×

Uniquely identifying attacked assets

  • US 8,392,998 B1
  • Filed: 11/30/2009
  • Issued: 03/05/2013
  • Est. Priority Date: 11/30/2009
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • maintaining, by at least one data processing apparatus, asset data for each asset in a system of assets, each of the assets being identified by a corresponding unique identifier and at least one non-unique identifier, wherein each non-unique identifier can be shared with at least one other asset in the system of assets and each unique identifier is unique within the system of assets;

    maintaining, by at least one data processing apparatus, protection data for each of a plurality of sensors, wherein the protection data for each sensor associates one or more assets in the system of assets to a corresponding sensor by mapping an identifier for the corresponding sensor to each unique identifier of the assets associated with the corresponding sensor;

    receiving, at least one data processing apparatus, attack data specifying a plurality of attacks detected by sensors in the plurality of sensors as attacks on assets in the system of assets, wherein the attack data specifies, for each attack, an identification of the attack, an identification of the sensor that detected the attack, and the non-unique identifier of the asset that was attacked;

    determining, by at least one data processing apparatus, for a particular one of the plurality of attacks detected by a particular one of the plurality of sensors as an attack on a particular one of the system of assets, the unique identifier of the particular asset, the determining including;

    identifying the non-unique identifier of the particular asset and the particular sensor from the attack data;

    identifying, from the protection data of the identified particular sensor, the unique identifiers of the assets associated with the particular sensor;

    determining, from the asset data, that a particular unique identifier in the identified unique identifiers is mapped to the identified non-unique identifier of the particular asset; and

    determining that the particular unique identifier is the unique identifier of the particular asset; and

    updating a risk categorization for the particular asset to account for the determined particular attack on the particular asset.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×