×

Network attack modeling, analysis, and response

  • US 7,904,962 B1
  • Filed: 03/10/2006
  • Issued: 03/08/2011
  • Est. Priority Date: 03/10/2005
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer readable medium containing a computer program that when executed by one or more processors, causes the one or more processors to perform the steps of:

  • a) mapping at least one machine to at least one component;

    b) mapping at least one of said at least one component to at least one vulnerability;

    c) mapping at least one of said at least one vulnerability to at least one of a multitude of exploits, each of said multitude of exploits including at least one precondition mapped to at least one postcondition;

    d) generating an attack graph using at least one of said multitude of exploits, said attack graph defining inter-exploit distances;

    e) performing an aggregation process upon said attack graph including collapsing non-overlapping subgraphs to provide compression; and

    f) determining at least one hardening option using each of said at least one hardening option including applying at least one corrective measure to at least one initial condition, said initial condition being the initial state of at least one of said at least one precondition.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×