NETWORK ATTACK SIMULATION SYSTEMS AND METHODS
First Claim
1. A computer network attack simulation server system comprising:
- a network connection for connecting the server system to a plurality of computers on the computer network;
one or more processors;
memory; and
one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for;
selecting one or more actions from a plurality of actions for operating on a first computer of the plurality of computers;
instructing the first computer to execute the one or more selected actions;
receiving, from the first computer, data generated in response to executing the one or more selected actions on the first computer;
identifying a target computer of the plurality of computers to access;
instructing the first computer to access the target computer using at least a portion of the data; and
receiving confirmation from at least one of the first computer and the target computer that the target computer was accessed by the first computer.
1 Assignment
0 Petitions
Accused Products
Abstract
A network attack simulation method including, at a network with a server and a plurality of computers, selecting one or more actions from a plurality of actions for operating on a first computer of the plurality of computers, transmitting instructions from the server to the first computer to execute the one or more selected actions, executing the one or more selected actions on the first computer, and generating data based on the execution of the selected actions. The method includes transmitting the data generated from the first computer to the server, identifying a target computer of the plurality of computers to access, transmitting one or more additional instructions from the server to the first computer to access the target computer using at least a portion of the data, and receiving confirmation from at least one of the first computer and the target computer that the target computer was accessed.
-
Citations
24 Claims
-
1. A computer network attack simulation server system comprising:
-
a network connection for connecting the server system to a plurality of computers on the computer network; one or more processors; memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for; selecting one or more actions from a plurality of actions for operating on a first computer of the plurality of computers; instructing the first computer to execute the one or more selected actions; receiving, from the first computer, data generated in response to executing the one or more selected actions on the first computer; identifying a target computer of the plurality of computers to access; instructing the first computer to access the target computer using at least a portion of the data; and receiving confirmation from at least one of the first computer and the target computer that the target computer was accessed by the first computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer network attack simulation server method comprising:
-
selecting one or more actions from a plurality of actions for operating on a first computer of a plurality of computers connected to a computer network; instructing the first computer to execute the one or more selected actions; receiving, from the first computer, data generated in response to executing the one or more selected actions on the first computer; identifying a target computer of the plurality of computers to access; instructing the first computer to access the target computer using at least a portion of the data; and receiving confirmation from at least one of the first computer and the target computer that the target computer was accessed by the first computer. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer readable storage medium comprising one or more programs, which when executed by a computer network attack simulation server, cause the server to:
-
select one or more actions from a plurality of actions for operating on a first computer of a plurality of computers connected to a computer network; instruct the first computer to execute the one or more selected actions; receive, from the first computer, data generated in response to executing the one or more selected actions on the first computer; identify a target computer of the plurality of computers to access; instruct the first computer to access the target computer using at least a portion of the data; and receive confirmation from at least one of the first computer and the target computer that the target computer was accessed by the first computer.
-
-
18. A computer network attack simulation method comprising:
at a computer network with a server and a plurality of computers; selecting one or more actions from a plurality of actions for operating on a first computer of the plurality of computers; determining at least one effect to the first computer that would be generated from executing the one or more actions on the first computer; and modifying the first computer according to the at least one effect without executing the one or more actions on the first computer. - View Dependent Claims (19, 20, 21, 22, 23, 24)
Specification