Patents by Inventor Renaud Deraison

Renaud Deraison has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12212597
    Abstract: In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.
    Type: Grant
    Filed: January 18, 2024
    Date of Patent: January 28, 2025
    Assignee: Tenable, Inc.
    Inventors: Barry Sheridan, Vincent Gilcreest, Anthony Bettini, Matthew Ray Everson, Wei Tai, Renaud Deraison
  • Patent number: 12019757
    Abstract: In an embodiment, a threat score prediction model is generated for assigning a threat score to a software vulnerability. The threat score prediction model may factor one or more of (i) a degree to which the software vulnerability is described across a set of public media sources, (ii) a degree to which one or more exploits that have already been developed for the software vulnerability are described across one or more public exploit databases, (iii) information from one or more third party threat intelligence sources that characterizes one or more historic threat events associated with the software vulnerability, and/or (iv) information that characterizes at least one behavior of an enterprise network in association with the software vulnerability.
    Type: Grant
    Filed: September 16, 2022
    Date of Patent: June 25, 2024
    Assignee: Tenable, Inc.
    Inventors: Bryan Peter Doyle, Vincent Gilcreest, Wei Tai, Damien McParland, Renaud Deraison
  • Publication number: 20240154991
    Abstract: In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.
    Type: Application
    Filed: January 18, 2024
    Publication date: May 9, 2024
    Inventors: Barry SHERIDAN, Vincent GILCREEST, Anthony BETTINI, Matthew Ray EVERSON, Wei TAI, Renaud DERAISON
  • Publication number: 20240031396
    Abstract: Techniques, methods and/or apparatuses are disclosed that enable prediction of cyber risks of assets of networks. Through the disclosed techniques, a cyber risk prediction model, which may be a form of a machine learning model, may be trained to predict cyber risks. The cyber risk model may be provided to a cyber risk predictor two predict cyber risks of an asset, without the need to scan the asset at a very deep scan level.
    Type: Application
    Filed: October 2, 2023
    Publication date: January 25, 2024
    Inventors: Damien McParland, Bryan Doyle, Vincent Gilcreest, Renaud Deraison
  • Patent number: 11882144
    Abstract: In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.
    Type: Grant
    Filed: January 24, 2022
    Date of Patent: January 23, 2024
    Assignee: TENABLE, INC.
    Inventors: Barry Sheridan, Vincent Gilcreest, Anthony Bettini, Matthew Ray Everson, Wei Tai, Renaud Deraison
  • Patent number: 11818160
    Abstract: Techniques, methods and/or apparatuses are disclosed that enable prediction of cyber risks of assets of networks. Through the disclosed techniques, a cyber risk prediction model, which may be a form of a machine learning model, may be trained to predict cyber risks. The cyber risk model may be provided to a cyber risk predictor two predict cyber risks of an asset, without the need to scan the asset at a very deep scan level.
    Type: Grant
    Filed: February 22, 2021
    Date of Patent: November 14, 2023
    Assignee: TENABLE, INC.
    Inventors: Damien McParland, Bryan Doyle, Vincent Gilcreest, Renaud Deraison
  • Patent number: 11621974
    Abstract: In an embodiment, a security auditing component obtains a solution set that is based upon a security audit of an enterprise network, the solution set characterizing a set of solutions associated with a set of security issues associated with one or more assets of the enterprise network, detects that the solution set can be condensed into a condensed solution set that mitigates the set of security issues to the same degree as the solution set, the detection being based at least in part upon (i) one or more rules applied to one or more solution texts and/or (ii) asset-specific metadata and/or (iii) static metadata, and condenses, based on the detecting, the solution set into the condensed solution set by combining two or more subsets of related solutions and/or filtering the solution set to remove one or more subsets of redundant or superseded solutions.
    Type: Grant
    Filed: May 14, 2020
    Date of Patent: April 4, 2023
    Assignee: TENABLE, INC.
    Inventors: Katherine Alice Sexton, Nicholas Miles, Nicolas Pouvesle, Renaud Deraison, Clint Merrill, John Walker, Charles Joseph Bacon
  • Publication number: 20230019941
    Abstract: In an embodiment, a threat score prediction model is generated for assigning a threat score to a software vulnerability. The threat score prediction model may factor one or more of (i) a degree to which the software vulnerability is described across a set of public media sources, (ii) a degree to which one or more exploits that have already been developed for the software vulnerability are described across one or more public exploit databases, (iii) information from one or more third party threat intelligence sources that characterizes one or more historic threat events associated with the software vulnerability, and/or (iv) information that characterizes at least one behavior of an enterprise network in association with the software vulnerability.
    Type: Application
    Filed: September 16, 2022
    Publication date: January 19, 2023
    Inventors: Bryan Peter DOYLE, Vincent GILCREEST, Wei TAI, Damien MCPARLAND, Renaud DERAISON
  • Patent number: 11487879
    Abstract: In an embodiment, a threat score prediction model is generated for assigning a threat score to a software vulnerability. The threat score prediction model may factor one or more of (i) a degree to which the software vulnerability is described across a set of public media sources, (ii) a degree to which one or more exploits that have already been developed for the software vulnerability are described across one or more public exploit databases, (iii) information from one or more third party threat intelligence sources that characterizes one or more historic threat events associated with the software vulnerability, and/or (iv) information that characterizes at least one behavior of an enterprise network in association with the software vulnerability.
    Type: Grant
    Filed: December 28, 2018
    Date of Patent: November 1, 2022
    Assignee: TENABLE, INC.
    Inventors: Bryan Peter Doyle, Vincent Gilcreest, Wei Tai, Damien McParland, Renaud Deraison
  • Publication number: 20220272115
    Abstract: Techniques, methods and/or apparatuses are disclosed that enable prediction of cyber risks of assets of networks. Through the disclosed techniques, a cyber risk prediction model, which may be a form of a machine learning model, may be trained to predict cyber risks. The cyber risk model may be provided to a cyber risk predictor two predict cyber risks of an asset, without the need to scan the asset at a very deep scan level.
    Type: Application
    Filed: February 22, 2021
    Publication date: August 25, 2022
    Inventors: Damien McParland, Bryan Doyle, Vincent Gilcreest, Renaud DERAISON
  • Publication number: 20220150274
    Abstract: In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.
    Type: Application
    Filed: January 24, 2022
    Publication date: May 12, 2022
    Inventors: Barry SHERIDAN, Vincent GILCREEST, Anthony BETTINI, Matthew Ray EVERSON, Wei TAI, Renaud DERAISON
  • Patent number: 11258817
    Abstract: In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.
    Type: Grant
    Filed: October 26, 2018
    Date of Patent: February 22, 2022
    Assignee: Tenable, Inc.
    Inventors: Barry Sheridan, Vincent Gilcreest, Anthony Bettini, Matthew Ray Everson, Wei Tai, Renaud Deraison
  • Publication number: 20200366706
    Abstract: In an embodiment, a security auditing component obtains a solution set that is based upon a security audit of an enterprise network, the solution set characterizing a set of solutions associated with a set of security issues associated with one or more assets of the enterprise network, detects that the solution set can be condensed into a condensed solution set that mitigates the set of security issues to the same degree as the solution set, the detection being based at least in part upon (i) one or more rules applied to one or more solution texts and/or (ii) asset-specific metadata and/or (iii) static metadata, and condenses, based on the detecting, the solution set into the condensed solution set by combining two or more subsets of related solutions and/or filtering the solution set to remove one or more subsets of redundant or superseded solutions.
    Type: Application
    Filed: May 14, 2020
    Publication date: November 19, 2020
    Inventors: Katherine Alice SEXTON, Nicholas MILES, Nicholas POUVESLE, Renaud DERAISON, Clint MERRILL, John WALKER, Charles Joseph BACON
  • Publication number: 20200210590
    Abstract: In an embodiment, a threat score prediction model is generated for assigning a threat score to a software vulnerability. The threat score prediction model may factor one or more of (i) a degree to which the software vulnerability is described across a set of public media sources, (ii) a degree to which one or more exploits that have already been developed for the software vulnerability are described across one or more public exploit databases, (iii) information from one or more third party threat intelligence sources that characterizes one or more historic threat events associated with the software vulnerability, and/or (iv) information that characterizes at least one behavior of an enterprise network in association with the software vulnerability.
    Type: Application
    Filed: December 28, 2018
    Publication date: July 2, 2020
    Inventors: Bryan Peter DOYLE, Vincent GILCREEST, Wei TAI, Damien McPARLAND, Renaud DERAISON
  • Publication number: 20200137102
    Abstract: In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.
    Type: Application
    Filed: October 26, 2018
    Publication date: April 30, 2020
    Inventors: Barry SHERIDAN, Vincent GILCREEST, Anthony BETTINI, Matthew Ray EVERSON, Wei TAI, Renaud DERAISON
  • Patent number: 9860265
    Abstract: The system and method described herein may leverage passive and active vulnerability discovery to identify network addresses and open ports associated with connections that one or more passive scanners observed in a network and current connections that one or more active scanners enumerated in the network. The observed and enumerated current connections may be used to model trust relationships and identify exploitable weak points in the network, wherein the exploitable weak points may include hosts that have exploitable services, exploitable client software, and/or exploitable trust relationships. Furthermore, an attack that uses the modeled trust relationships to target the exploitable weak points on a selected host in the network may be simulated to enumerate remote network addresses that could compromise the network and determine an exploitation path that the enumerated remote network addresses could use to compromise the network.
    Type: Grant
    Filed: April 17, 2015
    Date of Patent: January 2, 2018
    Assignee: Tenable Network Security, Inc.
    Inventors: Ron Gula, Renaud Deraison
  • Patent number: 9467464
    Abstract: The disclosure relates to a log correlation engine that may cross-reference or otherwise leverage existing vulnerability data in an extensible manner to support network vulnerability and asset discovery. In particular, the log correlation engine may receive various logs that contain events describing observed network activity and discover a network vulnerability in response to the logs containing at least one event that matches a regular expression in at least one correlation rule that indicates a vulnerability. The log correlation engine may then obtain information about the indicated vulnerability from at least one data source cross-referenced in the correlation rule and generate a report that the indicated vulnerability was discovered in the network, wherein the report may include the information about the indicated vulnerability obtained from the at least one data source cross-referenced in the correlation rule.
    Type: Grant
    Filed: April 8, 2013
    Date of Patent: October 11, 2016
    Assignee: Tenable Network Security, Inc.
    Inventors: Ron Gula, Marcus Ranum, Renaud Deraison
  • Publication number: 20150222655
    Abstract: The system and method described herein may leverage passive and active vulnerability discovery to identify network addresses and open ports associated with connections that one or more passive scanners observed in a network and current connections that one or more active scanners enumerated in the network. The observed and enumerated current connections may be used to model trust relationships and identify exploitable weak points in the network, wherein the exploitable weak points may include hosts that have exploitable services, exploitable client software, and/or exploitable trust relationships. Furthermore, an attack that uses the modeled trust relationships to target the exploitable weak points on a selected host in the network may be simulated to enumerate remote network addresses that could compromise the network and determine an exploitation path that the enumerated remote network addresses could use to compromise the network.
    Type: Application
    Filed: April 17, 2015
    Publication date: August 6, 2015
    Inventors: Ron GULA, Renaud DERAISON
  • Patent number: 9043920
    Abstract: The system and method described herein may leverage passive and active vulnerability discovery to identify network addresses and open ports associated with connections that one or more passive scanners observed in a network and current connections that one or more active scanners enumerated in the network. The observed and enumerated current connections may be used to model trust relationships and identify exploitable weak points in the network, wherein the exploitable weak points may include hosts that have exploitable services, exploitable client software, and/or exploitable trust relationships. Furthermore, an attack that uses the modeled trust relationships to target the exploitable weak points on a selected host in the network may be simulated to enumerate remote network addresses that could compromise the network and determine an exploitation path that the enumerated remote network addresses could use to compromise the network.
    Type: Grant
    Filed: October 17, 2012
    Date of Patent: May 26, 2015
    Assignee: TENABLE NETWORK SECURITY, INC.
    Inventors: Ron Gula, Renaud Deraison
  • Publication number: 20140283083
    Abstract: The system and method described herein relates to a log correlation engine that may cross-reference or otherwise leverage existing vulnerability data in an extensible manner to support network vulnerability and asset discovery. In particular, the log correlation engine may receive various logs that contain events describing observed network activity and discover a network vulnerability in response to the logs containing at least one event that matches a regular expression in at least one correlation rule associated with the log correlation engine that indicates a vulnerability. The log correlation engine may then obtain information about the indicated vulnerability from at least one data source cross-referenced in the correlation rule and generate a report that the indicated vulnerability was discovered in the network, wherein the report may include the information about the indicated vulnerability obtained from the at least one data source cross-referenced in the correlation rule.
    Type: Application
    Filed: April 8, 2013
    Publication date: September 18, 2014
    Applicant: Tenable Network Security, Inc.
    Inventors: Ron GULA, Marcus Ranum, Renaud Deraison