20240054229. TECHNIQUES FOR DETECTING APPLICATIONS PATHS UTILIZING EXPOSURE ANALYSIS simplified abstract (Wiz, Inc.)
TECHNIQUES FOR DETECTING APPLICATIONS PATHS UTILIZING EXPOSURE ANALYSIS
Organization Name
Inventor(s)
Matilda Lidgi of Tel Aviv (IL)
Raaz Herzberg of Tel Aviv (IL)
Avi Tal Lichtenstein of Tel Aviv (IL)
TECHNIQUES FOR DETECTING APPLICATIONS PATHS UTILIZING EXPOSURE ANALYSIS - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240054229 titled 'TECHNIQUES FOR DETECTING APPLICATIONS PATHS UTILIZING EXPOSURE ANALYSIS
Simplified Explanation
The abstract describes a system and method for detecting an application path in a cloud computing environment through active inspection.
- Select a reachable resource in the cloud computing environment with at least one network path.
- Choose a second resource with a second network path based on the first resource's network path.
- Actively inspect the second network path to determine accessibility from the first resource.
Potential Applications
- Cloud computing security
- Network optimization in cloud environments
Problems Solved
- Ensuring efficient and secure application paths in cloud computing
- Identifying network connectivity issues in cloud environments
Benefits
- Improved application performance
- Enhanced network security in cloud computing
- Efficient resource utilization in cloud environments
Original Abstract Submitted
a system and method for detecting an application path utilizing active inspection of a cloud computing environment, includes selecting a reachable resource having at least one network path to access the reachable resource, wherein the reachable resource is a cloud object deployed in the cloud computing environment, and accessible from a network which is external to the cloud computing environment; selecting a second resource having a second network path based on the network path of the reachable resource; and actively inspecting the second network path to determine if the second resource is accessible through the second network path from the reachable resource.