US 11,706,240 B2
Network resource implementation prioritization
Travis Sugarbaker, Seattle, WA (US)
Assigned to CISCO TECHNOLOGY, INC., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Oct. 12, 2020, as Appl. No. 17/68,383.
Application 17/068,383 is a continuation of application No. 15/941,102, filed on Mar. 30, 2018, granted, now 10,862,917.
Claims priority of provisional application 62/488,242, filed on Apr. 21, 2017.
Prior Publication US 2021/0044613 A1, Feb. 11, 2021
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 29/06 (2006.01); H04L 9/40 (2022.01); H04L 43/08 (2022.01)
CPC H04L 63/1433 (2013.01) [H04L 43/08 (2013.01); H04L 63/205 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
determining, for a selected device in a network, at least one user of the selected device;
assigning a user value to the at least one user, wherein the user value is based on an identity of the at least one user;
obtaining behavior information of the at least one user, the behavior information including a list of other devices in the network used by the at least one user;
determining one or more related devices on the network associated with the at least one user by evaluating the behavior information of the at least one user and identifying devices in the network that are in communication with the selected device;
calculating a composite device value for the selected device by combining contributions from: (i) a value of the selected device that is based on direct or indirect relationships to the devices in the network that are in communication with the selected device, (ii) the user value, and (iii) values of the one or more related devices;
determining, for the selected device, a probability factor associated with potential security vulnerabilities affecting the selected device;
calculating a risk score for the selected device based on the composite device value and the probability factor; and
implementing security measures in the network based on a comparison of the risk score for the selected device with a plurality of risk scores for other devices in the network.