SYSTEMS AND METHODS FOR MODIFYING NETWORK MAP ATTRIBUTES
First Claim
Patent Images
1. A method for assigning a vulnerability parameter to a device on a network, comprising:
- passively determining, responsive to a passively read packet, a vulnerability parameter for an operating system or service;
storing, responsive to the vulnerability parameter being passively determined, the vulnerability parameter in a host map associated with a network device;
modifying the vulnerability parameter which was passively determined; and
storing the modified vulnerability parameter in the host map, whereinthe vulnerability parameter is invalid or valid,when the vulnerability is invalid and a pre-defined change in the operating system or service occurs on the network device, a new vulnerability lookup is performed for the changed operating system or service and the vulnerability parameter is remapped from invalid to valid based on the new vulnerability lookup for the changed operating system or service.
2 Assignments
0 Petitions
Accused Products
Abstract
The disclosed systems and methods provide a user interface for modifying host configuration data that has been automatically and passively determined and for adding or modifying other parameters associated with a host. A host data table can store various parameters descriptive of a host including the applicability of specific vulnerabilities. If it is determined that one or more hosts should not be identified as associated with a specific vulnerability, a graphical user interface can be used to modify the vulnerability parameter.
-
Citations
7 Claims
-
1. A method for assigning a vulnerability parameter to a device on a network, comprising:
-
passively determining, responsive to a passively read packet, a vulnerability parameter for an operating system or service; storing, responsive to the vulnerability parameter being passively determined, the vulnerability parameter in a host map associated with a network device; modifying the vulnerability parameter which was passively determined; and storing the modified vulnerability parameter in the host map, wherein the vulnerability parameter is invalid or valid, when the vulnerability is invalid and a pre-defined change in the operating system or service occurs on the network device, a new vulnerability lookup is performed for the changed operating system or service and the vulnerability parameter is remapped from invalid to valid based on the new vulnerability lookup for the changed operating system or service. - View Dependent Claims (3, 4, 5, 6)
-
-
2. (canceled)
-
7-20. -20. (canceled)
Specification