×

Network security planning architecture

  • US 7,194,769 B2
  • Filed: 12/11/2003
  • Issued: 03/20/2007
  • Est. Priority Date: 12/11/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • using a computer to generate a pruned attack tree, using the computer comprises;

    designating a root node of the pruned attack tree, the root node representing a starting point of an attack; and

    for a current node included in the pruned attack tree, connecting a resulting node having a first state, representing a first host and access to the first host, and an edge, having a first transition value corresponding to one of a plurality of vulnerability types, to the current node if determined that;

    another edge, having a second transition value corresponding to one of the plurality of vulnerability types, does not connect an ancestor of the current node to another node having a second state equivalent to the first state; and

    the second transition value is equal to the first transition value.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×