×

ANTI-VULNERABILITY SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT

  • US 20150271142A1
  • Filed: 03/16/2015
  • Published: 09/24/2015
  • Est. Priority Date: 07/01/2003
  • Status: Active Grant
First Claim
Patent Images

1. A computer program product embodied on a non-transitory computer readable medium, comprising:

  • code for accessing information associated with a plurality of mitigation techniques that mitigate a plurality of attacks that take advantage of a plurality of vulnerabilities, for retrieving a plurality of options in connection with a portion of the mitigation techniques that correspond with a subset of the plurality of the vulnerabilities resulting from at least one of an operating system or an application indicated to be on at least one device;

    code for presenting the plurality of options in connection with the portion of mitigation techniques that correspond with the subset of the plurality of the vulnerabilities resulting from at least one of the operating system or the application indicated to be on the at least one device, the plurality of options relating to an intrusion prevention mitigation technique and a firewall mitigation technique;

    code for receiving first user input selecting the intrusion prevention mitigation technique in connection with the subset of the plurality of the vulnerabilities resulting from at least one of the operating system or the application indicated to be on the at least one device;

    code for receiving second user input selecting the firewall mitigation technique in connection with the subset of the plurality of the vulnerabilities resulting from at least one of the operating system or the application indicated to be on the at least one device;

    code for, based on the first user input, applying the selected the intrusion prevention mitigation technique in connection with the subset of the plurality of the vulnerabilities resulting from at least one of the operating system or the application indicated to be on the at least one device, for occurrence mitigation;

    code for, based on the second user input, applying the selected firewall mitigation technique in connection with the subset of the plurality of the vulnerabilities resulting from at least one of the operating system or the application indicated to be on the at least one device, for occurrence mitigation;

    code for identifying an occurrence including one or more packets directed to the at least one of the device;

    code for determining whether the occurrence is capable of taking advantage of at least one of the subset of the plurality of the vulnerabilities resulting from at least one of the operating system or the application indicated to be on the at least one device; and

    code for preventing the occurrence from taking advantage of the at least one of the subset of the plurality of the vulnerabilities, utilizing at least one of the intrusion prevention mitigation technique or the firewall mitigation technique based on the application thereof, based on the determination whether the occurrence is capable of taking advantage of the at least one of the subset of the plurality of the vulnerabilities resulting from at least one of the operating system or the application indicated to be on the at least one device.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×