AUTOMATED VULNERABILITY INTELLIGENCE GENERATION AND APPLICATION
First Claim
1. A computer-implemented method comprising:
- obtaining distributable vulnerability data comprising, for each of a plurality of software packages and associated vulnerabilities, threat mitigation information and a threat priority parameter, wherein the distributable vulnerability data was derived from an intelligence graph comprising a plurality of fundamental instance nodes, a plurality of document nodes, and a plurality of edges;
identifying installed software packages on a computer system;
correlating a plurality of the installed software packages with the distributable vulnerability data to obtain a plurality of installed software packages and associated vulnerabilities;
ordering at least some of the plurality of installed software packages and associated vulnerabilities according to threat priority parameters, whereby an ordered plurality of installed software packages and associated vulnerabilities is obtained; and
providing mitigation information for the ordered plurality of installed software packages and associated vulnerabilities.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques for providing computer security vulnerability intelligence are disclosed. The techniques include obtaining distributable vulnerability data that includes, for each of a plurality of software packages and associated vulnerabilities, threat mitigation information and a threat priority parameter, where the distributable vulnerability data was derived from an intelligence graph including a plurality of fundamental instance nodes, a plurality of document nodes, and a plurality of edges. The techniques also include identifying installed software packages on a computer system, correlating a plurality of the installed software packages with the distributable vulnerability data to obtain a plurality of installed software packages and associated vulnerabilities, ordering at least some of the plurality of installed software packages and associated vulnerabilities according to threat priority parameters, such that an ordered plurality of installed software packages and associated vulnerabilities is obtained, and providing mitigation information for the ordered plurality of installed software packages and associated vulnerabilities.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
obtaining distributable vulnerability data comprising, for each of a plurality of software packages and associated vulnerabilities, threat mitigation information and a threat priority parameter, wherein the distributable vulnerability data was derived from an intelligence graph comprising a plurality of fundamental instance nodes, a plurality of document nodes, and a plurality of edges; identifying installed software packages on a computer system; correlating a plurality of the installed software packages with the distributable vulnerability data to obtain a plurality of installed software packages and associated vulnerabilities; ordering at least some of the plurality of installed software packages and associated vulnerabilities according to threat priority parameters, whereby an ordered plurality of installed software packages and associated vulnerabilities is obtained; and providing mitigation information for the ordered plurality of installed software packages and associated vulnerabilities. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An electronic computer system comprising:
-
an electronic processor programmed to obtain distributable vulnerability data comprising, for each of a plurality of software packages and associated vulnerabilities, threat mitigation information and a threat priority parameter, wherein the distributable vulnerability data was derived from an intelligence graph comprising a plurality of fundamental instance nodes, a plurality of document nodes, and a plurality of edges; an electronic processor programmed to identify installed software packages on a computer system; an electronic processor programmed to correlate a plurality of the installed software packages with the distributable vulnerability data to obtain a plurality of installed software packages and associated vulnerabilities; an electronic processor programmed to order at least some of the plurality of installed software packages and associated vulnerabilities according to threat priority parameters, whereby an ordered plurality of installed software packages and associated vulnerabilities is obtained; and an electronic processor programmed to provide mitigation information for the ordered plurality of installed software packages and associated vulnerabilities. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer-implemented method comprising:
-
obtaining intelligence graph data comprising a plurality of fundamental instance nodes, a plurality of document nodes, and a plurality of edges; deriving, from the intelligence graph data, distributable vulnerability data comprising, for each of a plurality of software packages and associated vulnerabilities, threat mitigation information and a threat priority parameter; providing the distributable vulnerability data to an entity having a computer system with installed software packages to correlate a plurality of the installed software packages with the distributable vulnerability data to obtain a plurality of installed software packages and associated vulnerabilities and to order at least some of the plurality of installed software packages and associated vulnerabilities according to threat priority parameters, whereby the entity obtains an ordered plurality of installed software packages and associated vulnerabilities and mitigation information for the ordered plurality of installed software packages and associated vulnerabilities. - View Dependent Claims (12, 13, 14, 15)
-
-
16. An electronic computer system comprising:
-
an electronic processor programmed to obtain intelligence graph data comprising a plurality of fundamental instance nodes, a plurality of document nodes, and a plurality of edges; an electronic processor programmed to derive, from the intelligence graph data, distributable vulnerability data comprising, for each of a plurality of software packages and associated vulnerabilities, threat mitigation information and a threat priority parameter; an electronic processor programmed to provide the distributable vulnerability data to an entity having a computer system with installed software packages to correlate a plurality of the installed software packages with the distributable vulnerability data to obtain a plurality of installed software packages and associated vulnerabilities and to order at least some of the plurality of installed software packages and associated vulnerabilities according to threat priority parameters, whereby the entity obtains an ordered plurality of installed software packages and associated vulnerabilities and mitigation information for the ordered plurality of installed software packages and associated vulnerabilities. - View Dependent Claims (17, 18, 19, 20)
-
Specification