WO2022125957A3 - Diagnosing and managing network vulnerabilities - Google Patents
Diagnosing and managing network vulnerabilities Download PDFInfo
- Publication number
- WO2022125957A3 WO2022125957A3 PCT/US2021/062903 US2021062903W WO2022125957A3 WO 2022125957 A3 WO2022125957 A3 WO 2022125957A3 US 2021062903 W US2021062903 W US 2021062903W WO 2022125957 A3 WO2022125957 A3 WO 2022125957A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- systems
- pathways
- vulnerabilities
- accessing
- graph
- Prior art date
Links
- 230000037361 pathway Effects 0.000 abstract 3
- 230000006855 networking Effects 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Debugging And Monitoring (AREA)
Abstract
The present disclosure generally relates to systems, methods, and computer-readable media for identifying instances of vulnerabilities on a computing network and generating a graph representing pathways that an attacking entity may take with respect to accessing one or more sensitive assets. For example, one or more systems disclosed herein collect network information and vulnerability information to generate a graph including nodes and edges representing at least a portion of the computing network associated with different vulnerabilities. The systems described herein may use graph theory to generate or otherwise identify pathways that an attacker is likely to use in accessing the sensitive asset(s). The systems additionally may further evaluate the pathways and associated likelihoods/risks to intelligently select one or more action items associated with a reduction of risk to the networking system.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US202063124610P | 2020-12-11 | 2020-12-11 | |
US63/124,610 | 2020-12-11 | ||
US17/217,714 | 2021-03-30 | ||
US17/217,714 US12015631B2 (en) | 2020-12-11 | 2021-03-30 | Diagnosing and managing network vulnerabilities |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2022125957A2 WO2022125957A2 (en) | 2022-06-16 |
WO2022125957A3 true WO2022125957A3 (en) | 2022-07-14 |
Family
ID=79282984
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2021/062903 WO2022125957A2 (en) | 2020-12-11 | 2021-12-10 | Diagnosing and managing network vulnerabilities |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2022125957A2 (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3664410A1 (en) * | 2018-12-03 | 2020-06-10 | Accenture Global Solutions Limited | Generating attack graphs in agile security platforms |
-
2021
- 2021-12-10 WO PCT/US2021/062903 patent/WO2022125957A2/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3664410A1 (en) * | 2018-12-03 | 2020-06-10 | Accenture Global Solutions Limited | Generating attack graphs in agile security platforms |
Non-Patent Citations (2)
Title |
---|
GEORGE GEMINI ET AL: "Vulnerability-based risk assessment and mitigation strategies for edge devices in the Internet of Things", PERVASIVE AND MOBILE COMPUTING, ELSEVIER, NL, vol. 59, 6 August 2019 (2019-08-06), XP085865380, ISSN: 1574-1192, [retrieved on 20190806], DOI: 10.1016/J.PMCJ.2019.101068 * |
LAMICHHANE PRABIN B ET AL: "A Quantitative Risk Analysis Model and Simulation Of Enterprise Networks", 2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), IEEE, 1 November 2018 (2018-11-01), pages 844 - 850, XP033499063, DOI: 10.1109/IEMCON.2018.8615080 * |
Also Published As
Publication number | Publication date |
---|---|
WO2022125957A2 (en) | 2022-06-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11531766B2 (en) | Systems and methods for attributing security vulnerabilities to a configuration of a client device | |
US9336388B2 (en) | Method and system for thwarting insider attacks through informational network analysis | |
US9832214B2 (en) | Method and apparatus for classifying and combining computer attack information | |
CN109347801B (en) | Vulnerability exploitation risk assessment method based on multi-source word embedding and knowledge graph | |
US9800605B2 (en) | Risk scoring for threat assessment | |
CN108040493B (en) | Method and apparatus for detecting security incidents based on low confidence security events | |
US10341372B2 (en) | Clustering for detection of anomalous behavior and insider threat | |
TWI595375B (en) | Anomaly detection using adaptive behavioral profiles | |
US8402546B2 (en) | Estimating and visualizing security risk in information technology systems | |
Laorden et al. | Study on the effectiveness of anomaly detection for spam filtering | |
US20180189697A1 (en) | Methods and apparatus for processing threat metrics to determine a risk of loss due to the compromise of an organization asset | |
US8739290B1 (en) | Generating alerts in event management systems | |
US20160226893A1 (en) | Methods for optimizing an automated determination in real-time of a risk rating of cyber-attack and devices thereof | |
JP2021039754A (en) | Endpoint agent expansion of machine learning cyber defense system for electronic mail | |
US20200045064A1 (en) | Systems and methods for monitoring security of an organization based on a normalized risk score | |
CN111737750B (en) | Data processing method and device, electronic equipment and storage medium | |
US8793211B2 (en) | System and method for secure information sharing with untrusted recipients | |
Alshammari | A novel security framework to mitigate and avoid unexpected security threats in saudi arabia | |
Kotenko et al. | Data analytics for security management of complex heterogeneous systems: event correlation and security assessment tasks | |
Elshoush et al. | Intrusion alert correlation framework: An innovative approach | |
Leahovcenco | Cybersecurity as a fundamental element of the digital economy. | |
Awiszus et al. | Building resilience in cybersecurity: An artificial lab approach | |
WO2022125957A3 (en) | Diagnosing and managing network vulnerabilities | |
Lamers et al. | Ransomware: A Threat to Cyber Smart Cities | |
Stanik et al. | Cyber Resilience as a New Strategy to Reduce the Impact of Cyber Threats |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21839787 Country of ref document: EP Kind code of ref document: A2 |