×

Managing security configuration through machine learning, combinatorial optimization and attack graphs

  • US 8,683,546 B2
  • Filed: 01/26/2009
  • Issued: 03/25/2014
  • Est. Priority Date: 01/26/2009
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • one or more processors; and

    memory, communicatively coupled to the one or more processors, storing an analysis component configured to;

    present a first plurality of security configuration changes to an administrator;

    receive feedback from the administrator on each of the first plurality of security configuration changes, wherein the feedback received from the administrator includes an approval or a disapproval of each of the first plurality of security configuration changes;

    analyze the feedback;

    store the feedback received from the administrator including the approval or the disapproval of each of the first plurality of security configuration changes; and

    generate a second plurality of security configuration changes based at least in part on the feedback received from the administrator and previously stored feedback received from the administrator, wherein the second plurality of security configuration changes are different from the first plurality of security configuration changes.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×