×

Systems and methods for attack simulation on a production network

  • US 10,212,186 B2
  • Filed: 02/24/2017
  • Issued: 02/19/2019
  • Est. Priority Date: 02/24/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method for controlled execution of a malicious behavior between multiple different components in a production network to test at least a portion of a security system of the production network, the method comprising:

  • (a) identifying, by a server, a packet capture (PCAP) file to use for providing instructions for controlled execution of malicious behavior on a plurality of different components of a production network;

    (b) identifying, by a server a first attack to execute against a first device of a plurality of different components and a first network path selected for the first attack and a second attack to execute against a second device of the plurality of different components and a second network path selected for the second attack and a third attack, and a third network path for the third attack, to execute against a network component of the plurality of different components intermediary to the first end point device and the second device;

    (c) communicating, by the server based on at least the PCAP file, a first set of instructions to a first pair of attack and target nodes in the production network to initiate the malicious behavior of the PCAP file against the first device, a second set of instructions to a second pair of attack and target nodes in the production network to initiate the malicious behavior of the PCAP file against the second device and a third set of instructions to a third pair of attack and target nodes in the production network to initiate the malicious behavior of the PCAP file against the network component intermediary to the first device and the second device;

    (d) aggregating, by the server, results of each of the first attack, the second attack and the third attack to provide an aggregated view of the malicious behavior between the first device and the second device via the network component.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×