Method and system for mapping network attacks onto a strategy game
First Claim
Patent Images
1. A method for mapping network attacks onto a strategy game, said method comprising:
- receiving, by a transformer, at least one log file, generated by network security monitoring tools; and
transforming, by said transformer, said at least one log file into a set of characters with associated action inputs, wherein at least one of said characters is associated with an action input.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for mapping network attacks onto a strategy game is presented. A log file generated by network security monitoring tools is received by a transformer. The log file is transformed by the transformer into a set of characters with associated action inputs, such that each of the characters is associated with an action input.
10 Citations
30 Claims
-
1. A method for mapping network attacks onto a strategy game, said method comprising:
-
receiving, by a transformer, at least one log file, generated by network security monitoring tools; and
transforming, by said transformer, said at least one log file into a set of characters with associated action inputs, wherein at least one of said characters is associated with an action input. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A transformer for mapping network attacks onto a strategy game, said transformer comprising:
-
a receiver configured to receive at least one log file generated by network security monitoring tools; and
a transformer agent configured to transform said at least one log file into a set of characters with associated action inputs, wherein each of said characters is associated with an action input. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for mapping network attacks onto a strategy game, said system comprising:
-
a transformer configured to receive at least one log file generated by network security monitoring tools, and to transform said at least one log file into a set of characters with associated action inputs, wherein each of said characters is associated with an action input; and
a strategy game rendering mechanism, said rendering mechanism configured to render said set of characters and said associated action inputs in the form of a strategy game. - View Dependent Claims (21)
-
-
22. A computer-readable medium encoded with a plurality of processor-executable instructions for:
-
receiving, by a transformer, at least one log file, generated by network security monitoring tools; and
transforming, by said transformer, said at least one log file into a set of characters with associated action inputs, wherein each of said characters is associated with an action input. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30)
-
Specification