-
公开(公告)号:US20200153851A1
公开(公告)日:2020-05-14
申请号:US16734322
申请日:2020-01-04
发明人: Muhammed Fatih Bulut , Lisa Chavez , Jinho Hwang , Anup Kalia , Virginia Mayo Policarpio , Sai Zeng
摘要: A method and system of identifying a computing device vulnerability is provided. Social media communication is monitored. Social media threads that are related to a vulnerability, based on the monitored social media communication, are identified, filtered, and categorized into one or more predetermined categories of computing device vulnerabilities. Upon determining that a number of social media posts related to the vulnerability is above a first predetermined threshold, one or more dependable social media threads in a same one or more categories as the vulnerability are searched. One or more possible root causes of the vulnerability are determined from the searched dependable social media threads. A validity score for each of the one or more possible root causes is assigned. A possible root cause from that has a highest validity score that is above a second predetermined threshold is selected to be the root cause of the vulnerability.
-
公开(公告)号:US10601857B2
公开(公告)日:2020-03-24
申请号:US15825086
申请日:2017-11-28
发明人: Muhammed Fatih Bulut , Lisa Chavez , Jinho Hwang , Virginia Mayo , Maja Vukovic , Sai Zeng
摘要: A method and system of identifying technical experts for an identified vulnerability is provided. One or more technical experts for each of one or more categories of the vulnerability are identified. Questions are sent to and answers are received from the one or more identified technical experts for each of the one or more categories of vulnerabilities, via a chatbot module. Answers to parameters that are missing for a Common Vulnerability Scoring System (CVSS) for the identified vulnerability are determined from the received answers to the parameters. The answers to the parameters are validated and a CVSS score is calculated based on the validated determined answers.
-
公开(公告)号:US11146586B2
公开(公告)日:2021-10-12
申请号:US16734322
申请日:2020-01-04
发明人: Muhammed Fatih Bulut , Lisa Chavez , Jinho Hwang , Anup Kalia , Virginia Mayo Policarpio , Sai Zeng
摘要: A method and system of identifying a computing device vulnerability is provided. Social media communication is monitored. Social media threads that are related to a vulnerability, based on the monitored social media communication, are identified, filtered, and categorized into one or more predetermined categories of computing device vulnerabilities. Upon determining that a number of social media posts related to the vulnerability is above a first predetermined threshold, one or more dependable social media threads in a same one or more categories as the vulnerability are searched. One or more possible root causes of the vulnerability are determined from the searched dependable social media threads. A validity score for each of the one or more possible root causes is assigned. A possible root cause from that has a highest validity score that is above a second predetermined threshold is selected to be the root cause of the vulnerability.
-
公开(公告)号:US10587643B2
公开(公告)日:2020-03-10
申请号:US15825089
申请日:2017-11-28
发明人: Muhammed Fatih Bulut , Lisa Chavez , Jinho Hwang , Anup Kalia , Virginia Mayo Policarpio , Sai Zeng
摘要: A method and system of identifying a computing device vulnerability is provided. Social media communication is monitored. Social media threads that are related to a vulnerability, based on the monitored social media communication, are identified, filtered, and categorized into one or more predetermined categories of computing device vulnerabilities. Upon determining that a number of social media posts related to the vulnerability is above a first predetermined threshold, one or more dependable social media threads in a same one or more categories as the vulnerability are searched. One or more possible root causes of the vulnerability are determined from the searched dependable social media threads. A validity score for each of the one or more possible root causes is assigned. A possible root cause from that has a highest validity score that is above a second predetermined threshold is selected to be the root cause of the vulnerability.
-
-
-