Techniques for determining network security
First Claim
Patent Images
1. A modular system architecture comprising:
- an analysis unit configured to;
receive information related to a computer network;
generate at least one attack tree based on the information; and
generate at least one time-to-defeat algorithm based on the information;
a simulation engine unit configured to;
calculate from the time-to-defeat algorithm time-to-defeat values for the network; and
an output processing unit configured to output the time-to-defeat values.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention features a method and related computer program product and apparatus for assessing the security of a computer network.
-
Citations
20 Claims
-
1. A modular system architecture comprising:
-
an analysis unit configured to;
receive information related to a computer network;
generate at least one attack tree based on the information; and
generate at least one time-to-defeat algorithm based on the information;
a simulation engine unit configured to;
calculate from the time-to-defeat algorithm time-to-defeat values for the network; and
an output processing unit configured to output the time-to-defeat values. - View Dependent Claims (2, 4, 5, 6, 7, 8, 9, 10)
-
-
3. The modular system architecture of claim 3 wherein input translation layer is configured to:
-
receive input from a plurality of sources, and translate the received input into a common format.
-
-
11. A computer program product, tangibly embodied in an information carrier, for executing instructions on a processor, the computer program product being operable to cause a machine to:
-
receive information related to a computer network;
generate at least one attack tree based on the information;
generate at least one time-to-defeat algorithm based on the information;
calculate from the time-to-defeat algorithm time-to-defeat values for the computer network; and
output the time-to-defeat values. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method comprising:
-
receiving information related to a network;
generating at least one attack tree based on the information;
generating at least one time-to-defeat algorithm based on the information;
calculating from the time-to-defeat algorithm time-to-defeat values for the network; and
outputting the time-to-defeat values. - View Dependent Claims (17, 18, 19, 20)
-
Specification