US 12,413,615 B2
Attack path and graph creation based on user and system profiling
Mayuresh Vishwas Dani, Fremont, CA (US); Ankur S. Tyagi, Foster City, CA (US); and Rishikesh Jayaram Bhide, Pune (IN)
Assigned to Qualys, Inc., Foster City, CA (US)
Filed by Qualys, Inc., Foster City, CA (US)
Filed on Mar. 8, 2024, as Appl. No. 18/600,442.
Application 18/600,442 is a continuation of application No. 17/839,339, filed on Jun. 13, 2022, granted, now 11,968,225.
Application 17/839,339 is a continuation of application No. 16/516,734, filed on Jul. 19, 2019, granted, now 11,363,052, issued on Jun. 14, 2022.
Prior Publication US 2024/0214411 A1, Jun. 27, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1433 (2013.01) 22 Claims
OG exemplary drawing
 
1. A method comprising:
determining user information associated with or based on one or more user attributes associated with a vulnerability of a computing device, wherein the one or more user attributes associated with the vulnerability of the computing device comprises first data associated with at least two of:
a website or application,
a browser or application history,
a downloaded or executed file, or
a password, privilege, or configuration;
quantifying the user information associated with or based on the one or more user attributes associated with the vulnerability of the computing device, thereby generating quantified user information;
determining system exploitability information of the computing device, the system exploitability information associated with or based on one or more of:
the vulnerability of the computing device, and
a security window associated with the computing device;
quantifying the system exploitability information of the computing device, thereby generating quantified system exploitability information;
determining system criticality information of the computing device, the system criticality information associated with or based on one or more of:
an asset associated with the computing device, and
a first service associated with the computing device;
quantifying the system criticality information of the computing device, thereby generating quantified system criticality information; and
generating a risk profile for the computing device based on the quantified user information, the quantified system exploitability information, and the quantified system criticality information.