A method and system are provided for managing a security threat in a
distributed system. A distributed element of the system detects and
reports suspicious activity to a threat management agent. The threat
management agent determines whether an attack is taking place and deploys
a countermeasure to the attack when the attack is determined to be taking
place. Another method and system are also provided for managing a
security threat in a distributed system. A threat management agent
reviews reported suspicious activity including suspicious activity
reported from at least one distributed element of the system, determines,
based on the reports, whether a pattern characteristic of an attack
occurred, and predicts when a next attack is likely to occur. Deployment
of a countermeasure to the predicted next attack is directed in a time
window based on when the next attack is predicted to occur.