Geographical vulnerability mitigation response mapping system
First Claim
Patent Images
1. A method for displaying a vulnerability of a network comprising one or more network points, the method comprising:
- receiving vulnerability information identifying a point of the network as containing a vulnerability, the network vulnerability point comprising a computing device connected to the network and susceptible to unauthorized access;
identifying, based on the vulnerability information, an Internet Protocol (IP) address associated with the network vulnerability point;
retrieving, from an Address Routing Protocol (ARP) database using the IP address, a router address corresponding to the identified network vulnerability point;
retrieving, from a network location database using the retrieved router address, geographical location information associated with the identified network vulnerability point;
storing a vulnerability record for the identified network vulnerability point, the vulnerability record containing the IP address, the router address, the geographical location information, and a current status of a mitigation response to the vulnerability;
generating a geographical map displaying an area including at least the geographical location of the identified network vulnerability point;
displaying a network vulnerability symbol on the map designating the geographical location of the network vulnerability point; and
graphically distinguishing a characteristic of the displayed network vulnerability symbol based on the current status of the mitigation response to the vulnerability.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for geographically mapping a vulnerability of a network having one or more network points include receiving vulnerability information identifying a vulnerability of a point of the network, correlating the vulnerability information with location information for the identified network point, and network identification information for the identified network point, and generating a map displaying a geographical location of the vulnerability.
-
Citations
27 Claims
-
1. A method for displaying a vulnerability of a network comprising one or more network points, the method comprising:
-
receiving vulnerability information identifying a point of the network as containing a vulnerability, the network vulnerability point comprising a computing device connected to the network and susceptible to unauthorized access; identifying, based on the vulnerability information, an Internet Protocol (IP) address associated with the network vulnerability point; retrieving, from an Address Routing Protocol (ARP) database using the IP address, a router address corresponding to the identified network vulnerability point; retrieving, from a network location database using the retrieved router address, geographical location information associated with the identified network vulnerability point; storing a vulnerability record for the identified network vulnerability point, the vulnerability record containing the IP address, the router address, the geographical location information, and a current status of a mitigation response to the vulnerability; generating a geographical map displaying an area including at least the geographical location of the identified network vulnerability point; displaying a network vulnerability symbol on the map designating the geographical location of the network vulnerability point; and graphically distinguishing a characteristic of the displayed network vulnerability symbol based on the current status of the mitigation response to the vulnerability. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-readable storage medium containing instructions, which, when executed, perform a method for displaying a vulnerability of a network comprising one or more network points, the method comprising:
-
receiving vulnerability information identifying a point of the network as containing a vulnerability, the network vulnerability point comprising a computing device connected to the network and susceptible to unauthorized access; identifying, based on the vulnerability information, an Internet Protocol (IP) address associated with the network vulnerability point; retrieving, from an Address Routing Protocol (ARP) database using the IP address, a router address corresponding to the identified network vulnerability point; retrieving, from a network location database using the retrieved router address, geographical location information associated with the identified network vulnerability point using; storing a vulnerability record for the identified network vulnerability point, the vulnerability record containing the IP address, the router address, the geographical location information, and a current status of a mitigation response to the vulnerability; generating a geographical map displaying an area including at least the geographical location of the identified network vulnerability point; displaying a network vulnerability symbol on the map designating the geographical location of the network vulnerability point; and graphically distinguishing a characteristic of the displayed network vulnerability symbol based on the current status of the mitigation response to the vulnerability. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for geographically mapping a vulnerability of a network comprising a plurality of network points, the system comprising:
-
a network location database storing geographical location information about points on the network; a map database storing map information; an Address Routing Protocol (ARP) database storing network location information; a computer configured to; receive vulnerability information identifying a vulnerability of a point of the network, the network vulnerability point comprising a computing device connected to the network and susceptible to unauthorized access; identify, based on the vulnerability information, an Internet Protocol (IP) address associated with the network vulnerability point; retrieve, from the ARP database using the IP address, a router address associated with the identified network vulnerability point; retrieve, from the network location database using the retrieved router address, geographical location information associated with the identified network vulnerability point; generate a vulnerability record for the identified network vulnerability point, the vulnerability record containing the IP address, the router address, the geographical location information, and a current status of a mitigation response to the vulnerability; generate a geographical map displaying an area including at least the geographical location of the identified network vulnerability point; display a network vulnerability symbol on the map designating the geographical location of the identified network vulnerability point; and graphically distinguishing a characteristic of the displayed network vulnerability symbol on the map based on the current status of the mitigation response to the vulnerability; and a display device in electronic communication with the computer for displaying the generated map. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A method for displaying a vulnerability of a network comprising one or more network points, the method comprising:
-
receiving vulnerability information identifying a point of the network as containing a vulnerability, the network vulnerability point comprising a computing device connected to the network and susceptible to unauthorized access; identifying, based on the vulnerability information, an Internet Protocol (IP) address associated with the network vulnerability point; retrieving, from an Address Routing Protocol (ARP) database using the IP address, a router address corresponding to the identified network vulnerability point; retrieving, from a network location database using the retrieved router address, geographical location information associated with the identified network vulnerability point; receiving status information regarding a mitigation response to the vulnerability, the status information indicating whether the vulnerability is pending or closed; generating a geographical map displaying an area including at least the geographical location of the identified network vulnerability point; displaying a network vulnerability symbol on the map designating the geographical location of the network vulnerability point; visually distinguishing the displayed network vulnerability symbol based on the status information, including; visually distinguishing the displayed network vulnerability in a first manner when the status information indicates vulnerability is pending; and visually distinguishing the displayed network vulnerability symbol in a second manner, distinct from the first manner, when the status information indicates the vulnerability is closed. - View Dependent Claims (27)
-
Specification