Please download the dossier by clicking on the dossier button x
×

Methods and systems for defending cyber attack in real-time

  • US 10,185,832 B2
  • Filed: 07/19/2016
  • Issued: 01/22/2019
  • Est. Priority Date: 08/12/2015
  • Status: Active Grant
First Claim
Patent Images

1. A process for defending attack of one or more critical assets within a network of electronically interconnected devices in real-time comprising:

  • identifying a plurality of vulnerabilities on a network of electronically interconnected devices representing one or more critical assets;

    determining dependencies between each vulnerability in said plurality of vulnerabilities;

    creating a hidden Markov model for said plurality of vulnerabilities and their relevant observations, where each state of the model represents an attack state of a distinct vulnerability;

    determining an exploit likelihood of each of said vulnerabilities at a first time;

    determining an impact of exploitation of each of said vulnerabilities at said first time;

    determining a most probable sequences or paths of attack states representing exploited vulnerabilities; and

    identifying dynamically a risk of one or more of said critical assets based on exploit likelihood and exploitation impact of said sequences or paths of attack states,wherein said step of determining the exploit likelihood of each of said attack states at a first time comprises using state transition weights or probabilities of all incoming links of the attack state and calculating an impact of each attack state using the state transition weights or probabilities of outgoing links of each attack state in the hidden Markov model.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×