SECURITY PROTECTION RULE PREDICTION AND ENFORCEMENT
First Claim
1. A method comprising:
- receiving, by one or more processors, a description of a vulnerability of a computer system to a malicious attack;
performing, by the one or more processors, a Natural Language Processing (NLP) analysis of the description of the vulnerability in order to extract risk information related to the vulnerability, wherein the risk information comprises an identity of a type of vulnerable computer system resource in the computer system that is vulnerable to the malicious attack;
comparing, by the one or more processors, the vulnerable computer system resource to a computer system resource in a particular computer system; and
in response to the vulnerable computer system resource matching the computer system resource in the particular computer system, performing, by the one or more processors, a mitigation action that mitigates a vulnerability of the computer system resource in the particular computer system to the malicious attack by reducing a functionality of the computer system resource in the particular computer system until a solution is implemented that mitigates the vulnerability of the particular computer system to the malicious attack.
1 Assignment
0 Petitions
Accused Products
Abstract
A method provides an intermediate mitigation of a vulnerability in a particular computer system. One or more processors receive a description of a vulnerability of a computer system to a malicious attack. The processor(s) perform an NLP analysis of the description of the vulnerability in order to extract risk information related to the vulnerability, where the risk information includes an identity of a type of vulnerable computer system resource in the computer system. The processor(s) match the vulnerable computer system resource to a computer system resource in a particular computer system, and perform an intermediate mitigation action that reduces a functionality of the computer system resource in the particular computer system until a solution is implemented that both restores the functionality of the computer system resource in the particular computer system and mitigates the vulnerability of the particular computer system to the malicious attack.
9 Citations
20 Claims
-
1. A method comprising:
-
receiving, by one or more processors, a description of a vulnerability of a computer system to a malicious attack; performing, by the one or more processors, a Natural Language Processing (NLP) analysis of the description of the vulnerability in order to extract risk information related to the vulnerability, wherein the risk information comprises an identity of a type of vulnerable computer system resource in the computer system that is vulnerable to the malicious attack; comparing, by the one or more processors, the vulnerable computer system resource to a computer system resource in a particular computer system; and in response to the vulnerable computer system resource matching the computer system resource in the particular computer system, performing, by the one or more processors, a mitigation action that mitigates a vulnerability of the computer system resource in the particular computer system to the malicious attack by reducing a functionality of the computer system resource in the particular computer system until a solution is implemented that mitigates the vulnerability of the particular computer system to the malicious attack. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product comprising a computer readable storage medium having program code embodied therewith, wherein the computer readable storage medium is not a transitory signal per se, and wherein the program code is readable and executable by a processor to perform a method comprising:
-
receiving a description of a vulnerability of a computer system to a malicious attack; performing a Natural Language Processing (NLP) analysis of the description of the vulnerability in order to extract risk information related to the vulnerability, wherein the risk information comprises an identity of a type of vulnerable computer system resource in the computer system that is vulnerable to the malicious attack; comparing the vulnerable computer system resource to a computer system resource in a particular computer system; and in response to the vulnerable computer system resource matching the computer system resource in the particular computer system, performing a mitigation action that mitigates a vulnerability of the computer system resource in the particular computer system to the malicious attack by reducing a functionality of the computer system resource in the particular computer system until a solution is implemented that both restores the functionality of the computer system resource in the particular computer system and mitigates the vulnerability of the particular computer system to the malicious attack. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer system comprising one or more processors, one or more computer readable memories, and one or more computer readable non-transitory storage mediums, and program instructions stored on at least one of the one or more computer readable non-transitory storage mediums for execution by at least one of the one or more processors via at least one of the one or more computer readable memories, the stored program instructions executed to perform a method comprising:
-
receiving a description of a vulnerability of a computer system to a malicious attack; performing a Natural Language Processing (NLP) analysis of the description of the vulnerability in order to extract risk information related to the vulnerability, wherein the risk information comprises an identity of a type of vulnerable computer system resource in the computer system that is vulnerable to the malicious attack; comparing the vulnerable computer system resource to a computer system resource in a particular computer system; and in response to the vulnerable computer system resource matching the computer system resource in the particular computer system, performing a mitigation action that mitigates a vulnerability of the computer system resource in the particular computer system to the malicious attack by reducing a functionality of the computer system resource in the particular computer system until a solution is implemented that both restores the functionality of the computer system resource in the particular computer system and mitigates the vulnerability of the particular computer system to the malicious attack. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification