- Armonk NY, US Suzanne C. DEFFEYES - Weaverville NC, US Gary K. THORNTON - Carrollton TX, US Amir KHAN - Brookfield CT, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
H04L 29/06
Abstract:
Embodiments for managing computing network security by one or more processors are described. A signal that is representative of authorized anomalous behavior is received. The signal includes at least one of an identity and a type of activity associated with the authorized anomalous behavior. A security incident is detected. If the detected security incident corresponds to the authorized anomalous behavior, the generating of an alert in response to the detecting of the security incident is suppressed.
- ARMONK NY, US Amir Khan - Brookfield CT, US Charles S. Lingafelt - Durham NC, US Gary K. Thornton - Carrollton TX, US
International Classification:
G06Q 50/26 G06F 17/30
Abstract:
Embodiments include method, systems and computer program products for selective retention of data in a computational system. Aspects include receiving a monitored data element. Aspects also include assigning an initial storage ranking to the monitored data element to create a ranked data element. Aspects also include determining a threshold storage ranking. Aspects also include comparing the initial storage ranking to the threshold storage ranking. Aspects also include, based on the comparison indicating that the initial storage ranking is greater than the threshold storage ranking, storing the ranked data element in a long-term storage. Aspects also include based upon the comparison indicating that the initial storage ranking is less than the threshold storage ranking, discarding the ranked data element.