×

Interactive Analysis of Attack Graphs Using Relational Queries

  • US 20080046393A1
  • Filed: 07/31/2007
  • Published: 02/21/2008
  • Est. Priority Date: 08/01/2006
  • Status: Active Grant
First Claim
Patent Images

1. ) A system for analyzing attack graphs, comprising modules residing on at least one tangible computer readable medium containing a set of computer readable instructions that are executable by one or more processors, the modules comprising:

  • a) a network configuration information input module configured to input network configuration information that describes the configuration of a network, al least part of the network configuration information describing at least part of the physical structure of the network, the network configuration information including at least one of the following;

    i) host information;

    ii) host configuration information;

    iii) application information;

    iv) network service information;

    or v) operating system information;

    or vi) a combination of the above;

    b) a domain knowledge input module configured to input domain knowledge for the network, the domain knowledge including knowledge about at least one exploit;

    c) a network configuration information storage module configured to store the network configuration information in at least one network database table;

    d) a domain knowledge storage module configured to store the domain knowledge in at least one exploit database table, the domain knowledge including exploit information; and

    e) a result generation module configured to generate a result using the network database table and exploit database table in response to a query to a database management system, the result including at least one of the following;

    i) a metric;

    ii) an attack path;

    iii) part of an attack path;

    iv) a collection of paths;

    v) an exploit;

    vi) a condition-exploit pair;

    vii) an exploit-condition pair;

    or viii) a table that describes an attack graph;

    or ix) a combination of the above; and

    wherein the network is reconfigured using attack information learned from the result.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×