SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR EVALUATING POTENTIAL ATTACKS OF WORMS
First Claim
1-1. The computer program product according to claim 1, wherein the computer readable program when executed on a computer causes the computer to generate information representative of a worm entity by calculating a profile of a group of potential worms;
- wherein a profile of a group of potential worms is less detailed than at least one profile of a known worm.
6 Assignments
0 Petitions
Accused Products
Abstract
A method for evaluating potential attacks of worms, the method includes: associating, in response to information representative of a network and of worm entities, between worm entities and potential worm sources to provide associated worm sources; determining potential worm attacks that start from the associated worm sources; and evaluating at least one potential worm attack security metric associated with the potential worm attacks.
-
Citations
29 Claims
-
1-1. The computer program product according to claim 1, wherein the computer readable program when executed on a computer causes the computer to generate information representative of a worm entity by calculating a profile of a group of potential worms;
- wherein a profile of a group of potential worms is less detailed than at least one profile of a known worm.
-
2-2. The computer program product according to claim 1, wherein the computer readable program when executed on a computer causes the computer to generate information representative of potential worms capable of exploiting already published vulnerabilities based upon vulnerability attributes.
-
3-3. The computer program product according to claim 1, wherein the computer readable program when executed on a computer causes the computer to generate information representative of potential worms capable of exploiting vulnerabilities that are not published.
-
4-4. The computer program product according to claim 1, wherein the computer readable program when executed on a computer causes the computer to generate information representative of potential worms capable of exploiting vulnerabilities that are not published based upon service attributes.
-
18. A method for evaluating potential attacks of worms, the method comprising:
- associating, in response to information representative of a network and of worm entities, between worm entities and potential worm sources to provide associated worm sources;
determining potential worm attacks that start from the associated worm sources; and
evaluating at least one potential worm attack security metric associated with the potential worm attacks. - View Dependent Claims (19, 20, 21, 22, 23)
- associating, in response to information representative of a network and of worm entities, between worm entities and potential worm sources to provide associated worm sources;
-
24. A system for evaluating potential attacks of worms, the system includes:
- a memory unit adapted to store information representative of a network and of worm entities; and
a processor adapted to;
associate, in response to the information representative of a network and of worm entities, between worm entities and potential worm sources to provide associated worm sources;
determine potential worm attacks that start from the associated worm entities; and
evaluate at least one potential worm attack security metric associated with the potential worm attacks. - View Dependent Claims (25, 26, 27, 28, 29)
- a memory unit adapted to store information representative of a network and of worm entities; and
Specification