US-20260129073-A1 - APPARATUSES AND METHODS FOR FACILITATING VULNERABILITY REMEDIATIONS AND SOLUTIONS VIA ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
Abstract
Aspects of the subject disclosure may include, for example, obtaining a first indication of a first vulnerability in a first communication network or system, based on the obtaining of the first indication, analyzing the first vulnerability, based on the analyzing, determining that the first vulnerability is a vulnerability of first impression, based on the determining, generating a first solution to the first vulnerability utilizing machine learning, artificial intelligence, or a combination thereof, and based on the generating, implementing the first solution as part of the first communication network or system to address the first vulnerability in the first communication network or system. Other embodiments are disclosed.
Inventors
- Mitchell Gunnels
- Prakash Rangavittal Bigamudra
Assignees
- AT&T INTELLECTUAL PROPERTY I, L.P.
Dates
- Publication Date
- 20260507
- Application Date
- 20260105
Claims (20)
- 1 . A device, comprising: a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations comprising: obtaining a first indication of a first vulnerability in a first communication network or system; based on the obtaining of the first indication, analyzing the first vulnerability; based on the analyzing, determining that the first vulnerability is a vulnerability of first impression; based on the determining, generating a first solution to the first vulnerability utilizing machine learning, artificial intelligence, or a combination thereof; based on the generating, implementing the first solution in respect of a first resource as part of the first communication network or system to address the first vulnerability in the first communication network or system determining that a solution to a second vulnerability associated with the first communication network or system is lacking; generating, based on the determining that the solution to the second vulnerability associated with the first communication network or system is lacking and the first solution, a second solution utilizing generative artificial intelligence, wherein the generating of the second solution includes a modification to the first solution; and implementing the second solution in respect of a second resource of the first communication network or system.
- 2 . The device of claim 1 , wherein the second resource is different from the first resource.
- 3 . The device of claim 1 , wherein the generating of the first solution comprises utilizing generative artificial intelligence.
- 4 . The device of claim 1 , wherein the analyzing of the first vulnerability comprises identifying a first characteristic of the first vulnerability.
- 5 . The device of claim 4 , wherein the determining that the first vulnerability is the vulnerability of first impression comprises determining that the first characteristic of the first vulnerability does not match characteristics of vulnerabilities previously encountered.
- 6 . The device of claim 4 , wherein the operations further comprise: obtaining a second indication of a third vulnerability; based on the obtaining of the second indication, analyzing the third vulnerability to identify a second characteristic of the third vulnerability; determining that the second characteristic matches the first characteristic; and based on the determining that the second characteristic matches the first characteristic, implementing the first solution to address the third vulnerability.
- 7 . The device of claim 6 , wherein the third vulnerability is in the first communication network or system.
- 8 . The device of claim 6 , wherein the third vulnerability is in a second communication network or system that is different from the first communication network or system.
- 9 . The device of claim 1 , wherein the operations further comprise: storing a record of the implementing of the first solution, resulting in a stored record.
- 10 . The device of claim 1 , wherein the operations further comprise: based on the generating of the first solution, testing the first solution, wherein the implementing of the first solution is based on the testing validating the first solution.
- 11 . The device of claim 1 , wherein the implementing of the first solution in respect of the first resource comprises applying the first solution to infrastructure of the first communication network or system.
- 12 . The device of claim 11 , wherein the infrastructure comprises: cloud computing infrastructure, a base station, a server, an access point, a router, a switch, or any combination thereof.
- 13 . The device of claim 1 , wherein the implementing of the first solution in respect of the first resource comprises applying the first solution to an application, a user equipment, or a combination thereof.
- 14 . The device of claim 1 , wherein the operations further comprise: obtaining a user-generated input, wherein the generating of the first solution is based on the user-generated input.
- 15 . The device of claim 1 , wherein the generating of the first solution is based on first data that is publicly accessible.
- 16 . The device of claim 15 , wherein the generating of the first solution is based on second data that is accessible only to an operator of the first communication network or system.
- 17 . A non-transitory machine-readable medium, comprising executable instructions that, when executed by a processing system including a processor, facilitate performance of operations, the operations comprising: scanning a communication network or system to identify at least one vulnerability; causing an indication of the at least one vulnerability to be presented at a user terminal; obtaining a first user-generated input from the user terminal based on the causing; based on the first user-generated input and first data accessed from a first database, generating a recommendation regarding a first solution to be implemented in respect of a first plurality of resources to address the at least one vulnerability, the generating utilizing machine learning, artificial intelligence, or a combination thereof; determining that a solution to a second at least one vulnerability associated with the communication network or system is lacking; generating, based on the determining that the solution to the second at least one vulnerability associated with the communication network or system is lacking and the first solution, a second solution utilizing generative artificial intelligence, wherein the generating of the second solution includes a modification to the first solution; and implementing, based on the generating of the second solution, the second solution in respect of a second plurality of resources of the communication network or system.
- 18 . The non-transitory machine-readable medium of claim 17 , wherein the operations further comprise: causing the recommendation to be presented at the user terminal; obtaining, based on the causing of the recommendation to be presented at the user terminal, a second user-generated input that modifies the first solution, resulting in a modified solution; and causing the modified solution to be implemented in the communication network or system to address the at least one vulnerability.
- 19 . A method, comprising: determining, by a processing system including a processor, that a solution to a vulnerability associated with a communication network or system is lacking, resulting in a first determination; generating, by the processing system and based on the first determination, a first solution utilizing generative artificial intelligence; causing, by the processing system and based on the generating of the first solution, the first solution to be implemented in respect of each of a first plurality of resources of the communication network or system to address the vulnerability; determining, by the processing system, that a solution to a second vulnerability associated with the communication network or system is lacking, resulting in a second determination; generating, by the processing system and based on the second determination and the first solution, a second solution utilizing generative artificial intelligence, wherein the generating of the second solution includes a modification to the first solution; and implementing, by the processing system and based on the generating of the second solution, the second solution to be implemented in respect of each of a second plurality of resources of the communication network or system.
- 20 . The method of claim 19 , wherein the causing of the first solution to be implemented comprises a utilization of a first script, and wherein the method further comprises: generating, by the processing system, the first script; and storing, by the processing system, the first script for use in respect of addressing a third vulnerability.
Description
CROSS REFERENCE TO RELATED APPLICATIONS This application is a continuation of U.S. patent application Ser. No. 18/498,122 filed on Oct. 31, 2023. All sections of the aforementioned application(s) are incorporated herein by reference in their entirety. FIELD OF THE DISCLOSURE The subject disclosure relates to apparatuses and methods for facilitating vulnerability remediations and solutions via artificial intelligence and machine learning. BACKGROUND As the world increasingly becomes connected via vast communication networks and systems and via various communication devices, additional opportunities are created/generated to provision communication services. However, the provisioning of communication services is accompanied by a host of challenges. For example, infrastructure, user equipment/terminals, code, and cloud vulnerabilities pose significant challenges to maintaining security and reliability in communication networks and systems. In some instances, it may be difficult to identify a vulnerability before negative consequences are imposed in/on a communication network or system. Further, even when a vulnerability is identified, it may take significant time to remediate or rectify the vulnerability. In the interim period of time between when a vulnerability is identified and when a solution addressing the vulnerability is implemented, a communication network or system may continue to be susceptible to degradation or damage. In some instances, a network/system operator or service provider may deactivate or disable functionality while a solution is being implemented, which may detract from a quality of service or quality of user experience. BRIEF DESCRIPTION OF THE DRAWINGS Reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein: FIG. 1 is a block diagram illustrating an exemplary, non-limiting embodiment of a communications network in accordance with various aspects described herein. FIG. 2A is a block diagram illustrating an example, non-limiting embodiment of a system in accordance with various aspects described herein. FIG. 2B depicts a flowchart of an illustrative embodiment of a method in accordance with various aspects described herein. FIG. 3 is a block diagram illustrating an example, non-limiting embodiment of a virtualized communication network in accordance with various aspects described herein. FIG. 4 is a block diagram of an example, non-limiting embodiment of a computing environment in accordance with various aspects described herein. FIG. 5 is a block diagram of an example, non-limiting embodiment of a mobile network platform in accordance with various aspects described herein. FIG. 6 is a block diagram of an example, non-limiting embodiment of a communication device in accordance with various aspects described herein. DETAILED DESCRIPTION The subject disclosure describes, among other things, illustrative embodiments for generating and implementing solutions and remediations in respect of vulnerabilities as part of communication networks and systems, and in relation to communication services. Other embodiments are described in the subject disclosure. One or more aspects of the subject disclosure include, in whole or in part, obtaining a first indication of a first vulnerability in a first communication network or system; based on the obtaining of the first indication, analyzing the first vulnerability; based on the analyzing, determining that the first vulnerability is a vulnerability of first impression; based on the determining, generating a first solution to the first vulnerability utilizing machine learning, artificial intelligence, or a combination thereof; and based on the generating, implementing the first solution as part of the first communication network or system to address the first vulnerability in the first communication network or system. One or more aspects of the subject disclosure include, in whole or in part, scanning a communication network or system to identify at least one vulnerability; causing an indication of the at least one vulnerability to be presented at a user terminal; obtaining a first user-generated input from the user terminal based on the causing; and based on the first user-generated input and first data accessed from a first database, generating a recommendation regarding a solution in respect of the at least one vulnerability, the generating utilizing machine learning, artificial intelligence, or a combination thereof. One or more aspects of the subject disclosure include, in whole or in part, determining, by a processing system including a processor, that a solution to a vulnerability associated with a communication network or system is lacking, resulting in a first determination; generating, by the processing system and based on the first determination, a first solution utilizing generative artificial intelligence; and causing, by the processing system and based on the generating of the first solut