CPC H04L 63/20 (2013.01) [G06F 16/2477 (2019.01); G06F 16/951 (2019.01); H04L 63/1425 (2013.01); H04L 63/1433 (2013.01); H04L 63/1441 (2013.01); H04L 63/1408 (2013.01)] | 4 Claims |
1. A computing system for cybersecurity reconnaissance, analysis, and scoring using distributed computing services, the computing system comprising:
one or more hardware processor configured for:
upon request by a user application:
receiving a domain name for reconnaissance and scoring; and
creating a first queue of Internet search tasks for the domain name using an in-memory associative array service, the search tasks comprising searches for, and receipt of search results for:
a domain name system search for domain name system records;
a domain name system search for domain name system sender policy framework records;
a domain name system search for domain name system domain-based message authentication, reporting, and conformance records; and
a domain name system search for domain name system zone transfer records;
implementing the first queue of Internet search tasks through one or more selectable attribute nodes of a public-facing proxy network;
identifying Internet protocol addresses associated with the domain name from the domain name system records; and
implementing a second queue of Internet protocol address scanning tasks for the identified Internet protocol addresses, the scanning tasks comprising an open port scan for each of a list of open ports for the domain name;
receiving a cybersecurity scoring model comprising category weights for a plurality of categories drawn from: domain name system records, domain name system sender policy framework records, domain name system domain-based message authentication, reporting, and conformance records, zone transfer records, and the list of open ports, and further comprising an algorithm for combining the categories using the category weights;
retrieving the search results and the list of open ports stored in a cloud-based storage bin;
calculating a cybersecurity score by applying the algorithm to the weighted categories; and
generating a cybersecurity profile for the domain name based on the cybersecurity score.
|