Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Systems and Methods for Improved Network Vulnerability Scanning and Reporting

a vulnerability and network technology, applied in the field of network and computer security, can solve the problems of not many resources available to assist organizations in complying with the bewildering array of standards, posing a significant financial and competitive risk, and not being able to perform rigorous and/or subjective assessments, so as to reduce the attack surface, reduce the number of connections, and improve the control of network access

Active Publication Date: 2022-08-04
TECHSLAYERS LLC
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0007]Various embodiments of the present invention relate to significant improvements in systems and methods for performing vulnerability scanning of an organization's networked assets—i.e., a system that automatically performs the steps necessary in terms of compliance and auditing of an organization's systems, as well as determining security posture in real time. In accordance with various embodiments, a Machine-in-the-Middle Microserviced Security Engine (MiMMSE) is provided that includes a combination of unique features, inter alia: (i) one-way traffic for command execution and security improvement, management for automating services in OS containers, the elimination of multiple connections to services per client to give users more control of network access, total data destruction after each run to reduce attack surfaces, encryption over container services; reverse tunnel or VPN traffic between pods, clusters, and other separated networks; machine learning (e.g., neural-network-based) maps for command execution order to improve security testing accuracy; and complete client data ownership of services to improve security and provide a zero-trust architecture.

Problems solved by technology

Cybersecurity incidents—i.e., events that threaten the confidentiality, integrity, and / or availability of an organization's assets—have increased dramatically in recent years, posing a significant financial and competitive risk.
Unfortunately, privacy and information security has traditionally depended, to a large extent, on human experts and information technology (IT) professionals, who in turn may largely rely on non-rigorous and / or subjective assessments.
There are not many resources available to assist organizations in complying with the bewildering array of standards.
This process is not easy for small companies or even large organizations with a vast network of assets.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and Methods for Improved Network Vulnerability Scanning and Reporting
  • Systems and Methods for Improved Network Vulnerability Scanning and Reporting
  • Systems and Methods for Improved Network Vulnerability Scanning and Reporting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016]The present subject matter relates to improved systems and methods for network vulnerability scanning, reporting, and compliance. As a preliminary matter, it will be understood that the following detailed description is merely exemplary in nature and is not intended to limit the inventions or the application and uses of the inventions described herein. Furthermore, there is no intention to be bound by any theory presented in the preceding background or the following detailed description. In the interest of brevity, conventional techniques and components related to network security and the operation of network components may not, and need not, be described in detail herein.

[0017]In general, a Machine-in-the-Middle Microserviced Security Engine (MiMMSE) system in accordance with various embodiments of the present includes a number of modules or subsystems that together form an improved, automated system for scanning and reporting vulnerabilities of a network and nodes present wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Vulnerability scanning systems and methods are provided for automatically performing the steps necessary for compliance testing and auditing of an organization's systems, and determining security posture in real time. A Machine-in-the-Middle Microserviced Security Engine (MiMMSE) is provided that provides one-way traffic for command execution and security improvement, management for automating services in OS containers, the elimination of multiple connections to services per client to give users more control of network access, total data destruction after each run to reduce attack surfaces, encryption over container services, reverse tunnel or VPN traffic between pods, clusters, and other separated networks, and machine learning (e.g., neural-network-based) maps for command execution order.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application claims priority to U.S. Provisional Patent Application No. 63 / 144,382, filed Feb. 1, 2021, the entire contents of which are hereby incorporated by reference.TECHNICAL FIELD[0002]The present invention relates, generally, to network and computer security and, more particularly, to automated vulnerability scanning and reporting.BACKGROUND[0003]Cybersecurity incidents—i.e., events that threaten the confidentiality, integrity, and / or availability of an organization's assets—have increased dramatically in recent years, posing a significant financial and competitive risk. This has driven a similar increase in the need for vulnerability scanning and reporting. Unfortunately, privacy and information security has traditionally depended, to a large extent, on human experts and information technology (IT) professionals, who in turn may largely rely on non-rigorous and / or subjective assessments.[0004]Furthermore, an increasing number ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/40G06K9/62G06N20/00H04L43/045H04L43/50
CPCH04L63/1433H04L63/1416H04L63/1425H04L43/50G06K9/6256G06N20/00H04L43/045H04L63/0272H04L41/16H04L41/40H04L63/1408G06F18/214
Inventor SHAKE, BRANDON PATRICKCHAVEZ, STEPHEN RANDALLWILLIAMS, PHILLIP VICTOR MICHAEL
Owner TECHSLAYERS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products