×

Automated vulnerability intelligence generation and application

  • US 9,846,780 B2
  • Filed: 02/25/2015
  • Issued: 12/19/2017
  • Est. Priority Date: 02/25/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • obtaining, by a computer system, over a computer network, and from a computer security data provider, distributable vulnerability data comprising, for each of a plurality of software packages and associated vulnerabilities, threat mitigation information and a threat priority parameter,wherein the distributable vulnerability data is derived from an intelligence graph depicting a plurality of attacks by a plurality of attackers against a plurality of entities and comprising a plurality of fundamental instance nodes, a plurality of document nodes, and a plurality of edges,wherein the plurality of fundamental instance nodes include a first fundamental instance node that is associated with common vulnerability and exposure information,wherein the plurality of fundamental instance nodes further include a second fundamental instance node that is associated with one of;

    an internet protocol (IP) address,a domain name,a uniform resource locator,a file system path,a software vulnerability,a software,a name of a person,an account handle,an email address,a malware family,an attack campaign,an event,an organization,a network,a file,a country,a region, oran autonomous system number, andwherein the plurality of document nodes include a document node associated with one of;

    an intelligence report,a communication,an analysis, ora context;

    identifying installed software packages on the computer system;

    correlating, by the computer system, a plurality of the installed software packages with the distributable vulnerability data to obtain an identified plurality of installed software packages and respective associated vulnerabilities;

    ordering, by the computer system, at least one of the identified plurality of installed software packages and respective associated vulnerabilities according to threat priority parameters to obtain an ordered plurality of installed software packages and associated vulnerabilities; and

    providing mitigation information for the ordered plurality of installed software packages and associated vulnerabilities.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×