×

Systems and methods for determining optimal remediation recommendations in penetration testing

  • US 10,382,473 B1
  • Filed: 03/21/2019
  • Issued: 08/13/2019
  • Est. Priority Date: 09/12/2018
  • Status: Active Grant
First Claim
Patent Images

1. A method for providing, by a penetration testing system, a recommendation for improving the security of a networked system against attackers, the method comprising:

  • a. carrying out one or more penetration tests of the networked system by the penetration testing system;

    b. based on results of said one or more penetration tests of the networked system, determining multiple paths of attack available to the attackers, each path of attack of said determined multiple paths of attack being an ordered sequence of one or more attacker steps and one or more sub-goals, wherein there is at least one pair of equivalent attacker steps that can both be blocked by a single remediation action and that are included in different paths of attack of said determined multiple paths of attack;

    c. obtaining a vulnerability metric that calculates a vulnerability score for any group of zero or more paths of attack available to the attackers;

    d. for each specific attacker step that is included in at least one of said determined multiple paths of attack;

    i. defining a corresponding group of paths of attack including said determined multiple paths of attack following exclusion therefrom of any path of attack that includes said specific attacker step and any path of attack that includes an attacker step that is equivalent to said specific attacker step, andii. setting a vulnerability grade of said specific attacker step based on a vulnerability score calculated by said vulnerability metric for said corresponding group of paths of attack;

    e. selecting one attacker step included in at least one of said determined multiple paths of attack, the selecting of said one attacker step being based on the vulnerability grades of the attacker steps included in at least one of said determined multiple paths of attack; and

    f. providing a recommendation to block said selected one attacker step to improve the security of the networked system, said providing of said recommendation comprising at least one operation selected from the group consisting of;

    i. causing a display device to display information about said recommendation,ii. recording said information about said recommendation in a file, andiii. electronically transmitting said information about said recommendation.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×