System and method for repairing vulnerabilities of objects connected to a data network
First Claim
1. A method for repairing vulnerabilities of objects connected to a data network, the method comprising:
- transmitting, by a hardware processor, a request throughout the data network;
obtaining responses from a plurality of accessible objects in the data network;
determining, by the hardware processor, whether access to the plurality of accessible objects is available using a plurality of access methods;
when access to an object is available, accessing the object and obtaining a list of resources of the accessed object;
crawling through an administrative console of the object to determine a list of resources of the object and open ports of the object, each resource comprising an adjustable parameter and/or an attribute of the object;
comparing, by the hardware processor, the list of resources and the open ports with a database of resources with associated network vulnerabilities to identify one or more resources from the list of resources that have a similar vulnerable status as a vulnerable resource in the database of resources with associated network vulnerabilities;
identifying one or more repair actions from the database of resources with associated network vulnerabilities based on the identified one or more resources; and
repairing the network vulnerabilities associated with the accessed object by applying the one or more repair actions associated with the vulnerable resource to the accessed object.
0 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are systems and methods for repairing vulnerabilities of objects connected to a data network. An example method includes transmitting a request throughout the data network, obtaining responses from a plurality of accessible objects in the data network, attempting to obtain access to the plurality of accessible objects using a plurality of access methods, when access to an object is obtained, obtaining a list of resources of the accessed object, comparing the list of resources with a database of vulnerabilities to determine to identify one or more resources from the list of resources that have a similar vulnerable status as a vulnerable resource in the database of vulnerabilities and repairing vulnerabilities associated with the accessed object by applying repairs associated with the vulnerable resource to the accessed object.
14 Citations
21 Claims
-
1. A method for repairing vulnerabilities of objects connected to a data network, the method comprising:
-
transmitting, by a hardware processor, a request throughout the data network; obtaining responses from a plurality of accessible objects in the data network; determining, by the hardware processor, whether access to the plurality of accessible objects is available using a plurality of access methods; when access to an object is available, accessing the object and obtaining a list of resources of the accessed object; crawling through an administrative console of the object to determine a list of resources of the object and open ports of the object, each resource comprising an adjustable parameter and/or an attribute of the object; comparing, by the hardware processor, the list of resources and the open ports with a database of resources with associated network vulnerabilities to identify one or more resources from the list of resources that have a similar vulnerable status as a vulnerable resource in the database of resources with associated network vulnerabilities; identifying one or more repair actions from the database of resources with associated network vulnerabilities based on the identified one or more resources; and repairing the network vulnerabilities associated with the accessed object by applying the one or more repair actions associated with the vulnerable resource to the accessed object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 21)
-
-
8. A system for repairing vulnerabilities of objects connected to a data network, the system comprising:
a hardware processor configured to; transmit a request throughout the data network; obtain responses from a plurality of accessible objects in the data network; determine whether access to the plurality of accessible objects is available using a plurality of access methods; when access to an object is available, access the object and obtain a list of resources of the accessed object; crawl through an administrative console of the object to determine a list of resources of the object and open ports of the object, each resource comprising an adjustable parameter and/or an attribute of the object; compare the list of resources and the open ports with a database of resources with associated network vulnerabilities to identify one or more resources from the list of resources that have a similar vulnerable status as a vulnerable resource in the database of resources with associated network vulnerabilities; identifying one or more repair actions from the database of resources with associated network vulnerabilities based on the identified one or more resources; and repair the network vulnerabilities associated with the accessed object by applying the one or more repair actions associated with the vulnerable resource to the accessed object. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A non-transitory computer-readable medium storing instructions therein for repairing vulnerabilities of objects connected to a data network, the instructions comprising:
-
transmitting a request throughout the data network; obtaining responses from a plurality of accessible objects in the data network; determining whether access to the plurality of accessible objects is available using a plurality of access methods; when access to an object is available, accessing the object and obtaining a list of resources of the accessed object; crawling through an administrative console of the object to determine a list of resources of the object and open ports of the object, each resource comprising an adjustable parameter and/or an attribute of the object; comparing the list of resources and the open ports with a database of resources with associated network vulnerabilities to identify one or more resources from the list of resources that have a similar vulnerable status as a vulnerable resource in the database of resources with associated network vulnerabilities; identifying one or more repair actions from the database of resources with associated network vulnerabilities based on the identified one or more resources; and repairing vulnerabilities associated with the accessed object by applying the one or more repair actions associated with the vulnerable resource to the accessed object. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification