The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Mar. 09, 2021

Filed:

Aug. 27, 2018
Applicant:

Microsoft Technology Licensing, Llc, Redmond, WA (US);

Inventors:

Yotam Livny, Gadera, IL;

Mathias Abraham Marc Scherman, Tel Aviv, IL;

Moshe Israel, Herzelia, IL;

Ben Kliger, Ramat Gan, IL;

Ram Haim Pliskin, Rishon Lezion, IL;

Roy Levin, Haifa, IL;

Michael Zeev Bargury, Ramat Gan, IL;

Assignee:
Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06N 20/00 (2019.01); G06N 3/08 (2006.01);
U.S. Cl.
CPC ...
H04L 63/1491 (2013.01); G06N 3/08 (2013.01); G06N 20/00 (2019.01); H04L 63/1416 (2013.01); H04L 63/1433 (2013.01);
Abstract

A system for predicting vulnerability of network resources is provided. The system can calculate an initial vulnerability score for each of the network resources and use the initial vulnerability scores along with activity data of the network resources to train a vulnerability model. After training, the vulnerability model can predict the vulnerability of the network resources based on new activity data collected from the network resources. Based on the predicted vulnerability, vulnerable network resources can be identified. Further analysis can be performed by comparing the activities of the vulnerable network resources and other network resources to identify activity patterns unique to the vulnerable network resources as attack patterns. Based on the attack patterns, one or more actions can be taken to increase the security of the vulnerable network resources to avoid further vulnerability.


Find Patent Forward Citations

Loading…