×

Automated machine learning scheme for software exploit prediction

  • US 10,264,009 B2
  • Filed: 07/26/2016
  • Issued: 04/16/2019
  • Est. Priority Date: 07/26/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method for providing a threat level based on a prediction of a likelihood that a current vulnerability is employed in a customer computer network, the method comprising:

  • retrieving a prediction ensemble previously used by a prediction engine the prediction ensemble defining a combination of a plurality of prediction models and adjustments to be used by the prediction engineretraining the prediction ensemble previously used by the prediction engine the retraining evaluating a combined data set of historical vulnerability information and a modeling scheme (130) to generate a revised prediction ensemble based on a plurality of prediction models;

    retrieving current vulnerability information describing a current vulnerability from the plurality of data sources;

    processing the current vulnerability information describing the current vulnerability for use by the prediction engine;

    generating, using the prediction engine, a prediction based on the revised prediction ensemble and the processed current vulnerability information, the prediction identifying the likelihood that the current vulnerability is employed in a customer computer network;

    providing to an administrator of the customer computer network the threat level based on the prediction of the likelihood the current vulnerability is employed in the customer computer network, the threat level being based on predetermined thresholds defined by the administrator of the customer computer network;

    translating vulnerability descriptions from the historical vulnerability information to defined values;

    performing textual analysis to extract additional information from the historical vulnerability information;

    correlating the defined values, the additional information, and untranslated source information, andgenerating the combined data set based on the correlated defined values, the additional information, and the untranslated source information of the historical vulnerability information.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×