GROUP PATCHING RECOMMENDATION AND/OR REMEDIATION WITH RISK ASSESSMENT

    公开(公告)号:US20190129705A1

    公开(公告)日:2019-05-02

    申请号:US15800612

    申请日:2017-11-01

    Abstract: Techniques that facilitate group patching recommendation and/or remediation with risk assessment are provided. In one example, a system includes a vertical stack component, a horizontal stack component and a risk classification component. The vertical stack component identifies a first patch profile from a software system associated with a computer system environment. The horizontal stack component identifies a second patch profile from a hardware system associated with network nodes of the computer system environment. The system learns over time to identify repetitive patterns using machine learning techniques. Then, the risk classification component performs a machine learning process to determine a risk classification for the computer system environment based on the first patch profile and the second patch profile.

    Detecting a Root Cause for a Vulnerability Using Subjective Logic in Social Media

    公开(公告)号:US20190166151A1

    公开(公告)日:2019-05-30

    申请号:US15825089

    申请日:2017-11-28

    Abstract: A method and system of identifying a computing device vulnerability is provided. Social media communication is monitored. Social media threads that are related to a vulnerability, based on the monitored social media communication, are identified, filtered, and categorized into one or more predetermined categories of computing device vulnerabilities. Upon determining that a number of social media posts related to the vulnerability is above a first predetermined threshold, one or more dependable social media threads in a same one or more categories as the vulnerability are searched. One or more possible root causes of the vulnerability are determined from the searched dependable social media threads. A validity score for each of the one or more possible root causes is assigned. A possible root cause from that has a highest validity score that is above a second predetermined threshold is selected to be the root cause of the vulnerability.

Patent Agency Ranking