Systems and methods for providing interfaces for visualizing threats within networked control systems
First Claim
1. A computer-implemented method for providing interfaces for visualizing threats within networked control systems, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- receiving a request to provide a graphical interface to visualize a networked control system that comprises a plurality of components;
identifying within the networked control system at least one potential security threat involving at least one potentially compromised component of the networked control system;
providing the graphical interface in response to the request by;
ordering the plurality of components according to a control hierarchy;
portraying each component within the plurality of components within a circular area within the graphical interface, wherein representing each component within the circular area comprises;
arranging the plurality of components according to the control hierarchy such that, for each parent-child pair of components within the hierarchy, a parent component of the parent-child pair is placed closer to a center of the circular area than a child component of the parent-child pair, wherein the control hierarchy is based on a relationship between the parent component of the parent-child pair and the child component of the parent-child pair; and
arranging the plurality of components according to a plurality of domains within the networked control system such that each component falling within a given domain is placed within a corresponding arc of the circular area; and
highlighting, within the graphical interface, an area within an arc of the circular area containing the potentially compromised component based at least in part on identifying the potential security threat involving the potentially compromised component.
2 Assignments
0 Petitions
Accused Products
Abstract
The disclosed computer-implemented method for providing interfaces for visualizing threats within networked control systems may include (i) receiving a request to provide a graphical interface to visualize a networked control system with multiple components, (ii) identifying within the networked control system a potential security threat involving a potentially compromised component of the networked control system, and (iii) providing the graphical interface by (a) ordering the components according to a control hierarchy, (b) portraying each component within a circular area by arranging the components according to the control hierarchy and according to domains within the networked control system such that each component falling within a given domain is placed within a corresponding arc of the circular area, and (c) highlighting, within the graphical interface, an area within an arc of the circular area containing the potentially compromised component. Various other methods, systems, and computer-readable media are also disclosed.
-
Citations
20 Claims
-
1. A computer-implemented method for providing interfaces for visualizing threats within networked control systems, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
receiving a request to provide a graphical interface to visualize a networked control system that comprises a plurality of components; identifying within the networked control system at least one potential security threat involving at least one potentially compromised component of the networked control system; providing the graphical interface in response to the request by; ordering the plurality of components according to a control hierarchy; portraying each component within the plurality of components within a circular area within the graphical interface, wherein representing each component within the circular area comprises; arranging the plurality of components according to the control hierarchy such that, for each parent-child pair of components within the hierarchy, a parent component of the parent-child pair is placed closer to a center of the circular area than a child component of the parent-child pair, wherein the control hierarchy is based on a relationship between the parent component of the parent-child pair and the child component of the parent-child pair; and arranging the plurality of components according to a plurality of domains within the networked control system such that each component falling within a given domain is placed within a corresponding arc of the circular area; and highlighting, within the graphical interface, an area within an arc of the circular area containing the potentially compromised component based at least in part on identifying the potential security threat involving the potentially compromised component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for providing interfaces for visualizing threats within networked control systems, the system comprising:
-
a receiving module, stored in memory, that receives a request to provide a graphical interface to visualize a networked control system that comprises a plurality of components; an identification module, stored in memory, that identifies within the networked control system at least one potential security threat involving at least one potentially compromised component of the networked control system; a providing module, stored in memory, that provides the graphical interface in response to the request by; ordering the plurality of components according to a control hierarchy; portraying each component within the plurality of components within a circular area within the graphical interface, wherein representing each component within the circular area comprises; arranging the plurality of components according to the control hierarchy such that, for each parent-child pair of components within the hierarchy, a parent component of the parent-child pair is placed closer to a center of the circular area than a child component of the parent-child pair, wherein the control hierarchy is based on a relationship between the parent component of the parent-child pair and the child component of the parent-child pair; and arranging the plurality of components according to a plurality of domains within the networked control system such that each component falling within a given domain is placed within a corresponding arc of the circular area; and highlighting, within the graphical interface, an area within an arc of the circular area containing the potentially compromised component based at least in part on identifying the potential security threat involving the potentially compromised component; and at least one physical processor configured to execute the receiving module, the identification module, and the providing module. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium comprising one or more computer-readable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
receive a request to provide a graphical interface to visualize a networked control system that comprises a plurality of components; identify within the networked control system at least one potential security threat involving at least one potentially compromised component of the networked control system; provide the graphical interface in response to the request by; ordering the plurality of components according to a control hierarchy; portraying each component within the plurality of components within a circular area within the graphical interface, wherein representing each component within the circular area comprises; arranging the plurality of components according to the control hierarchy such that, for each parent-child pair of components within the hierarchy, a parent component of the parent-child pair is placed closer to a center of the circular area than a child component of the parent-child pair, wherein the control hierarchy is based on a relationship between the parent component of the parent-child pair and the child component of the parent-child pair; and arranging the plurality of components according to a plurality of domains within the networked control system such that each component falling within a given domain is placed within a corresponding arc of the circular area; and highlighting, within the graphical interface, an area within an arc of the circular area containing the potentially compromised component based at least in part on identifying the potential security threat involving the potentially compromised component.
-
Specification