AUTO UPDATE OF SENSOR CONFIGURATION
    65.
    发明公开

    公开(公告)号:US20240015083A1

    公开(公告)日:2024-01-11

    申请号:US18470406

    申请日:2023-09-19

    IPC分类号: H04L41/0816 H04L67/12

    CPC分类号: H04L41/0816 H04L67/12

    摘要: Systems, methods, and computer-readable media for updating configurations in sensors deployed in multi-layer virtualized environments. In some examples, a system can track information of sensors and collectors in the network. In response to determining that a specific collector becomes unavailable (e.g., the specific collector is down, offline or becomes unsupported), the system can determine affected sensors corresponding to the specific collector, determine a new collector among active collectors of the network for each of the affected sensors, and dynamically update configuration and settings of the affected sensors to maintain proper collector-to-sensor mappings and other settings on the affected sensors.

    Systems and methods for detecting hidden vulnerabilities in enterprise networks

    公开(公告)号:US11503063B2

    公开(公告)日:2022-11-15

    申请号:US16985605

    申请日:2020-08-05

    IPC分类号: H04L9/40

    摘要: Systems, methods, and non-transitory computer-readable storage media are disclosed for detecting, identifying, and/or assessing hidden vulnerabilities in an enterprise network. In one example, a device may have one or more memories storing computer-readable instructions and one or more processors configured to execute the computer-readable instructions to receive vulnerability data of network components within an enterprise network. The vulnerability data can include identification of one or more vulnerabilities detected within the enterprise network. The device can then determine a vulnerability frequency and a machine frequency associated with each of the one or more vulnerabilities. The device can then determine a vulnerability score for each of the one or more vulnerabilities based on the vulnerability frequency and an inverse of the machine frequency, to yield a plurality of vulnerability scores. The device can then rank the one or more vulnerabilities based on the plurality of vulnerability scores.