SYSTEM AND METHOD FOR SECURING A COMPUTER SYSTEM AGAINST MALICIOUS ACTIONS BY UTILIZING VIRTUALIZED ELEMENTS
First Claim
Patent Images
1. A system for protecting a target computing system, the system comprising:
- a memory device having executable instructions stored therein; and
a processing device, in response to the executable instructions, configured to test for vulnerabilities on the target computing system from malicious users, the processing device configured to;
deploy simulator nodes in the target computing system, the simulator nodes representing one or more users, program code, or devices and configured to receive electronic task data representing tasks for execution and to execute computer instructions to simulate operations of the one or more users, program code, or devices in the target computing system;
simulate malicious action associated with a malicious user scenario by transmitting the electronic task data to be executed by the simulator nodes in the target computing system, the electronic task data sent to each simulator node representing one or more exploitation activities on the target computing system and comprising a portion of the electronic task data in an execution queue representing the malicious user scenario;
receive electronic result data from the deployed simulator nodes representing results associated with the electronic task data executed by the simulator nodes; and
determine whether the malicious action was successful within the target computing system based on the electronic result data.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and system for protecting a computing system, the method comprising allocating simulator nodes, the simulator nodes emulating operations of devices in a target system, simulating malicious action utilizing the simulator nodes, and determining that the malicious action was successfully.
-
Citations
20 Claims
-
1. A system for protecting a target computing system, the system comprising:
-
a memory device having executable instructions stored therein; and a processing device, in response to the executable instructions, configured to test for vulnerabilities on the target computing system from malicious users, the processing device configured to; deploy simulator nodes in the target computing system, the simulator nodes representing one or more users, program code, or devices and configured to receive electronic task data representing tasks for execution and to execute computer instructions to simulate operations of the one or more users, program code, or devices in the target computing system; simulate malicious action associated with a malicious user scenario by transmitting the electronic task data to be executed by the simulator nodes in the target computing system, the electronic task data sent to each simulator node representing one or more exploitation activities on the target computing system and comprising a portion of the electronic task data in an execution queue representing the malicious user scenario; receive electronic result data from the deployed simulator nodes representing results associated with the electronic task data executed by the simulator nodes; and determine whether the malicious action was successful within the target computing system based on the electronic result data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A non-transitory computer readable medium comprising program code that when executed by a programmable processor causes execution of a method for protecting a target computing system, the computer readable media comprising:
-
executable instructions that test for vulnerabilities on the target computing system from malicious users, the executable instructions comprising; computer program code for deploying simulator nodes in the target computing system, the simulator nodes representing one or more users, program code, or devices and configured to receive electronic task data representing tasks for execution and to execute computer instructions to simulate operations of the one or more users, program code, or devices in the target computing system; computer program code for simulating malicious action associated with a malicious user scenario by transmitting the electronic task data to be executed by the simulator nodes in the target computing system, the electronic task data sent to each simulator node representing one or more exploitation activities on the target computing system and comprising a portion of the electronic task data in an execution queue representing the malicious user scenario; computer program code for receiving electronic result data from the deployed simulator nodes representing results associated with the electronic task data executed by the simulator nodes; and computer program code for determining whether the malicious action was successful within the target computing system based on the electronic result data. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification