Processing

Please wait...

Settings

Settings

Goto Application

1. WO2022046471 - SYSTEMS AND METHODS FOR DETECTING VULNERABILITIES IN NETWORK PROCESSES DURING RUNTIME

Publication Number WO/2022/046471
Publication Date 03.03.2022
International Application No. PCT/US2021/046341
International Filing Date 17.08.2021
IPC
G06F 21/56 2013.1
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55Detecting local intrusion or implementing counter-measures
56Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/57 2013.1
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
H04L 29/06 2006.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
CPC
G06F 21/566
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55Detecting local intrusion or implementing counter-measures
56Computer malware detection or handling, e.g. anti-virus arrangements
566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
G06F 21/577
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
577Assessing vulnerabilities and evaluating computer system security
H04L 63/1433
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
14for detecting or protecting against malicious traffic
1433Vulnerability analysis
Applicants
  • CISCO TECHNOLOGY, INC. [US]/[US]
Inventors
  • VU, Hai
  • NGUYEN, Thanh Nhan
  • PALKAR, Vaishali
  • MALHOTRA, Varun
  • CHANG, Shih-Chun
  • LIU, Xin
Agents
  • MONAJEMI, Babak
Priority Data
17/003,45026.08.2020US
Publication Language English (en)
Filing Language English (EN)
Designated States
Title
(EN) SYSTEMS AND METHODS FOR DETECTING VULNERABILITIES IN NETWORK PROCESSES DURING RUNTIME
(FR) SYSTÈMES ET PROCÉDÉS DE DÉTECTION DE VULNÉRABILITÉS DANS DES PROCESSUS DE RÉSEAU PENDANT L'EXÉCUTION
Abstract
(EN) Systems, methods, and non-transitory computer-readable storage media are disclosed for detecting vulnerabilities in real-time during execution of a process or an application. In one example, a device may have one or more memories storing computer-readable instructions and one or more processors configured to execute the computer-readable instructions to obtain real-time process information associated with a process executing in an endpoint. The device can then determine package information for a package associated with the process based on the process information. The device can then identify at least one vulnerability associated with the package information using a database of vulnerabilities stored on a backend component of the network. The backend component may have a database of vulnerabilities for packages.
(FR) L'invention concerne des systèmes, des procédés et des supports d'enregistrement non transitoires lisibles par ordinateur permettant de détecter des vulnérabilités en temps réel pendant l'exécution d'un processus ou d'une application. Selon un exemple, un dispositif peut comporter une ou plusieurs mémoires maintenant des instructions lisibles par ordinateur et un ou plusieurs processeurs configurés pour exécuter les instructions lisibles par ordinateur de façon à obtenir des informations de processus en temps réel associées à un processus s'exécutant dans un point d'extrémité. Le dispositif peut ensuite déterminer des informations de paquet d'un paquet associé au processus sur la base des informations de processus. Le dispositif peut ensuite identifier au moins une vulnérabilité associée aux informations de paquet à l'aide d'une base de données de vulnérabilités stockée sur un composant dorsal du réseau. Le composant dorsal peut comporter une base de données de vulnérabilités de paquets.
Related patent documents
Latest bibliographic data on file with the International Bureau