发明名称 AUTOMATED VULNERABILITY INTELLIGENCE GENERATION AND APPLICATION
摘要 Techniques for providing computer security vulnerability intelligence are disclosed. The techniques include obtaining distributable vulnerability data that includes, for each of a plurality of software packages and associated vulnerabilities, threat mitigation information and a threat priority parameter, where the distributable vulnerability data was derived from an intelligence graph including a plurality of fundamental instance nodes, a plurality of document nodes, and a plurality of edges. The techniques also include identifying installed software packages on a computer system, correlating a plurality of the installed software packages with the distributable vulnerability data to obtain a plurality of installed software packages and associated vulnerabilities, ordering at least some of the plurality of installed software packages and associated vulnerabilities according to threat priority parameters, such that an ordered plurality of installed software packages and associated vulnerabilities is obtained, and providing mitigation information for the ordered plurality of installed software packages and associated vulnerabilities.
申请公布号 US2015242637(A1) 申请公布日期 2015.08.27
申请号 US201514631309 申请日期 2015.02.25
申请人 Verisign, Inc. 发明人 Tonn Trevor;Chang Ray-yu
分类号 G06F21/57 主分类号 G06F21/57
代理机构 代理人
主权项 1. A computer-implemented method comprising: obtaining distributable vulnerability data comprising, for each of a plurality of software packages and associated vulnerabilities, threat mitigation information and a threat priority parameter, wherein the distributable vulnerability data was derived from an intelligence graph comprising a plurality of fundamental instance nodes, a plurality of document nodes, and a plurality of edges; identifying installed software packages on a computer system; correlating a plurality of the installed software packages with the distributable vulnerability data to obtain a plurality of installed software packages and associated vulnerabilities; ordering at least some of the plurality of installed software packages and associated vulnerabilities according to threat priority parameters, whereby an ordered plurality of installed software packages and associated vulnerabilities is obtained; and providing mitigation information for the ordered plurality of installed software packages and associated vulnerabilities.
地址 Reston VA US