×

Assessing and managing cyber threats

  • US 10,122,751 B2
  • Filed: 09/06/2017
  • Issued: 11/06/2018
  • Est. Priority Date: 12/22/2011
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • one or more computers comprising one or more hardware processors;

    one or more computer-readable media storing instructions that, when executed by the one or more computers, cause the one or more computers to perform operations comprising;

    receiving, by the one or more computers, data indicating a list of observed computer-based threats including at least one selected from the group consisting of a virus, malware, a network intrusion, and a denial of service attack, with data for each threat identifying frequency of occurrence, which may include at least one period of time and corresponding frequency of occurrence for a given time window having a beginning and end;

    accessing, by the one or more computers, data specifying relationships between;

    (i) IT system infrastructures representing computing devices of an organization and a network connecting the computing devices and their physical and logical location, defined by information such as identity, name and category identity;

    (ii) system categories indicating characteristics of assets of the organization;

    (iii) operational processes of an organization, defined by identity, a name and a value in terms of a monetary value for a given time window having a beginning and end;

    (iv) mitigating actions representing the threat mitigation measures of the organization;

    performing, by the one or more computers a plurality of simulations using a Monte Carlo method using the accessed data specifying relationships to predict a distribution of threat events, each simulation involving propagating data through stochastic modelling for a given time window having a beginning and end;

    modelling threat events using at least two different stochastic models and obtaining at least two different sets of model parameters,sampling, by the one or more computers, outcomes of the plurality of simulations generated using a Monte Carlo method according to the set of threat events within a series of temporal profiles, each having a beginning and end;

    sampling, by the one or more computers, a plurality of simulation outcomes of the plurality of simulations generated using a Monte Carlo method that include mitigating actions representing the threat mitigation measures of the organization for a series of given time windows, each having a beginning and end;

    based on the sampled outcomes of the simulations, determining, by the one or more computers, measures of impact of the computer-related threats to the organization for a given time window having a beginning and end and providing, by the one or more computers and for output to a user, graphical representations of the determined measures of impact of the computer-based threats to the organization, for a given time window having a beginning and end, in a graphical user interface;

    the one or more computers further configured to;

    receive observed computer-based threat data;

    receive input data of the number of viruses contracted by period and the number of new viruses worldwide;

    extrapolating from the input data, using a Monte Carlo method, to predict future computer-based threat activity rates and types and;

    outputting said predicted future computer-based threat activity into the network and firewall logs, updating the firewall policy tree to define the action of accept or deny, according to the changes automatically made to the policy tree of rules in the sets of firewall rules, which in turn inserts updated rules into the firewall policy.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×