SYSTEM AND METHOD FOR PROBABILISTIC ATTACK PLANNING
First Claim
1. A method for designing a penetration test for a penetration testing framework, comprising the steps of:
- defining a variable to be optimized;
defining a scenario, wherein the scenario further comprises,a definition of a target network,a list of penetration testing modules that are available, wherein each penetration testing modules has associated with it a probability of success, requirements, and an expected value for the variable to be optimized, anda goal of the penetration test; and
producing a probabilistic plan, an estimated probability of success for the probabilistic plan, and an expected value for the variable.
12 Assignments
0 Petitions
Accused Products
Abstract
A system and method for automated probabilistic planning of network attacks against infrastructures of computer networks and applications is provided. The embodiments automate the analysis and probabilistic planning of multi-step attacks to computer and application networks (in particular in the context of automating penetration tests), optimizing with respect to one of the following metrics: the probability of success of the actions, a numerical parameter that must be minimized (e.g., running time), or the number of logs generated by the control devices in the target network.
-
Citations
7 Claims
-
1. A method for designing a penetration test for a penetration testing framework, comprising the steps of:
-
defining a variable to be optimized; defining a scenario, wherein the scenario further comprises, a definition of a target network, a list of penetration testing modules that are available, wherein each penetration testing modules has associated with it a probability of success, requirements, and an expected value for the variable to be optimized, and a goal of the penetration test; and producing a probabilistic plan, an estimated probability of success for the probabilistic plan, and an expected value for the variable. - View Dependent Claims (2, 3, 4)
-
-
5. A method for designing a probabilistic plan for attacking from a first host a second host, for a penetration testing framework, comprising the steps of:
-
defining a variable to be optimized; defining a scenario, wherein the scenario further comprises, a description of the first host located within a target network, the second host located within the target network, and how the first host and second host are connected, a list of penetration testing modules that are available, wherein each penetration testing module has associated with it a probability of success, requirements, and an expected value for the variable to be optimized; and producing a probabilistic plan that has as a goal to install an agent in the second host, an estimated probability of success for the probabilistic plan, and an expected value for the variable. - View Dependent Claims (6, 7)
-
Specification