发明名称 SYSTEM AND METHOD FOR VULNERABILITY RISK ANALYSIS
摘要 Embodiments of the present invention are directed to a method and system for automated risk analysis. The method includes accessing host configuration information of a host and querying a vulnerability database based on the host configuration information. The method further includes receiving a list of vulnerabilities and accessing a plurality of vulnerability scores. The list of vulnerabilities corresponds to vulnerabilities of the host. Vulnerabilities can be removed from the list based on checking for installed fixes corresponding to vulnerability. A composite risk score can then be determined for the host and each software product of the host based on the plurality of vulnerability scores. An aggregate risk score can then be determined for the host and each software product of the host based on the plurality of vulnerability scores.
申请公布号 US2014189873(A1) 申请公布日期 2014.07.03
申请号 US201012784972 申请日期 2010.05.21
申请人 Elder Matthew Cruz;Kienzle Darrell Martin;Manadhata Pratyusa K.;Persaud Ryan Kumar 发明人 Elder Matthew Cruz;Kienzle Darrell Martin;Manadhata Pratyusa K.;Persaud Ryan Kumar
分类号 G06F21/57 主分类号 G06F21/57
代理机构 代理人
主权项 1. A method for analyzing risk, the method comprising: accessing, within an electronic system, host configuration information of a host; querying a vulnerability database based on said host configuration information; receiving a list of vulnerabilities, wherein said list of vulnerabilities corresponds to vulnerabilities of said host; accessing a plurality of vulnerability scores; determining a composite risk score for at least one of said host and each software product of said host based on said plurality of vulnerability scores, wherein said composite risk score measures at least in part a severity reflecting that an exploited vulnerability is needed by an attacker to compromise at least one of said host and a software product of said host; determining an aggregate risk score for at least one of said host and each software product of said host based on said plurality of vulnerability scores, wherein said aggregate risk score measures at least in part a number of options available to said attacker for compromising at least one of said host and a software product of said host; and reporting said composite risk score and said aggregate risk score.
地址 Germantown MD US