首页>
外国专利>
Vulnerability analysis and segmentation of bring-your-own IoT devices
Vulnerability analysis and segmentation of bring-your-own IoT devices
展开▼
机译:自带物联网设备的漏洞分析和细分
展开▼
页面导航
摘要
著录项
相似文献
摘要
In one embodiment, a security device maintains a plurality of security enclaves for a computer network, each associated with a given level of security policies. After detecting a given device joining the computer network, the security device places the given device in a strictest security enclave of the plurality of security enclaves in response to joining the computer network. The security device then subjects the given device to joint adversarial training, where a control agent representing behavior of the given device is trained against an inciting agent, and where the inciting agent attempts to force the control agent to misbehave by applying destabilizing policies. Accordingly, the security device may determine control agent behavior during the joint adversarial training, and promotes the given device to a less strict security enclave of the plurality of enclaves in response to the control agent being robust against the attempts by the inciting agent.
展开▼