Systems and methods for modifying network map attributes
First Claim
Patent Images
1. A method for assigning a vulnerability parameter to a device on a network, comprising:
- passively determining, responsive to a passively read packet, a vulnerability parameter for an operating system or service;
storing, responsive to the vulnerability parameter being passively determined, the vulnerability parameter in a host map associated with a network device;
modifying the vulnerability parameter which was passively determined; and
storing the modified vulnerability parameter in the host map, wherein the vulnerability parameter is invalid or valid,when the vulnerability is invalid and a pre-defined change in the operating system or service occurs on the network device, a new vulnerability lookup is performed for the changed operating system or service and the vulnerability parameter is remapped from invalid to valid based on the new vulnerability lookup for the changed operating system or service,wherein the vulnerability parameter is associated with a universal unique identifier to distinguish between locally and remotely generated vulnerability parameters and is synchronized to a high availability peer, the vulnerability parameter being propagated from the host map to the high availability peer,when the vulnerability parameter is modified at the high availability peer, the modified vulnerability parameter is propagated from the high availability peer back to the host map.
2 Assignments
0 Petitions
Accused Products
Abstract
The disclosed systems and methods provide a user interface for modifying host configuration data that has been automatically and passively determined and for adding or modifying other parameters associated with a host. A host data table can store various parameters descriptive of a host including the applicability of specific vulnerabilities. If it is determined that one or more hosts should not be identified as associated with a specific vulnerability, a graphical user interface can be used to modify the vulnerability parameter.
217 Citations
12 Claims
-
1. A method for assigning a vulnerability parameter to a device on a network, comprising:
-
passively determining, responsive to a passively read packet, a vulnerability parameter for an operating system or service; storing, responsive to the vulnerability parameter being passively determined, the vulnerability parameter in a host map associated with a network device; modifying the vulnerability parameter which was passively determined; and storing the modified vulnerability parameter in the host map, wherein the vulnerability parameter is invalid or valid, when the vulnerability is invalid and a pre-defined change in the operating system or service occurs on the network device, a new vulnerability lookup is performed for the changed operating system or service and the vulnerability parameter is remapped from invalid to valid based on the new vulnerability lookup for the changed operating system or service, wherein the vulnerability parameter is associated with a universal unique identifier to distinguish between locally and remotely generated vulnerability parameters and is synchronized to a high availability peer, the vulnerability parameter being propagated from the host map to the high availability peer, when the vulnerability parameter is modified at the high availability peer, the modified vulnerability parameter is propagated from the high availability peer back to the host map. - View Dependent Claims (2, 3, 4)
-
-
5. A method for assigning a vulnerability parameter to a device on a network, comprising:
-
passively determining, responsive to a passively read packet, a vulnerability parameter for an operating system or service, wherein the vulnerability parameter is associated with a universal unique identifier to distinguish between locally and remotely generated vulnerability parameters; storing, responsive to the vulnerability parameter being passively determined, the vulnerability parameter in a host map associated with a network device; modifying the vulnerability parameter which was passively determined; and storing the modified vulnerability parameter in the host map, wherein the vulnerability parameter is invalid or valid, when the vulnerability is invalid and a pre-defined change in the operating system or service occurs on the network device, a new vulnerability lookup is performed for the changed operating system or service and the vulnerability parameter is remapped from invalid to valid based on the new vulnerability lookup for the changed operating system or service, wherein the vulnerability parameter is propagated from the host map to the high availability peer, when the vulnerability parameter is modified at the high availability peer, the modified vulnerability parameter is propagated from the high availability peer back to the host map. - View Dependent Claims (6, 7, 8)
-
-
9. A method for assigning a vulnerability parameter to a device on a network, comprising:
-
passively determining, responsive to a passively read packet, a vulnerability parameter for an operating system or service; storing, responsive to the vulnerability parameter being passively determined, the vulnerability parameter in a host map associated with a network device; modifying the vulnerability parameter which was passively determined; and storing the modified vulnerability parameter in the host map, wherein the vulnerability parameter is invalid or valid, when the vulnerability is invalid and a pre-defined change in the operating system or service occurs on the network device, a new vulnerability lookup is performed for the changed operating system or service and the vulnerability parameter is remapped from invalid to valid based on the new vulnerability lookup for the changed operating system or service, wherein the vulnerability parameter is associated with a universal unique identifier to distinguish between locally and remotely generated vulnerability parameters and is synchronized to a peer, the vulnerability parameter being propagated from the host map to the peer, when the vulnerability parameter is modified at the peer, the modified vulnerability parameter is propagated from the peer back to the host map. - View Dependent Claims (10, 11, 12)
-
Specification