×

Historical exploit and vulnerability detection

  • US 10,454,963 B1
  • Filed: 08/01/2016
  • Issued: 10/22/2019
  • Est. Priority Date: 07/31/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method for improving security of networked information technology (“

  • IT”

    ) assets in an IT infrastructure, comprising;

    performing a vulnerability scan for one or more of the networked IT assets;

    for a detected vulnerability of a respective one of the networked IT assets, determining one or more observables that indicate exploitation of the detected vulnerability;

    searching a historic event log of the respective one of the networked IT assets for the one or more observables; and

    determining whether the detected vulnerability was exploited in a past attack at the respective one of the networked IT assets using results of the searching;

    wherein the determining the one or more observables that indicate exploitation of the detected vulnerability comprises;

    converting a result from the vulnerability scan into a STIX (structured threat information expression) language expression including a common vulnerability enumeration (CVE) value; and

    extracting the one or more observables from a vulnerability database using the STIX language expression.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×