×

Network maliciousness susceptibility analysis and rating

  • US 9,729,558 B2
  • Filed: 02/20/2015
  • Issued: 08/08/2017
  • Est. Priority Date: 02/21/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for auditing a computer network to determine susceptibility to malicious cyber attacks, the method comprising:

  • actively querying individual hosts of the computer network via data communications that are separate from data traffic sent to and received by the individual hosts during normal operation;

    analyzing network data collected in response to the queries for a presence of a plurality of mismanagement and misconfiguration symptoms represented by a range of mismanagement metrics associated with the individual hosts within the computer network the plurality of mismanagement and misconfiguration symptoms being indicative of a failure to implement adequate network security practices or a deviation from known best security practices;

    aggregating the range of mismanagement metrics associated with the individual hosts within the computer network at a particular network level granularity including (i) an autonomous system (AS) level, (ii) a network prefix level, (iii) an enterprise network level, or (iv) an arbitrarily-defined network level, the particular network level granularity being based upon the range of mismanagement metrics and which of the plurality of mismanagement and misconfiguration symptoms are available at a particular network granularity;

    identifying, from the aggregation of the range of mismanagement metrics, one or more correlations between the plurality of mismanagement and misconfiguration symptoms and the range of mismanagement metrics;

    from among the identified one or more correlations between the range of mismanagement metrics, determining a unified mismanagement metric for the computer network, the unified mismanagement metric indicating a network level of the mismanagement of the computer network that represents a susceptibility of the computer network to malicious cyber attacks as a combination of susceptibilities of the individual hosts to malicious cyber attacks; and

    storing the unified mismanagement metric for use in comparison to a listing of potential malicious cyber attacks.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×