-
公开(公告)号:US11716343B2
公开(公告)日:2023-08-01
申请号:US16990664
申请日:2020-08-11
发明人: Supreeth Rao , Navindra Yadav , Prasannakumar Jobigenahally Malleshaiah , Hanlin He , Umamaheswaran Arumugam , Robert Bukofser , Aiyesha Ma , Kai Zhu , Ashok Kumar
IPC分类号: H04L9/40 , G06F16/9035 , G06F16/901 , H04L41/22
CPC分类号: H04L63/1433 , G06F16/9024 , G06F16/9035 , H04L41/22 , H04L63/1425
摘要: Systems, methods, and computer-readable media for determine a neighborhood graph can include the following processes. A neighborhood graph system generates a neighborhood graph for a plurality of nodes in an enterprise network, the neighborhood graph representing a multi-hop connections between any two nodes of the plurality of nodes. A security score service determines a security score for each of the plurality of nodes to yield a plurality of scores. The neighborhood graph system updates the neighborhood graph of the plurality of nodes using the plurality of scores to provide a visual representation of securities of the plurality of nodes relative to each other.
-
公开(公告)号:US20210392135A1
公开(公告)日:2021-12-16
申请号:US16899317
申请日:2020-06-11
发明人: Supreeth Rao , Navindra Yadav , Ashok Kumar , Tapan Shrikrishna Patwardhan , Hanlin He , Darshan Shrinath Purandare , Aiyesha Ma , Ning Shan
摘要: The present disclosure relates to methods, systems, and non-transitory computer readable media for receiving, at an authentication service of an enterprise network and from a user device, a request to access an application; determining a user status associated with the request based on information received from at least an identity service engine; determining, based on the user status, whether the user device meets a set of security parameters for accessing the application, to yield a determination; and determining, based on the determination, whether to grant or deny the request for accessing the application.
-
公开(公告)号:US20230370489A1
公开(公告)日:2023-11-16
申请号:US18352036
申请日:2023-07-13
发明人: Supreeth Rao , Navindra Yadav , Prasannakumar Jobigenahally Malleshaiah , Hanlin He , Umamaheswaran Arumugam , Robert Bukofser , Aiyesha Ma , Kai Zhu , Ashok Kumar
IPC分类号: H04L9/40 , G06F16/901 , H04L41/22 , G06F16/9035
CPC分类号: H04L63/1433 , G06F16/9024 , H04L41/22 , H04L63/1425 , G06F16/9035
摘要: Systems, methods, and computer-readable media for determine a neighborhood graph can include the following processes. A neighborhood graph system generates a neighborhood graph for a plurality of nodes in an enterprise network, the neighborhood graph representing a multi-hop connections between any two nodes of the plurality of nodes. A security score service determines a security score for each of the plurality of nodes to yield a plurality of scores. The neighborhood graph system updates the neighborhood graph of the plurality of nodes using the plurality of scores to provide a visual representation of securities of the plurality of nodes relative to each other.
-
公开(公告)号:US11503063B2
公开(公告)日:2022-11-15
申请号:US16985605
申请日:2020-08-05
发明人: Supreeth Hosur Nagesh Rao , Navindra Yadav , Prasannakumar Jobigenahally Malleshaiah , Ashok Kumar , Umamaheswaran Arumugam , Darshan Shrinath Purandare , Songlin Li , Hanlin He
IPC分类号: H04L9/40
摘要: Systems, methods, and non-transitory computer-readable storage media are disclosed for detecting, identifying, and/or assessing hidden vulnerabilities in an enterprise network. In one example, a device may have one or more memories storing computer-readable instructions and one or more processors configured to execute the computer-readable instructions to receive vulnerability data of network components within an enterprise network. The vulnerability data can include identification of one or more vulnerabilities detected within the enterprise network. The device can then determine a vulnerability frequency and a machine frequency associated with each of the one or more vulnerabilities. The device can then determine a vulnerability score for each of the one or more vulnerabilities based on the vulnerability frequency and an inverse of the machine frequency, to yield a plurality of vulnerability scores. The device can then rank the one or more vulnerabilities based on the plurality of vulnerability scores.
-
-
-