Geographical vulnerability mitgation response mapping system
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-003/048
G06F-015/177
H04L-012/64
H04L-012/24
H04L-029/06
H04L-029/12
출원번호
US-0975595
(2010-12-22)
등록번호
US-8990696
(2015-03-24)
발명자
/ 주소
McConnell, James Trent
출원인 / 주소
Verizon Corporate Services Group Inc.
인용정보
피인용 횟수 :
0인용 특허 :
55
초록▼
Systems and methods for geographically mapping a vulnerability of a network having one or more network points include receiving vulnerability information identifying a vulnerability of a point of the network, correlating the vulnerability information with location information for the identified netw
Systems and methods for geographically mapping a vulnerability of a network having one or more network points include receiving vulnerability information identifying a vulnerability of a point of the network, correlating the vulnerability information with location information for the identified network point, and network identification information for the identified network point, and generating a map displaying a geographical location of the vulnerability.
대표청구항▼
1. A computer-implemented method for displaying a vulnerability of a network comprising one or more computers, the method comprising: receiving network vulnerability information identifying a vulnerable computer in the network;determining a network address of the identified vulnerable computer based
1. A computer-implemented method for displaying a vulnerability of a network comprising one or more computers, the method comprising: receiving network vulnerability information identifying a vulnerable computer in the network;determining a network address of the identified vulnerable computer based on the received network vulnerability information;determining a geographical location of the identified vulnerable computer based on the determined network address of the identified vulnerable computer;receiving mitigation response status information indicative of a status of a mitigation response to the identified vulnerable computer;providing a geographical map including at least the geographical location of the identified vulnerable computer;providing a network vulnerability symbol on the map designating the geographical location of the vulnerable computer; andgraphically distinguishing the network vulnerability symbol on the map to indicate the status of the mitigation response. 2. The method of claim 1, wherein the network vulnerability information includes an Internet Protocol (IP) address associated with the identified vulnerable computer. 3. The method of claim 1, wherein the network address includes at least one of a media access control (MAC) address or a router address associated with the identified vulnerable computer. 4. The method of claim 1, wherein: determining a network address includes looking up the network address in a network address database using the received vulnerability information; anddetermining a geographical location includes looking up the geographical location in a geographical location database using the determined network address. 5. The method of claim 1, further including storing, in a map database, a vulnerability record for the identified vulnerable computer, the vulnerability record including the vulnerability information, the network address, the geographical location information, and the mitigation response status information associated with the identified vulnerable computer. 6. The method of claim 1, wherein the status of the mitigation response includes new, open, assigned to a mitigation response team, or closed. 7. The method of claim 1, further including: receiving new mitigation response status information indicating a new status of the mitigation response; andupdating the network vulnerability symbol on the map to indicate the new status of the mitigation response. 8. A non-transitory computer-readable storage medium storing instructions which, when executed by a computer, cause the computer to perform a method for displaying a vulnerability of a network having one or more network points, the method comprising: receiving network vulnerability information identifying a vulnerable computer in the network;determining a network address of the identified vulnerable computer based on the received network vulnerability information;determining a geographical location of the identified vulnerable computer based on the determined network address of the identified vulnerable computer;receiving mitigation response status information indicative of a status of a mitigation response to the identified vulnerable computer;providing a geographical map including at least the geographical location of the identified vulnerable computer;providing a network vulnerability symbol on the map designating the geographical location of the vulnerable computer; andgraphically distinguishing the network vulnerability symbol on the map to indicate the status of the mitigation response. 9. The computer-readable storage medium of claim 8, wherein the network vulnerability information includes an Internet Protocol (IP) address associated with the identified vulnerable computer. 10. The computer-readable storage medium of claim 8, wherein the network address includes at least one of a media access control (MAC) address or a router address associated with the identified vulnerable computer. 11. The computer-readable storage medium of claim 8, wherein the method further includes: determining a network address includes looking up the network address in a network address database using the received vulnerability information; anddetermining a geographical location includes looking up the geographical location in a geographical location database using the determined network address. 12. The computer-readable storage medium of claim 8, wherein the method further includes storing, in a map database, a vulnerability record for the identified vulnerable computer, the vulnerability record including the vulnerability information, the network address, the geographical location information, and the mitigation response status information associated with the identified vulnerable computer. 13. The computer-readable storage medium of claim 8, wherein the status of the mitigation response includes new, open, assigned to a mitigation response team, or closed. 14. The computer-readable storage medium of claim 8, wherein the method further includes: receiving new mitigation response status information indicating a new status of the mitigation response; andupdating the network vulnerability symbol on the map to indicate the new status of the mitigation response. 15. A computer-implemented method for representing vulnerabilities of a network comprising a plurality of network points, the method comprising: receiving, at a computer, network vulnerability information identifying a plurality of vulnerable computers on the network;determining network addresses of the identified vulnerable computers based on the received network vulnerability information;determining geographical locations of the identified vulnerable computers based on the determined network addresses of the identified vulnerable computers;receiving mitigation response status information indicative of statuses of mitigation responses to the identified vulnerable computers;providing a geographical map including at least the geographical locations of the identified vulnerable computers;providing network vulnerability symbols on the map designating the geographical locations of the vulnerable computers; andgraphically distinguishing the network vulnerability symbols on the map to indicate the respective statuses of the mitigation responses to the vulnerable computers. 16. The method of claim 15, wherein the network vulnerability information includes Internet Protocol (IP) addresses associated with the identified vulnerable computers. 17. The method of claim 15, wherein the network addresses include at least one of media access control (MAC) addresses or a router addresses associated with the identified vulnerable computers. 18. The method of claim 15, wherein: determining network addresses includes looking up the network addresses in a network address database using the received vulnerability information; anddetermining geographical locations includes looking up the geographical locations in a geographical location database using the determined network addresses. 19. The method of claim 15, further including storing, in a map database, vulnerability records for the identified vulnerable computers, the vulnerability records including the respective vulnerability information, network addresses, geographical location information, and mitigation response status information associated with the identified vulnerable computers. 20. The method of claim 15, wherein the status of the mitigation responses include new, open, assigned to a mitigation response team, or closed. 21. The method of claim 15, further including: receiving new mitigation response status information indicating a new statuses of the mitigation responses; andupdating the network vulnerability symbols on the map to indicate the new statuses of the mitigation responses.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (55)
Hill Douglas W. ; Lynn James T., Adaptive system and method for responding to computer network security attacks.
Grandin, Ronan Fran.cedilla.ois Daniel; Stevenson, David James; Gray, Andrew Hunter; Gray, Neil William, Apparatus and method for providing improved stress thresholds in network management systems.
Richardson,David E., Dynamically drilling-down through a health monitoring map to determine the health status and cause of health problems associated with network objects of a managed network environment.
James E. Kracht, Mechanism for determining actual physical topology of network based on gathered configuration information representing true neighboring devices.
Cochran, Charles W.; York, Justin E.; Schunicht, Geoffery A.; Hansen, Peter A., Method and apparatus for automatic monitoring of simple network management protocol manageable devices.
Cook, Mark Douglas; Valentine, Simon Peter; Jones, Paul Robert, Program method and apparatus providing elements for interrogating devices in a network.
Cohen, Alexander J.; Jung, Edward K. Y.; Lord, Robert W.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Levien, Royce A.; Malamud, Mark A., Signal routing dependent on a loading indicator of a mobile node.
Williams, John Leslie; Costello, Brian; Ravenel, John Patrick; Ritter, Stephen J.; Pelly, John; Rutherford, M. Celeste; Payne, John, System and method for automated policy audit and remediation management.
Hoyt, Travis E.; Cimijotti, Mark T.; Upchurch, II, Jack D.; Legette, Tyron; Stranathan, William T.; Lang, Robert A., System and method for management of vulnerability assessment.
McClure, Stuart C.; Kurtz, George; Keir, Robin; Beddoe, Marshall A.; Morton, Michael J.; Prosise, Christopher M.; Cole, David M.; Abad, Christopher, System and method for network vulnerability detection and reporting.
DeLuca,Steve A; Darcy,Paul B; Kiernan,Casey L; Martin,Sally J; Lee,Juhan; Hodge,Kevin A; Snover,Jeffrey P, System and method for providing a server control interface.
Du,Weimin; Rahman,Anisur; Banerjee,Raja; Gharat,Sunil, System and method for suppressing out-of-order side-effect alarms in heterogenoeus integrated wide area data and telecommunication networks.
Norman,Stuart; Halasz,David E., System and method of controlling access by a wireless client to a network that utilizes a challenge/handshake authentication protocol.
Andres, Steven G.; Cole, David M.; Cummings, Thomas Gregory; Garcia, Roberto Ramon; Kenyon, Brian Michael; Kurtz, George R.; McClure, Stuart Cartier; Moore, Christopher William; O'Dea, Michael J.; Saruwatari, Ken D., System and method of managing network security risks.
Garrett ; Sr. Charles N. (Wilmington NC) Garrett Anthony F. (Greer SC) Reed Brent W. (Greenville SC) Lovegrove William P. (Greenville SC), System for monitoring vehicles during a crisis situation.
Weinberger, Alan J.; Renton, Joseph J.; Neugaubauer, Rick, Transaction dispatcher for a passenger entertainment system, method and article of manufacture.
Park, Young-Man; Lee, Seong-Choon; Tcha, Yong-Joo, Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.