×

Threat management system and method

  • US 8,220,056 B2
  • Filed: 09/23/2008
  • Issued: 07/10/2012
  • Est. Priority Date: 09/23/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method of automating network threat responses, the method comprising:

  • enabling a customer to enter a customer supplied assessment of assets and threats to the assets;

    identifying, through a processing device, types of assets of the customer in a hosting area network susceptible to network attack, the assets comprising physical computing system and networking resourcesproviding managed services in the hosting area network to a plurality of customers, each customer having a dedicated set of the resources;

    comparing the identified types of assets of the customer to the types of assets of other customers of the hosting area network to identify other customers having similar types of assets;

    comparing asset values of the identified other customers having similar types of assets to the customer supplied assessment of assets and threats to identify the asset values of the identified other customers corresponding to the customer supplied assessment of assets and threats;

    assigning an asset value to each type of asset of the customer based on the identified asset values of the other customers corresponding to the customer supplied assessment of assets and threats;

    identifying types of threats of network attack to the assets of the customer;

    comparing the identified types of threats to the assets of the customer to the types of threats faced by the other customers of the hosting area network having similar types of assets to identify other customers facing similar types of threats;

    comparing threat values of the identified other customers facing similar types of threats to the customer supplied assessment of assets and threats to identify the threat values of the identified other customers corresponding to the customer supplied assessment of assets and threats;

    assigning a threat value to each type of threat to the assets of the customer based on the identified threat values of the other customers corresponding to the customer supplied assessment of assets and threats;

    applying a first statistical algorithm to events in the hosting area network to identify anomalous event patterns;

    comparing the identified anomalous event patterns to accumulated historical data on prior attacks and events stored in a historical correlation module to identify actual threats from an attack;

    applying a second statistical algorithm to the assigned asset value, the assigned threat values, and the identified actual threats to identify a severity of the actual threats for the customer; and

    plotting on a map of the hosting area network at least one of the actual threats identified as severe.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×