×

System, method, and software for cyber threat analysis

  • US 8,601,587 B1
  • Filed: 09/03/2010
  • Issued: 12/03/2013
  • Est. Priority Date: 09/04/2009
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • one or more memory units;

    one or more processing units operable to;

    generate a network model of a network infrastructure that is used by an organization;

    assign a business weighting value to each of a plurality of network elements of the network infrastructure according to a relative business importance of the each network element to the organization;

    generate an attack vector associated with at least one network element of the plurality of network elements according to a determined vulnerability of the network infrastructure, the attack vector representing one or more illicit actions that may be performed to compromise the network infrastructure;

    simulate, using a network modeling tool, the attack vector on the network model to determine one or more resulting ramifications of one or more network elements of the plurality of network elements due to the attack vector; and

    determine a criticality level of the attack vector associated with the at least one network element, the determining including combining the business weighting values assigned to the one or more network elements with the one or more resulting ramifications of the one or more network elements as determined from the simulating, the criticality level including monetary cost to the organization; and

    a first storage and a second storage, the first storage operable to store a plurality of the weighting values that are assigned to corresponding ones of the plurality of network elements and the second storage operable to store at least the determined vulnerability, wherein the first storage, the second storage, and the network model comprise a plurality of federated memory stores so as to simulate effects of one or more network elements of the plurality of network elements in a first segment of the network infrastructure having a different level of security relative to another network element of the plurality of network elements in a second segment of the network infrastructure.

View all claims
  • 11 Assignments
Timeline View
Assignment View
    ×
    ×