×

Systems and methods for providing interfaces for visualizing threats within networked control systems

  • US 10,348,758 B1
  • Filed: 12/02/2016
  • Issued: 07/09/2019
  • Est. Priority Date: 12/02/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for providing interfaces for visualizing threats within networked control systems, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • receiving a request to provide a graphical interface to visualize a networked control system that comprises a plurality of components;

    identifying within the networked control system at least one potential security threat involving at least one potentially compromised component of the networked control system;

    providing the graphical interface in response to the request by;

    ordering the plurality of components according to a control hierarchy;

    portraying each component within the plurality of components within a circular area within the graphical interface, wherein representing each component within the circular area comprises;

    arranging the plurality of components according to the control hierarchy such that, for each parent-child pair of components within the hierarchy, a parent component of the parent-child pair is placed closer to a center of the circular area than a child component of the parent-child pair, wherein the control hierarchy is based on a relationship between the parent component of the parent-child pair and the child component of the parent-child pair; and

    arranging the plurality of components according to a plurality of domains within the networked control system such that each component falling within a given domain is placed within a corresponding arc of the circular area; and

    highlighting, within the graphical interface, an area within an arc of the circular area containing the potentially compromised component based at least in part on identifying the potential security threat involving the potentially compromised component.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×