×

System and method for vulnerability risk analysis

  • US 9,317,692 B2
  • Filed: 05/21/2010
  • Issued: 04/19/2016
  • Est. Priority Date: 12/21/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method for analyzing risk, the method comprising:

  • accessing, within an electronic system, host configuration information of a host;

    querying a vulnerability database based on said host configuration information;

    receiving a list of vulnerabilities, wherein said list of vulnerabilities corresponds to vulnerabilities of said host;

    accessing a plurality of vulnerability scores for said host and at least one software product of said host, wherein said plurality of vulnerability scores measure access vulnerability and vulnerability impact, and wherein said host and said at least one software product of said host are respectively associated with more than one of said plurality of vulnerability scores;

    determining a composite risk score for at least one of said host and said at least one software product of said host based on said plurality of vulnerability scores, wherein said composite risk score measures at least in part a severity reflecting that an exploited vulnerability is needed by an attacker to compromise at least one of said host and said at least one software product of said host, and wherein said composite risk score is based on a highest vulnerability score among the more than one of said plurality of vulnerability scores respectively associated with at least one of said host and said at least one software product of said host;

    determining an aggregate risk score for at least one of said host and said at least one software product of said host based on said plurality of vulnerability scores, wherein said aggregate risk score measures at least in part a number of options available to said attacker for compromising at least one of said host and said at least one software product of said host, and wherein said aggregate risk score is based on a summation among the more than one of said plurality of vulnerability scores respectively associated with at least one of said host and said at least one software product of said host;

    generating a graph representing said at least one software product of said host, wherein nodes of said graph represent software states of said at least one software product, wherein edges of said graph represent vulnerabilities detected in said at least one software product, wherein a path through said graph begins at a start node having relatively lower access vulnerability, and wherein said path ends at an end node having relatively higher vulnerability impact; and

    determining a risk score based on said path through said graph and at least one of said composite risk score and said aggregate risk score.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×