Sign In to Follow Application
View All Documents & Correspondence

Intelligent Vulnerability Assessment Tool To Strengthen Security Of Network.

Abstract: ABSTRACT [500] Our Invention “Intelligent Vulnerability Assessment Tool to Strengthen Security of Network” as each association is having an organization at their place for improving on the work. Network design which is underlying the association is a greater amount of intricate nature utilized for putting away the association's touchy information including resources. Such organizations are presented to hidden dangers from inside and outside sources in the association. To ensure the delicate data and keep up with the security stance of the association, directing weakness evaluation and entrance testing is fundamental. To protect the sensitive information and maintain the security posture of the organization, conducting vulnerability assessment is essential. At present talented and prepared individuals in the space of organization reviews are not as a lot of necessities of enterprises. At present the methodology towards mechanized entrance testing chips away at the premise of various strategies which require a structure of the adventure results remembering fixing instrument for the other hand the network safety space is quickly changing with new programming and assault dangers are presented by programmers which makes delivering and keeping up with exceptional models a significant test. This approach can be executed by creating various information situations, and applying different support learning calculations to track down the outcomes with precision and get the ideal arrangement. Framework expects to create results with exactness which will save human resources as far as time utilization, dependability and event of testing. Instruments and techniques in which client cooperation through a typical UI empowers the evaluating of organization security before execution of the organization, just as surveying the security of existing organizations, bits of existing organizations, or alterations to existing organizations. An organization security model valuable in understanding the instruments and strategies is additionally revealed.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
03 March 2022
Publication Number
12/2022
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

Dr. Vishwanath Karad
Survey No, 124, Paud Rd, Kothrud, Pune, Maharashtra 411038,
Asst. Prof. Dipali Nilesh Railkar
Research Scholar, School of Computer Science, MIT-WP University., Pune, Maharashtra, India
Prof. Dr. Shubhalaxmi Joshi.
Associate Dean, Faculty of Science, MIT-WP University., Pune, Maharashtra, India

Inventors

1. Asst. Prof. Dipali Nilesh Railkar
Research Scholar, School of Computer Science, MIT-WP University., Pune, Maharashtra, India
2. Prof. Dr. Shubhalaxmi Joshi.
Associate Dean, Faculty of Science, MIT-WP University., Pune, Maharashtra, India

Specification

1
FORM 2
THE PATENT ACT 1970&
The Patents Rules, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
Indian Patent office. /Delhi/ Mumbai/ Chennai/ Kolkata
TITLE OF THE INVENTION:
Intelligent Vulnerability Assessment Tool to Strengthen Security of Network.
Name Nationality Address
Applicants
Dr. Vishwanath Karad MIT
world peace University AN INDIAN
NATIONAL
Add 1:- Survey No, 124, Paud Rd, Kothrud, Pune,
Maharashtra 411038, Email Id-
shubhalaxmi.joshi@mitwpu.edu.in
Asst. Prof. Dipali Nilesh
Railkar
AN INDIAN
NATIONAL
Add 1:-Research Scholar, School of Computer Science, MIT-
WP University., Pune, Maharashtra, India
Add 2:-Department of Master of Computer Application,
Pimpri Chinchwad College of Engineering, Pune,
Maharashtra, India
Add 3:-Phase-2, D-6, Green Field Housing Society, Shivatirth
Nagar, Kothrud, Pune-411 038
Email Id- railkar.dipali@gmail.com
Prof. Dr. Shubhalaxmi Joshi. AN INDIAN
NATIONAL
Add 1:-Associate Dean, Faculty of Science, MIT-WP
University., Pune, Maharashtra, India
Add 2:- E102, Indradhanu Society, Behind Vanaz Company,
Paud Road, Kothrud, Pune-411 038
Email Id-joshi.shubhalaxmi9@gmail.com
Inventors
Asst. Prof. Dipali Nilesh Railkar AN INDIAN
NATIONAL
Add 1:-Research Scholar, School of Computer Science, MIT-WP
University., Pune, Maharashtra, India
Add 2:-Department of Master of Computer Application, Pimpri
Chinchwad College of Engineering, Pune, Maharashtra, India
Add 3:-Phase-2, D-6, Green Field Housing Society, Shivatirth
Nagar, Kothrud, Pune-411 038
Email Id- railkar.dipali@gmail.com
Prof. Dr. Shubhalaxmi Joshi. AN INDIAN
NATIONAL
Add 1:-Associate Dean, Faculty of Science, MIT-WP University.,
Pune, Maharashtra, India
Add 2:- E102, Indradhanu Society, Behind Vanaz Company, Paud
Road, Kothrud, Pune-411 038
Email Id-joshi.shubhalaxmi9@gmail.com
Complete Specification

FIELD OF THE INVENTION
[501] Our Invention is related to a Intelligent Vulnerability Assessment Tool to
Strengthen Security of Network.
BACKGROUND OF THE INVENTION
[502] There is at present no precise method for breaking down the security
capacities of a given organization engineering, either for a current organization, an
organization being changed, or an organization being sent. That is, a security
examination of an organization is essentially performed after the organization has
been conveyed. In the first place, the organization is sent with the organization
gear's design in light of some assessment of what kinds of safety dangers are
available and how to guard against them.
[503] then, at that point, a set-up of safety tests is run against the organization to
distinguish security weaknesses. Commonly, each test just distinguishes one kind
of safety weakness in each organization component in turn. When the test has
recognized a specific security weakness, the organization component is
reconfigured to address that weakness and the organization examining proceeds.
3
[504] Tragically, notwithstanding the shortcomings of conveying an organization
thusly, at some random moment the degree of organization security relies upon
which security tests have been run and regardless of whether the organization
directors have reconfigured the organization to address the aftereffects of these
security tests.
[505] Since there is no standard strategy or security evaluation instrument, and no
organization security system on which to base security appraisals, the
consequences of the present security evaluations are intensely subject to the
expertise level of the staff playing out the appraisal.
[506] The singular playing out the security appraisal likewise decides the inquiries
to be posed during the security screening, just as concludes which tests ought to be
performed and the way that they ought to be performed. The singular playing out
the security evaluation likewise monitors the data and information that is
accumulated during the appraisal and associates this data and information to
distinguish genuine security weaknesses (sifting through the bogus up-sides).
[507] At last, when the security weaknesses have been distinguished, the individual
should find proposals to address these weaknesses from openly available sources,
(or foster suggestions if none exist) and physically set up a report for a last perused
out to their client. Due to the mind boggling nature of these assignments, most
people take a "cutout" way to deal with performing security appraisals in that they
pose similar inquiries, run similar tests, and so on for each sort of client in a "one-
size fits all" way. Consequently, there are quality control issues and shortcomings
innate in the current practice.
[508] The meaning of weakness the board is the most common way of
distinguishing, arranging, focusing on, and settling weaknesses or shortcomings
inside:
1. working frameworks
2. undertaking applications
3. end-client applications
4. Programs
[509] The cycle ought to be ceaseless since dangers are consistently advancing and
danger specialists can present new frameworks, administrations, and strategies
whenever. Weakness the executives programs are presently a prerequisite - at this
point not simply a choice - for organizations that need to follow hazard the board
systems.
[510] To secure your resources, you should realize what makes them exploitable.
Weakness the board ought to be the reason for any security program since it
educates you regarding everything inside an organization. With this data, the
security work force will know what, when, and how to ensure it.
4
[511] A typical confusion about weakness the executives programs is that they are
equivalent to fix the board programs, yet this isn't completely right. Applying
patches is a method for moderating weakness hazards. Conversely, weakness the
executives forestalls network abuse and works to manage known weaknesses
inside equipment gear and programming.
PRIOR ART SEARCH
[512] To answer the security needs of the market, a favored encapsulation was
created. The favored epitome gives continuous organization security weakness
evaluation tests, potentially complete with suggested security arrangements. Outer
weakness appraisal tests might copy programmer technique in a protected manner
and empower investigation of an organization for security openings, in this way
acquiring a genuine perspective on hazard level without influencing client
activities. Since this evaluation might be performed over the Internet, both
homegrown and overall companies benefit.
[513] The favored epitome's actual subsystems consolidate to frame a versatile all-
encompassing framework that might have the option to lead tests for large number
of clients any spot on the planet. The security abilities of specialists might be
inserted into the favored epitome frameworks and computerized the test
interaction to empower the security weakness test to be directed on a constant
reason for quite a long time simultaneously.
[514] The favored epitome can decrease the work time needed for security
practices of organizations from three weeks to under a day, just as essentially
increment their ability. Part subsystems regularly incorporate a Database,
Command Engine, Gateway, various Testers, Report Generator, and a RMCT.
[515] Systems and strategies for a specialist based methodology that works with
endpoint network traffic investigation are given. As per an encapsulation, a
specialist running on an endpoint gadget related with an undertaking network
gathers network correspondence metadata from the endpoint gadget receptive to
getting callbacks from a piece level following office carried out inside an OS of the
endpoint gadget and locally stores the gathered organization correspondence
metadata.
[516] Further, the specialist performs time sensitive conglomeration of the
gathered metadata to diminish transmission transfer speed and nearby stockpiling
necessities. The accumulated metadata from the endpoint gadget is submitted to an
abnormality location administration when the endpoint gadget is associated with
the venture organization. The irregularity recognition administration utilizes an AI
based methodology for discovery of strange conduct.
OBJECTIVES OF THE INVENTION
5
1. The objective of the invention is to provide a vanquish this quandary one can
utilize Artificial Intelligence and Deep learning procedures to computerize
the weakness evaluation practice.
2. The objective of the invention is to provide assess the danger of organization
and association resources including data frameworks, one needs to discover
the conduct of the aggressor after fruitful abuse which is only post-double-
dealing process.
3. The other objective of the invention is to provide an accomplish this
association needs review including the experts, but there is no free system
which centers on computerizing the total organization review. The proposed
framework is Intelligent Vulnerability Assessment Tool.
4. The other objective of the invention is to provide a Strengthen Security Of
Network. The framework will comprise of a weakness evaluation system
which will utilize Nap contents to help them to produce and catch data, play
out the examining.
5. The other objective of the invention is to provide a “Intelligent Vulnerability
Assessment Tool to Strengthen Security of Network” as each association is
having an organization at their place for improving on the work. Network
design which is underlying the association is a greater amount of intricate
nature utilized for putting away the association's touchy information
including resources.
6. The other objective of the invention is to provide organizations are
presented to hidden dangers from inside and outside sources in the
association. To ensure the delicate data and keep up with the security stance
of the association, directing weakness evaluation and entrance testing is
fundamental.
7. According to claim1,2,3# the invention is to a present talented and prepared
individuals in the space of organization reviews are not as a lot of necessities
of enterprises.
8. The other objective of the invention is to provide a methodology towards
mechanized entrance testing chips away at the premise of various strategies
which require a structure of the adventure results remembering fixing
instrument for the other hand the network safety space is quickly changing
with new programming and assault dangers are presented by programmers
which makes delivering and keeping up with exceptional models a
significant test.
9. The other objective of the invention is to provide a executed by creating
various information situations, and applying different support learning
calculations to track down the outcomes with precision and get the ideal
arrangement. Framework expects to create results with exactness which
will save human resources as far as time utilization, dependability and event
of testing.
10. The other objective of the invention is to provide a Instruments and
techniques in which client cooperation through a typical UI empowers the
evaluating of organization security before execution of the organization, just
as surveying the security of existing organizations, bits of existing
6
organizations, or alterations to existing organizations. An organization
security model valuable in understanding the instruments and strategies is
additionally revealed.
SUMMARY OF THE INVENTION
[517] To vanquish this dilemma one can use Artificial Intelligence and Deep
learning methods to modernize the shortcoming assessment practice. To evaluate
the risk of association and affiliation assets including information structures, one
requirements to find the direct of the attacker after productive maltreatment which
is just post-cheating interaction.
[518] To achieve this affiliation needs survey including the specialists, yet there is
no free framework which revolves around mechanizing the all out association audit.
The proposed system is Intelligent Vulnerability Assessment Tool.
[519] To Strengthen Security Of Network. The structure will contain a shortcoming
assessment framework which will use Nap substance to assist them with creating
and catch information, play out the inspecting.
Identifying Vulnerabilities
[520] The reason for the initial phase in the weakness filtering process is to uncover
every one of the weaknesses inside an organization's current circumstance.
Examining has four phases:
1. The scanner will look through all network-open frameworks
2. It will distinguish open ports and administrations running on the
frameworks
3. The scanner will endeavour to sign into frameworks from a distance to
gather extra data
4. It will contrast the framework's data with known weaknesses
5. Weakness scanners can check an expansive scope of available frameworks
inside an organization, including:
6. workstations
7. virtual and actual servers
8. data sets
9. firewalls
10. printers
11. work areas
[521] The scanner really looks at them for different qualities, for example, working
frameworks, open ports, record framework structure, designs, client accounts, and
so on the weakness scanner will then, at that point, relate the gathered information
to realized weaknesses utilizing a data set comprising of freely known weaknesses.
Evaluating Vulnerabilities
7
[522] After the weakness filter is finished and has recognized weaknesses, the
subsequent stage is assessing the blemishes and arranging them as per their
expected dangers. The assessment depends on the weakness the board
arrangements the association likes to utilize. Note that weakness the executives
methodologies have fluctuating weakness appraisals and scores, however the
Common Vulnerability Scoring System (CVSS) is a standard choice.
[523] The scores will let the association know which weaknesses represent the
most elevated danger and require need alleviation. It is uncommon for a weakness
sweep to create a bogus positive, however it can occur, so organizations ought to
likewise consider different variables as they assess network shortcomings.
[524] These variables might include:
1. The weakness' double-dealing trouble
2. The organization's effect assuming somebody takes advantage of the
weakness
3. Regardless of whether the weakness is exploitable from somebody on the
web
4. The age of the weakness and its timeframe inside the organization
[525] No security apparatus has a 100 percent achievement rate, yet an association
can expand weakness identification and lessen bogus up-sides with infiltration
testing. Pen testing and weakness filtering will uncover the qualities and
shortcomings of the association's organization foundation.
Treating Vulnerabilities
[526] With the openness of framework weaknesses that represent a danger to the
business, the business currently needs to ensure the weakness with the most
noteworthy danger is at the highest point of the fix list. The IT group and organize
partners as a rule team up to decide the proper treatment technique, which could
incorporate remediation, moderation, or acknowledgment.
Remediation
[527] This strategy includes totally fixing a weakness utilizing patch the executives
apparatuses to forestall digital aggressors' double-dealing. It is the favoured choice
moderation.
[528] In the event that remediation is beyond the realm of possibilities, alleviating
the weakness will decrease the danger of aggressors taking advantage of the
organization's imperfection. Moderation is valuable as a brief measure for
weaknesses that are too new to even consider having an appropriate fix. When a fix
is free, the association should ensure it remediates the weakness.
Acknowledgment
8
[529] For okay weaknesses that might cost a larger number of assets to fix than an
assault would cost the organization, it could be smarter to recognize the presence
of the defect and never really fix it.
[530] The association's weakness the executive’s arrangement will suggest
remediation strategies, however they are not generally the best game-plan. In the
present circumstance, the business' security group, framework managers, and
framework proprietors should decide the suitable methodology.
Reporting Vulnerabilities
[531] Routinely directing weakness appraisals assists associations with seeing how
quick and successful their weakness the board program works after some time. The
weakness evaluation gives security groups itemized knowledge into their IT
division's foundation and its shortcomings. With admittance to this weakness
information, the security group can precisely fix and deal with the weaknesses that
compromise the organization.
[532] The information gathered from weakness checking and entrance testing will
incorporate different adjustable reports and dashboards that will give the security
experts a thought of which remediation strategies will best suit the association's
requirements.
[533] Fostering a powerful weakness the executives program is a tedious cycle,
particularly with regards to remediation. To assist associations with beating
network protection challenges without getting overpowered with the assignment
of weakness the board, consider these four hints to further develop a weakness the
executives program:
Regularly Assess Vulnerabilities:
[534] Applications and foundations change so rapidly and frequently that it might
appear to be inordinately difficult for an association to stay aware of the changes.
Constantly filtering the climate for weaknesses will surrender you the best to-date
examination of your organization's blemishes. Your association's weakness the
executive’s arrangement might incorporate extra mixes that will give security work
force constant reports.
Perform Comprehensive Scans:
[535] It is as of now insufficient for organizations to filter servers and work areas
inside their undertaking organization and do nothing else. IT foundation develops
excessively fast, so a complete methodology is more proper. Any weakness the
executives program in your association ought to incorporate intensive outputs into
its whole assault surface, including the cloud and gadgets associated with the
organization interestingly.
Move Quickly:
11
and devices along with the applications. The reports will be generated and communicated
to the IT administrator or the network administrator of the organization.
DESCRIPTION OF THE INVENTION
[547] the subject innovation will be basically portrayed inside the setting of an
organization security model and instruments, strategies and device for evaluating
network security before execution of a circuit exchanged organization or parcel
exchanged organization. Nonetheless, it will be valued by those talented in the
craftsmanship that the current creation is likewise pertinent to surveying existing
organizations and proposed adjustments to existing organizations.
[548] Besides, the security model and related devices, techniques and mechanical
assembly are very valuable to hardware makers and application designers looking
to guarantee that their items and administrations are created with a view towards
the general organization security rather than their present individual item
arranged concentration.
[549] While different capacities and additionally modules will be portrayed thus, it
will be valued that the expression "module" is to be comprehensively deciphered to
address a capacity or gathering of capacities which might be carried out in
programming and which might address a model, parts of a model, a device,
segments of an instrument and, all the more by and large, any single or join
usefulness, for example, examined in this.
12
WE CLAIMS
1. Our Invention “Intelligent Vulnerability Assessment Tool to Strengthen
Security of Network” is a Here each association is having an organization at
their place for improving on the work. Network design which is underlying
the association is a greater amount of intricate nature utilized for putting
away the association's touchy information including resources. Such
organizations are presented to hidden dangers from inside and outside
sources in the association. To ensure the delicate data and keep up with the
security stance of the association, directing weakness evaluation and
entrance testing is fundamental. At present talented and prepared
individuals in the space of organization reviews are not as a lot of necessities
of enterprises. At present the methodology towards mechanized entrance
testing chips away at the premise of various strategies which require a
structure of the adventure results remembering fixing instrument for the
other hand the network safety space is quickly changing with new
programming and assault dangers are presented by programmers which
makes delivering and keeping up with exceptional models a significant test.
This approach can be executed by creating various information situations,
and applying different support learning calculations to track down the
outcomes with precision and get the ideal arrangement. Framework expects
to create results with exactness which will save HR as far as time utilization,
dependability and event of testing. Instruments and techniques in which
client cooperation through a typical UI empowers the evaluating of
organization security before execution of the organization, just as surveying
the security of existing organizations, bits of existing organizations, or
alterations to existing organizations. An organization security model
valuable in understanding the instruments and strategies is additionally
revealed.
2. According to claim1# the invention is to a “Intelligent Vulnerability
Assessment Tool to Strengthen Security of Network” is a Here each
association is having an organization at their place for improving on the
work. Network design which is underlying the association is a greater
amount of intricate nature utilized for putting away the association's touchy
information including resources.
3. According to claim1,2 # the invention is to a organizations are presented to
hidden dangers from inside and outside sources in the association. To
ensure the delicate data and keep up with the security stance of the
association, directing weakness evaluation and entrance testing is
fundamental.
4. According to claim1,2,3# the invention is to a present talented and prepared
individuals in the space of organization reviews are not as a lot of necessities
of enterprises.
5. According to claim1,2,4# the invention is to a methodology towards
mechanized entrance testing chips away at the premise of various strategies
which require a structure of the adventure results remembering fixing
instrument for the other hand the network safety space is quickly changing

Documents

Application Documents

# Name Date
1 202221011556-FORM 1 [03-03-2022(online)].pdf 2022-03-03
2 202221011556-DRAWINGS [03-03-2022(online)].pdf 2022-03-03
3 202221011556-COMPLETE SPECIFICATION [03-03-2022(online)].pdf 2022-03-03
4 202221011556-FORM-9 [08-03-2022(online)].pdf 2022-03-08
5 202221011556-FORM-26 [08-03-2022(online)].pdf 2022-03-08
6 Abstract1.jpg 2022-03-19
7 202221011556-Proof of Right [05-09-2024(online)].pdf 2024-09-05