×

CENTRAL EMULATOR DEVICE AND METHOD FOR DISTRIBUTED EMULATION

  • US 20180115588A1
  • Filed: 10/26/2016
  • Published: 04/26/2018
  • Est. Priority Date: 10/26/2016
  • Status: Active Grant
First Claim
Patent Images

1. An emulation system configured to hardware-emulate network security operations for a network of computing devices, the emulation system comprising:

  • a central controller; and

    a plurality of distributed processing elements, the central controller and each of the distributed processing elements comprising processing circuitry and memory;

    a portion of each distributed processing element configured to operate as a distributed emulator, each portion dedicated to emulation of the network security operations by one of the computing devices,wherein the central controller is configured to;

    monitor a synchronous emulation of a network security algorithm implemented on the distributed processing elements, the synchronous emulation including random generation of security events at the distributed processing elements;

    the security events comprising, at least an emulation of an attempted unauthorized access at one of the distributed processing elements, to simulate an attempted unauthorized access at one of the computing devices,in response to a security event, send a pause command to the distributed processing elements to pause the synchronous emulation and to instruct the distributed processing elements to send state variables of the distributed processing elements at a time of the security event;

    determine, based at least partly on the state variables at the security event time, a security performance level of the network security algorithm for a group of settings of the network security algorithm at the security event time;

    store a global snapshot of the state variables at the security event time to enable the synchronous emulation to be reverted to the security event time from arbitrary times subsequent to the security event time for security performance evaluation of the network security algorithm.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×