×

IDS Sensor Placement Using Attack Graphs

  • US 20100058456A1
  • Filed: 08/26/2009
  • Published: 03/04/2010
  • Est. Priority Date: 08/27/2008
  • Status: Abandoned Application
First Claim
Patent Images

1. A computer readable storage medium that contains instructions that when executed by at least one processor, causes the at least one processor to perform a method for identifying locations to deploy at least one IDS sensor within a network infrastructure, the method comprisinga) aggregating an attack graph into at least two protection domains, the attack graph describing at least one exploit in at least a part of the network infrastructure;

  • b) identifying at least one edge, each of said “

    at least one edge”

    having at least one of the at least one exploit between two of the at least two protection domains;

    c) define at least two sets, each set containing at least one of the at least one edge, all of the at least one of the at least one edge serviced by a common network traffic device;

    d) selecting at least one of the at least two sets that collectively contain all of the at least one edge;

    e) identifying the common network traffic device that services the selected sets as the locations to deploy the at least one IDS sensor within the network infrastructure.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×