×

Anti-vulnerability system, method, and computer program product

DC
  • US 9,118,711 B2
  • Filed: 09/29/2014
  • Issued: 08/25/2015
  • Est. Priority Date: 07/01/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer program product embodied on a non-transitory computer readable medium, comprising:

  • code for allowing access to first information from at least one first data storage identifying a plurality of potential vulnerabilities including at least one first potential vulnerability and at least one second potential vulnerability;

    code for causing at least one operation in connection with at least one of a plurality of networked devices, the at least one operation configured for;

    identifying at least one configuration associated with the at least one networked device, anddetermining that the at least one networked device is actually vulnerable to one or more actual vulnerabilities, based on the identified at least one configuration and the first information from the at least one first data storage identifying the plurality of potential vulnerabilities, such that second information is stored in at least one second data storage separate from the at least one first data storage, the second information identifying the one or more actual vulnerabilities to which the at least one networked device is actually vulnerable;

    code for identifying a first occurrence in connection with the at least one networked device and a second occurrence in connection with the at least one networked device;

    code for;

    determining the first occurrence to have a first severity if the at least one networked device is actually vulnerable to at least one of the actual vulnerabilities that is capable of being taken advantage of by the first occurrence identified in connection with the at least one networked device, and further determining the second occurrence to have a second severity if the at least one networked device is not actually vulnerable to the second occurrence identified in connection with the at least one networked device;

    code for reporting the first occurrence and the second occurrence differently based on the first severity and the second severity;

    code for displaying, via at least one user interface, a plurality of techniques of different technique types including a first technique for setting or modifying a policy for occurrence mitigation, and a second technique for reacting to packets in connection with the at least one networked device for occurrence mitigation;

    code for receiving user input selecting the first technique for setting or modifying the policy for occurrence mitigation, utilizing the at least one user interface;

    code for, based on the user input selecting the first technique for setting or modifying the policy for occurrence mitigation, automatically applying the first technique for setting or modifying the policy for occurrence mitigation, such that an identification of a particular actual vulnerability to which the at least one networked device is actually vulnerable is used in connection with the first technique, for mitigating a particular occurrence identified in connection with the at least one networked device if the at least one networked device is actually vulnerable to the particular actual vulnerability and the particular actual vulnerability is capable of being taken advantage of by the particular occurrence identified in connection with the at least one networked device, and further for not mitigating the particular occurrence if the particular actual vulnerability is incapable of being taken advantage of by the particular occurrence identified in connection with the at least one networked device;

    code for receiving user input selecting the second technique for reacting to packets in connection with the at least one networked device for occurrence mitigation, utilizing the at least one user interface; and

    code for, based on the user input selecting the second technique for reacting to packets in connection with the at least one networked device for occurrence mitigation, automatically applying the second technique for reacting to packets in connection with the at least one networked device for occurrence mitigation, such that an identification of a certain actual vulnerability to which the at least one networked device is actually vulnerable is used in connection with the second technique, for reacting to packets in connection with a certain occurrence identified in connection with the at least one networked device if the at least one networked device is actually vulnerable to the certain actual vulnerability and the certain actual vulnerability is capable of being taken advantage of by the certain occurrence identified in connection with the at least one networked device, and further for not reacting, at least in part, to packets in connection with the certain occurrence if the certain actual vulnerability is incapable of being taken advantage of by the certain occurrence identified in connection with the at least one networked device;

    wherein the computer program product is operable such that at least one of;

    said at least one first data storage includes at least one first database;

    said at least one first data storage is a component of a network operations center (NOC) server;

    said at least one second data storage includes at least one second database;

    said allowed access to the first information from the at least one first data storage is accomplished by at least one of;

    receiving at least one update therefrom;

    pulling at least one update therefrom, communicating therewith, or synchronizing therewith;

    said potential vulnerabilities and the actual vulnerabilities include software vulnerabilities in an application or an operating system that are capable of being exploited by an attack or a virus;

    said at least one operation includes a vulnerability scan operation;

    said at least one configuration includes at least one of service pack information, elements contained in files including at least one of an *.ini or *.conf file, an aspect of an operating system, or registry information;

    said determination that the at least one networked device is actually vulnerable to the one or more actual vulnerabilities, is carried out by utilizing at least one of a vulnerability identifier or a profile;

    said first occurrence of the first severity includes an incident and said second occurrence of the second severity includes an event;

    said second occurrence is reported differently than the first occurrence by not being reported;

    said first technique for setting or modifying the policy includes just setting the policy;

    said first technique for setting or modifying the policy includes just setting the policy, and said policy is associated with at least one of a policy template, a custom policy, or standardized template;

    said second technique for reacting to the packets is carried out utilizing a firewall;

    said occurrence mitigation includes at least one of removing the one or more actual vulnerabilities, or reducing an effect of a detected occurrence;

    said reacting to packets involves at least one of dropping, blocking, or redirecting;

    said occurrence mitigation is carried out for protecting at least one particular aspect of one or more of the networked devices, where the one or more of the networked devices include at least one of a client or a server, and the at least one particular aspect includes at least one of an operating system or an application;

    said particular actual vulnerability is at least one of the actual vulnerabilities;

    said certain actual vulnerability is at least one of the actual vulnerabilities;

    said particular actual vulnerability is the certain actual vulnerability;

    said particular occurrence is the certain occurrence;

    said particular occurrence includes the first occurrence;

    said certain occurrence includes the first occurrence;

    said first and second techniques include remediation techniques;

    said first occurrence includes an attack;

    said computer program product is operable for use with at least one NOC server, a data warehouse, and an SDK for allowing access to the second information and at least one of the plurality of techniques;

    orsaid computer program product is operable such that said determination that the at least one networked device is actually vulnerable to the one or more actual vulnerabilities is carried out by directly querying a firmware or an operating system.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×