SYSTEM SECURITY EVALUATION
First Claim
Patent Images
1. A method, comprising:
- receiving, by a computing device, external activity data corresponding to a target system,where the external activity data comprises information corresponding to network-side information relating to the target system;
identifying, by the computing device, suspicious external activity, corresponding to the external activity data, based on an activity watchlist,where the activity watchlist comprises information corresponding to external activity systems associated with known sources of malicious activity; and
generating, by the computing device, a system security report based on the suspicious external activity identified.
1 Assignment
0 Petitions
Accused Products
Abstract
A computing device may receive external activity data corresponding to a target system. The external activity data may include information corresponding to network-side information relating to the target system. The computing device may identify suspicious external activity, corresponding to the external activity data, based on an activity watchlist. The activity watchlist may include information corresponding to external activity systems associated with known sources of malicious activity. The computing device may generate a system security report based on the suspicious external activity identified.
35 Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a computing device, external activity data corresponding to a target system, where the external activity data comprises information corresponding to network-side information relating to the target system; identifying, by the computing device, suspicious external activity, corresponding to the external activity data, based on an activity watchlist, where the activity watchlist comprises information corresponding to external activity systems associated with known sources of malicious activity; and generating, by the computing device, a system security report based on the suspicious external activity identified. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computing device, comprising:
-
a memory to store instructions; and a processor, connected to the memory, to execute the instructions to; receive external activity data corresponding to a target system, where the external activity data comprises information corresponding to network-side information relating to the target system, identify suspicious external activity, corresponding to the external activity data, based on an activity watchlist, where the activity watchlist comprises information corresponding to external activity systems associated with known sources of malicious activity; identify suspicious external activity, corresponding to the external activity data, based on a security evaluation mechanism, where the security evaluation mechanism comprises an operation to identify a suspicious characteristic corresponding to the external activity data; and generate a system security report based on the suspicious external activity identified. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. One or more non-transitory computer-readable storage media, comprising:
one or more instructions that, when executed by a processor, cause the processor to; detect a potential system vulnerability corresponding to a target system, verify that the potential system vulnerability comprises an actual system vulnerability, receive external activity data corresponding to the target system, where the external activity data comprises information corresponding to network-side information relating to the target system, identify suspicious external activity, corresponding to the external activity data, based on an activity watchlist, where the activity watchlist comprises information corresponding to external activity systems associated with known sources of malicious activity; identify suspicious external activity, corresponding to the external activity data, based on a security evaluation mechanism, where the security evaluation mechanism comprises an operation to identify a suspicious characteristic corresponding to the external activity data; and generate a system security report based on the suspicious external activity identified. - View Dependent Claims (17, 18, 19, 20)
Specification