×

Method and tool for network vulnerability analysis

  • US 7,013,395 B1
  • Filed: 03/13/2001
  • Issued: 03/14/2006
  • Est. Priority Date: 03/13/2001
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for systematically identifying and characterizing vulnerabilities in a computer system comprising the steps of:

  • describing a set of potential attacks on the computer system through which a change in status of the computer system could be effected, wherein the change comprises a transition from a start condition to an end condition which is different from the start condition;

    defining a set of paths comprising at least one path for each potential attack described, wherein each path comprises at least one event necessary for transition from the start condition to the end condition, which transition can include passage through intermediate conditions in transit from the start condition to the end condition;

    for each path in said set of paths, assigning a length value, L, corresponding to a metric reflecting at least one security significant condition bearing on likelihood of success of an attacker attempting to effect said transition from the start condition, through intermediate conditions, if any, to the end condition, so that the value of L correlates inversely with said likelihood of success;

    identifying within said set of paths at least one shortest path defined as that having the smallest length value of paths in the set of paths;

    identifying, from within the set of paths, specific paths (denoted “

    epsilon optimal paths”

    ) having a length, L≦

    (1+ε

    ) times the length of the shortest path, where ε

    is a non-negative number that accounts for uncertainty in individual edge metrics and uncertainty in the actual path the attacker will choose; and

    designating “

    epsilon optimal paths”

    as high risk attack paths.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×