Patents by Inventor Renaud Deraison
Renaud Deraison has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240154991Abstract: In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.Type: ApplicationFiled: January 18, 2024Publication date: May 9, 2024Inventors: Barry SHERIDAN, Vincent GILCREEST, Anthony BETTINI, Matthew Ray EVERSON, Wei TAI, Renaud DERAISON
-
Publication number: 20240031396Abstract: Techniques, methods and/or apparatuses are disclosed that enable prediction of cyber risks of assets of networks. Through the disclosed techniques, a cyber risk prediction model, which may be a form of a machine learning model, may be trained to predict cyber risks. The cyber risk model may be provided to a cyber risk predictor two predict cyber risks of an asset, without the need to scan the asset at a very deep scan level.Type: ApplicationFiled: October 2, 2023Publication date: January 25, 2024Inventors: Damien McParland, Bryan Doyle, Vincent Gilcreest, Renaud Deraison
-
Patent number: 11882144Abstract: In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.Type: GrantFiled: January 24, 2022Date of Patent: January 23, 2024Assignee: TENABLE, INC.Inventors: Barry Sheridan, Vincent Gilcreest, Anthony Bettini, Matthew Ray Everson, Wei Tai, Renaud Deraison
-
Patent number: 11818160Abstract: Techniques, methods and/or apparatuses are disclosed that enable prediction of cyber risks of assets of networks. Through the disclosed techniques, a cyber risk prediction model, which may be a form of a machine learning model, may be trained to predict cyber risks. The cyber risk model may be provided to a cyber risk predictor two predict cyber risks of an asset, without the need to scan the asset at a very deep scan level.Type: GrantFiled: February 22, 2021Date of Patent: November 14, 2023Assignee: TENABLE, INC.Inventors: Damien McParland, Bryan Doyle, Vincent Gilcreest, Renaud Deraison
-
Patent number: 11621974Abstract: In an embodiment, a security auditing component obtains a solution set that is based upon a security audit of an enterprise network, the solution set characterizing a set of solutions associated with a set of security issues associated with one or more assets of the enterprise network, detects that the solution set can be condensed into a condensed solution set that mitigates the set of security issues to the same degree as the solution set, the detection being based at least in part upon (i) one or more rules applied to one or more solution texts and/or (ii) asset-specific metadata and/or (iii) static metadata, and condenses, based on the detecting, the solution set into the condensed solution set by combining two or more subsets of related solutions and/or filtering the solution set to remove one or more subsets of redundant or superseded solutions.Type: GrantFiled: May 14, 2020Date of Patent: April 4, 2023Assignee: TENABLE, INC.Inventors: Katherine Alice Sexton, Nicholas Miles, Nicolas Pouvesle, Renaud Deraison, Clint Merrill, John Walker, Charles Joseph Bacon
-
Publication number: 20230019941Abstract: In an embodiment, a threat score prediction model is generated for assigning a threat score to a software vulnerability. The threat score prediction model may factor one or more of (i) a degree to which the software vulnerability is described across a set of public media sources, (ii) a degree to which one or more exploits that have already been developed for the software vulnerability are described across one or more public exploit databases, (iii) information from one or more third party threat intelligence sources that characterizes one or more historic threat events associated with the software vulnerability, and/or (iv) information that characterizes at least one behavior of an enterprise network in association with the software vulnerability.Type: ApplicationFiled: September 16, 2022Publication date: January 19, 2023Inventors: Bryan Peter DOYLE, Vincent GILCREEST, Wei TAI, Damien MCPARLAND, Renaud DERAISON
-
Patent number: 11487879Abstract: In an embodiment, a threat score prediction model is generated for assigning a threat score to a software vulnerability. The threat score prediction model may factor one or more of (i) a degree to which the software vulnerability is described across a set of public media sources, (ii) a degree to which one or more exploits that have already been developed for the software vulnerability are described across one or more public exploit databases, (iii) information from one or more third party threat intelligence sources that characterizes one or more historic threat events associated with the software vulnerability, and/or (iv) information that characterizes at least one behavior of an enterprise network in association with the software vulnerability.Type: GrantFiled: December 28, 2018Date of Patent: November 1, 2022Assignee: TENABLE, INC.Inventors: Bryan Peter Doyle, Vincent Gilcreest, Wei Tai, Damien McParland, Renaud Deraison
-
Publication number: 20220272115Abstract: Techniques, methods and/or apparatuses are disclosed that enable prediction of cyber risks of assets of networks. Through the disclosed techniques, a cyber risk prediction model, which may be a form of a machine learning model, may be trained to predict cyber risks. The cyber risk model may be provided to a cyber risk predictor two predict cyber risks of an asset, without the need to scan the asset at a very deep scan level.Type: ApplicationFiled: February 22, 2021Publication date: August 25, 2022Inventors: Damien McParland, Bryan Doyle, Vincent Gilcreest, Renaud DERAISON
-
Publication number: 20220150274Abstract: In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.Type: ApplicationFiled: January 24, 2022Publication date: May 12, 2022Inventors: Barry SHERIDAN, Vincent GILCREEST, Anthony BETTINI, Matthew Ray EVERSON, Wei TAI, Renaud DERAISON
-
Patent number: 11258817Abstract: In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.Type: GrantFiled: October 26, 2018Date of Patent: February 22, 2022Assignee: Tenable, Inc.Inventors: Barry Sheridan, Vincent Gilcreest, Anthony Bettini, Matthew Ray Everson, Wei Tai, Renaud Deraison
-
Publication number: 20200366706Abstract: In an embodiment, a security auditing component obtains a solution set that is based upon a security audit of an enterprise network, the solution set characterizing a set of solutions associated with a set of security issues associated with one or more assets of the enterprise network, detects that the solution set can be condensed into a condensed solution set that mitigates the set of security issues to the same degree as the solution set, the detection being based at least in part upon (i) one or more rules applied to one or more solution texts and/or (ii) asset-specific metadata and/or (iii) static metadata, and condenses, based on the detecting, the solution set into the condensed solution set by combining two or more subsets of related solutions and/or filtering the solution set to remove one or more subsets of redundant or superseded solutions.Type: ApplicationFiled: May 14, 2020Publication date: November 19, 2020Inventors: Katherine Alice SEXTON, Nicholas MILES, Nicholas POUVESLE, Renaud DERAISON, Clint MERRILL, John WALKER, Charles Joseph BACON
-
Publication number: 20200210590Abstract: In an embodiment, a threat score prediction model is generated for assigning a threat score to a software vulnerability. The threat score prediction model may factor one or more of (i) a degree to which the software vulnerability is described across a set of public media sources, (ii) a degree to which one or more exploits that have already been developed for the software vulnerability are described across one or more public exploit databases, (iii) information from one or more third party threat intelligence sources that characterizes one or more historic threat events associated with the software vulnerability, and/or (iv) information that characterizes at least one behavior of an enterprise network in association with the software vulnerability.Type: ApplicationFiled: December 28, 2018Publication date: July 2, 2020Inventors: Bryan Peter DOYLE, Vincent GILCREEST, Wei TAI, Damien McPARLAND, Renaud DERAISON
-
Publication number: 20200137102Abstract: In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.Type: ApplicationFiled: October 26, 2018Publication date: April 30, 2020Inventors: Barry SHERIDAN, Vincent GILCREEST, Anthony BETTINI, Matthew Ray EVERSON, Wei TAI, Renaud DERAISON
-
Patent number: 9860265Abstract: The system and method described herein may leverage passive and active vulnerability discovery to identify network addresses and open ports associated with connections that one or more passive scanners observed in a network and current connections that one or more active scanners enumerated in the network. The observed and enumerated current connections may be used to model trust relationships and identify exploitable weak points in the network, wherein the exploitable weak points may include hosts that have exploitable services, exploitable client software, and/or exploitable trust relationships. Furthermore, an attack that uses the modeled trust relationships to target the exploitable weak points on a selected host in the network may be simulated to enumerate remote network addresses that could compromise the network and determine an exploitation path that the enumerated remote network addresses could use to compromise the network.Type: GrantFiled: April 17, 2015Date of Patent: January 2, 2018Assignee: Tenable Network Security, Inc.Inventors: Ron Gula, Renaud Deraison
-
Patent number: 9467464Abstract: The disclosure relates to a log correlation engine that may cross-reference or otherwise leverage existing vulnerability data in an extensible manner to support network vulnerability and asset discovery. In particular, the log correlation engine may receive various logs that contain events describing observed network activity and discover a network vulnerability in response to the logs containing at least one event that matches a regular expression in at least one correlation rule that indicates a vulnerability. The log correlation engine may then obtain information about the indicated vulnerability from at least one data source cross-referenced in the correlation rule and generate a report that the indicated vulnerability was discovered in the network, wherein the report may include the information about the indicated vulnerability obtained from the at least one data source cross-referenced in the correlation rule.Type: GrantFiled: April 8, 2013Date of Patent: October 11, 2016Assignee: Tenable Network Security, Inc.Inventors: Ron Gula, Marcus Ranum, Renaud Deraison
-
Publication number: 20150222655Abstract: The system and method described herein may leverage passive and active vulnerability discovery to identify network addresses and open ports associated with connections that one or more passive scanners observed in a network and current connections that one or more active scanners enumerated in the network. The observed and enumerated current connections may be used to model trust relationships and identify exploitable weak points in the network, wherein the exploitable weak points may include hosts that have exploitable services, exploitable client software, and/or exploitable trust relationships. Furthermore, an attack that uses the modeled trust relationships to target the exploitable weak points on a selected host in the network may be simulated to enumerate remote network addresses that could compromise the network and determine an exploitation path that the enumerated remote network addresses could use to compromise the network.Type: ApplicationFiled: April 17, 2015Publication date: August 6, 2015Inventors: Ron GULA, Renaud DERAISON
-
Patent number: 9043920Abstract: The system and method described herein may leverage passive and active vulnerability discovery to identify network addresses and open ports associated with connections that one or more passive scanners observed in a network and current connections that one or more active scanners enumerated in the network. The observed and enumerated current connections may be used to model trust relationships and identify exploitable weak points in the network, wherein the exploitable weak points may include hosts that have exploitable services, exploitable client software, and/or exploitable trust relationships. Furthermore, an attack that uses the modeled trust relationships to target the exploitable weak points on a selected host in the network may be simulated to enumerate remote network addresses that could compromise the network and determine an exploitation path that the enumerated remote network addresses could use to compromise the network.Type: GrantFiled: October 17, 2012Date of Patent: May 26, 2015Assignee: TENABLE NETWORK SECURITY, INC.Inventors: Ron Gula, Renaud Deraison
-
Publication number: 20140283083Abstract: The system and method described herein relates to a log correlation engine that may cross-reference or otherwise leverage existing vulnerability data in an extensible manner to support network vulnerability and asset discovery. In particular, the log correlation engine may receive various logs that contain events describing observed network activity and discover a network vulnerability in response to the logs containing at least one event that matches a regular expression in at least one correlation rule associated with the log correlation engine that indicates a vulnerability. The log correlation engine may then obtain information about the indicated vulnerability from at least one data source cross-referenced in the correlation rule and generate a report that the indicated vulnerability was discovered in the network, wherein the report may include the information about the indicated vulnerability obtained from the at least one data source cross-referenced in the correlation rule.Type: ApplicationFiled: April 8, 2013Publication date: September 18, 2014Applicant: Tenable Network Security, Inc.Inventors: Ron GULA, Marcus Ranum, Renaud Deraison
-
Patent number: 8839442Abstract: The system and method for enabling remote registry service security audits described herein may include scanning a network to construct a model or topology of the network. In particular, the model or topology of the network may include characteristics describing various devices in the network, which may be analyzed to determine whether a remote registry service has been enabled on the devices. For example, the security audits may include performing one or more credentialed policy scans to enable the remote registry service for certain devices that have disabled the remote registry service, auditing the devices in response to enabling the remote registry service, and then disabling the remote registry service on the devices. Thus, the system and method described herein may enable remotely scanning information contained in device registries during a security audit without exposing the device registries to malicious activity.Type: GrantFiled: October 31, 2012Date of Patent: September 16, 2014Assignee: Tenable Network Security, Inc.Inventor: Renaud Deraison
-
Patent number: 8707440Abstract: The system and method for passively identifying encrypted and interactive network sessions described herein may distribute a passive vulnerability scanner in a network, wherein the passive vulnerability scanner may observe traffic travelling across the network and reconstruct a network session from the observed traffic. The passive vulnerability scanner may then analyze the reconstructed network session to determine whether the session was encrypted or interactive (e.g., based on randomization, packet timing characteristics, or other qualities measured for the session). Thus, the passive vulnerability scanner may monitor the network in real-time to detect any devices in the network that run encrypted or interactive services or otherwise participate in encrypted or interactive sessions, wherein detecting encrypted and interactive sessions in the network may be used to manage changes and potential vulnerabilities in the network.Type: GrantFiled: March 22, 2010Date of Patent: April 22, 2014Assignee: Tenable Network Security, Inc.Inventors: Ron Gula, Renaud Deraison, Matthew T. Hayton