013.01); G06N 20/00 (2019.01); G06F 2009/45587 (2013.01)] 7 Claims
OG exemplary drawing
 
1. A computer implemented method to determine a security configuration for a target virtual machine (VM) in a virtualized computing environment, the method comprising:
training a machine learning algorithm to determine a vector of security vulnerabilities for the target VM based on a vector of configuration characteristics for the target VM, the machine learning algorithm being trained using training examples, each of the training examples including a configuration for a training VM and an associated vulnerability vector based on an observed security occurrence at the training VM, wherein each of the training examples further includes an identification of one of a set of security configurations for the training VM;
selecting at least a subset of the set of security configurations and, for each security configuration in the selected subset, executing the machine learning algorithm with the vector of configuration characteristics for the target VM and an identification of the security configuration in the selected subset, so as to generate a set of vulnerability vectors including a vulnerability vector for each security configuration in the selected subset applied to the target VM; and
selecting a security configuration for the target VM based on the set of vulnerability vectors.