VIRTUAL PATCHING SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT
0 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for displaying, via at least one user interface, at least one option for dropping packets in connection with the at least one networked device for attack prevention. In use, it is determined whether an occurrence in connection with the at least one networked device is capable of taking advantage of the at least one actual vulnerability to which the at least one networked device is actually vulnerable. Further, based on the user input, packets are dropped in connection with the occurrence in immediate response to the detection thereof, to prevent an attack prior to completion of patch installation.
15 Citations
22 Claims
-
1-2. -2. (canceled)
-
3. A computer program product embodied on a non-transitory computer readable medium, comprising:
-
code for allowing access to first information from at least one first data storage identifying a plurality of potential vulnerabilities including at least one first potential vulnerability and at least one second potential vulnerability; code for causing at least one operation in connection with at least one of a plurality of networked devices, the at least one operation configured for; identifying at least one configuration associated with the at least one networked device, and determining that the at least one networked device is actually vulnerable to at least one actual vulnerability based on the identified at least one configuration, utilizing the first information from the at least one first data storage identifying the plurality of potential vulnerabilities, such that second information is stored in at least one second data storage separate from the at least one first data storage, the second information identifying the at least one actual vulnerability to which the at least one networked device is actually vulnerable; code for reporting the second information; code for detecting an occurrence in connection with the at least one of the networked device; code for determining whether the occurrence is capable of taking advantage of the at least one actual vulnerability to which the at least one networked device is actually vulnerable; code for displaying, via at least one user interface, at least one option for blocking the occurrence in connection with the at least one networked device; code for receiving, via the at least one user interface, user input selecting the at least one option for blocking the occurrence in connection with the at least one networked device; and code for, based on the user input, automatically blocking the occurrence, to prevent an attack from taking advantage of the at least one actual vulnerability to which the at least one networked device is actually vulnerable while there is no installation of a patch at the at least one of the networked device that removes the at least one actual vulnerability from the at least one networked device. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer program product embodied on a non-transitory computer readable medium, comprising:
-
code for accessing at least one first data structure including actual vulnerability information that is generated utilizing potential vulnerability information from at least one second data structure that is capable of being used to identify a plurality of potential vulnerabilities including; at least one first potential vulnerability, and at least one second potential vulnerability; said actual vulnerability information being generated utilizing the potential vulnerability information by; identifying at least one configuration associated with at least one of a plurality of networked devices, the at least one configuration relating to at least one of an operating system or an application of the at least one networked device, and determining that at least one networked device is actually vulnerable to at least one actual vulnerability based on the identified at least one configuration, utilizing the potential vulnerability information that is capable of being used to identify the plurality of potential vulnerabilities; said actual vulnerability information from the at least one first data structure capable of being used for identifying the at least one actual vulnerability to which at least one networked device is actually vulnerable; code for determining whether an attack is capable of taking advantage of the at least one actual vulnerability to which at least one networked device is actually vulnerable; and code for applying different attack mitigation actions of diverse attack mitigation types, including a firewall-based attack mitigation type and an intrusion prevention system-based attack mitigation type, for preventing the attack from taking advantage of the at least one actual vulnerability at the at least one networked device, based on the determination whether the attack is capable of taking advantage of the at least one actual vulnerability to which at least one networked device is actually vulnerable, the at least one actual vulnerability being a function of the at least one of the operating system or the application of the at least one networked device and the different attack mitigation actions being specific to the at least one actual vulnerability, thereby resulting in relevant attack mitigation actions of the diverse attack mitigation types being applied based on whether one or more attacks are capable of taking advantage of only relevant actual vulnerabilities. - View Dependent Claims (14, 15)
-
-
16. A computer program product embodied on a non-transitory computer readable medium, comprising:
-
code for accessing a data structure describing a plurality of mitigation techniques that mitigate a plurality of attacks that take advantage of a plurality of vulnerabilities, for retrieving a plurality of options in connection with a portion of the mitigation techniques that correspond with a subset of the plurality of the vulnerabilities resulting from an operating system and an application indicated to be on at least one device; code for presenting the plurality of options in connection with the portion of mitigation techniques that correspond with the subset of the plurality of the vulnerabilities resulting from the operating system and the application indicated to be on the at least one device, the plurality of options relating to an intrusion prevention mitigation technique and a firewall mitigation technique; code for receiving first user input selecting the intrusion prevention mitigation technique in connection with the subset of the plurality of the vulnerabilities resulting from the operating system and the application indicated to be on the at least one device; code for receiving second user input selecting the firewall mitigation technique in connection with the subset of the plurality of the vulnerabilities resulting from the operating system and the application indicated to be on the at least one device; code for, based on the first user input, applying the selected the intrusion prevention mitigation technique in connection with the subset of the plurality of the vulnerabilities resulting from the operating system and the application indicated to be on the at least one device, for occurrence mitigation; code for, based on the second user input, applying the selected firewall mitigation technique in connection with the subset of the plurality of the vulnerabilities resulting from the operating system and the application indicated to be on the at least one device, for occurrence mitigation; code for identifying an occurrence including one or more packets directed to the at least one of the device; code for determining whether the occurrence is capable of taking advantage of at least one of the subset of the plurality of the vulnerabilities resulting from the operating system and the application indicated to be on the at least one device; and code for preventing the occurrence from taking advantage of the at least one of the subset of the plurality of the vulnerabilities, utilizing at least one of the intrusion prevention mitigation technique or the firewall mitigation technique based on the application thereof, based on the determination whether the occurrence is capable of taking advantage of the at least one of the subset of the plurality of the vulnerabilities resulting from the operating system and the application indicated to be on the at least one device. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
Specification