METHOD AND DEVICE FOR SIMULATING NETWORK RESILIANCE AGAINST ATTACKS
First Claim
1. A method for providing a cyber modeling and simulation framework, comprising:
- receiving, at an ingest interface, network and vulnerability data associated with a node of a targeted network;
presenting, on a network visualization device, the network data and the vulnerability data;
creating a network model based on the network and vulnerability data presented on the network visualization device;
simulating a launching of threat attacks on the targeted network;
applying, to the simulated launching of threat attacks, modeled defenses against the threat attacks;
producing results from the simulating the launching of threat attacks and the applying the modeled defenses;
performing data farming on the simulation results using different scenarios to generate a farm of data; and
designing anti-cyber-attack strategies for the targeted network based on the performing the data farming.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of a system and method for a cyber modeling and simulation framework arc generally described herein. In some embodiments, an interface (212) for ingest of network and vulnerability data associated with a node of a targeted network, a network visualization device (232) for presenting the network data and the vulnerability data, and for creating a network model based on the network and vulnerability data, a threat analysis simulator (240) for launching threat attacks on the targeted network and for applying modeled defenses against the threat attacks, the threat analysis simulator producing simulation results (244) and a data farming module for performing data fanning on the simulation results using different scenarios to generate a farm of data for use in designing anti-cyber-attack strategies (280) for the targeted network.
74 Citations
23 Claims
-
1. A method for providing a cyber modeling and simulation framework, comprising:
-
receiving, at an ingest interface, network and vulnerability data associated with a node of a targeted network; presenting, on a network visualization device, the network data and the vulnerability data; creating a network model based on the network and vulnerability data presented on the network visualization device; simulating a launching of threat attacks on the targeted network; applying, to the simulated launching of threat attacks, modeled defenses against the threat attacks; producing results from the simulating the launching of threat attacks and the applying the modeled defenses; performing data farming on the simulation results using different scenarios to generate a farm of data; and designing anti-cyber-attack strategies for the targeted network based on the performing the data farming. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A cyber modeling and simulation framework, comprising:
-
an interface for ingest of network and vulnerability data associated with a node of a targeted network; a network visualization device for presenting the network data and the vulnerability data , and for creating a network model based on the network and vulnerability data; a threat analysis simulator for launching threat attacks on the targeted network and for applying modeled defenses against the threat attacks, the threat analysis simulator producing simulation results; and a data farming module for performing data farming on the simulation results using different scenarios to generate a farm of data for use in designing anti-cyber-attack strategies for the targeted network. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19-21. -21. (canceled)
-
22. A method for providing a cyber modeling and simulation framework, comprising:
-
receiving, at an ingest interface, network and vulnerability data associated with a node of a targeted network; presenting, on a network visualization device, the network data and the vulnerability data; creating a network model based on the network and vulnerability data presented on the network visualization device; simulating a launching of threat attacks on the targeted network; applying, to the simulated launching of threat attacks, modeled defenses against the threat attacks; producing results from the simulating the launching of threat attacks and the applying the modeled defenses; and designing anti-cyber-attack strategies for the targeted network based on the results from simulation of threat attack launches and application of modeled defenses. - View Dependent Claims (23)
-
Specification