Systems for network risk assessment including processing of user access rights associated with a network of devices
First Claim
1. A computerized method comprising:
- by a computing device having one or more computer processors and a non-transitory computer readable storage device storing software instruction for execution by the one or more computer processors,obtaining information describing network traffic between a plurality of network devices within a network;
determining, based on the information describing network traffic, a network topology of the network, the network topology comprising a plurality of nodes each connected to one or more of the plurality of nodes, wherein each node is associated with one or more network devices, and wherein the network topology is associated with indications of user access rights of a plurality of user accounts to respective nodes included in the network topology;
determining, for each of the plurality of user accounts, a risk associated with the user account being compromised with respect to the network, the risk being based on;
user access rights of the user account to nodes included in the network topology, andinformation informing vulnerability of the user account being compromised; and
generating user interface data describing the risks associated with the user accounts, the user interface data including indications of user accounts organized according to respective risk.
8 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes obtaining information describing network traffic between a plurality of network devices within a network. A network topology of the network is determined based on the information describing network traffic, with the network topology including nodes connected by an edge to one or more other nodes, and with each node being associated with one or more network devices. Indications of user access rights of users are associated to respective nodes included in the network topology. User interface data associated with the network topology is generated.
-
Citations
19 Claims
-
1. A computerized method comprising:
-
by a computing device having one or more computer processors and a non-transitory computer readable storage device storing software instruction for execution by the one or more computer processors, obtaining information describing network traffic between a plurality of network devices within a network; determining, based on the information describing network traffic, a network topology of the network, the network topology comprising a plurality of nodes each connected to one or more of the plurality of nodes, wherein each node is associated with one or more network devices, and wherein the network topology is associated with indications of user access rights of a plurality of user accounts to respective nodes included in the network topology; determining, for each of the plurality of user accounts, a risk associated with the user account being compromised with respect to the network, the risk being based on; user access rights of the user account to nodes included in the network topology, and information informing vulnerability of the user account being compromised; and generating user interface data describing the risks associated with the user accounts, the user interface data including indications of user accounts organized according to respective risk. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising one or more computer systems and one or more computer storage media storing instructions that when executed by the system of one or more computers cause the one or more computers to perform operations comprising:
-
obtaining information describing network traffic between a plurality of network devices within a network; determining, based on the information describing network traffic, a network topology of the network, the network topology comprising a plurality of nodes each connected to one or more of the plurality of nodes, wherein each node is associated with one or more network devices, and wherein the network topology is associated with indications of user access rights of a plurality of user accounts to respective nodes included in the network topology; determining, for each of the plurality of user accounts, a risk associated with the user account being compromised with respect to the network, the risk being based on; user access rights of the user account to nodes included in the network topology, and information informing vulnerability of the user account being compromised; and generating user interface data describing the risks associated with the user accounts, the user interface data including indications of user accounts organized according to respective risk. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. Non-transitory computer storage media storing instructions that when executed by a system of one or more computers cause the one or more computers to perform operations comprising:
-
obtaining information describing network traffic between a plurality of network devices within a network; determining, based on the information describing network traffic, a network topology of the network, the network topology comprising a plurality of nodes each connected to one or more of the plurality of nodes, wherein each node is associated with one or more network devices, and wherein the network topology is associated with indications of user access rights of a plurality of user accounts to respective nodes included in the network topology; determining, for each of the plurality of user accounts, a risk associated with the user account being compromised with respect to the network, the risk being based on; user access rights of the user account to nodes included in the network topology, and information informing vulnerability of the user account being compromised; and generating user interface data describing the risks associated with the user accounts, the user interface data including indications of user accounts organized according to respective risk. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification