Explosive network attack and mitigation strategies
First Claim
Patent Images
1. A system for explosive network attack mitigation, the system comprising:
- one or more processors and a non-transitory memory having instructions encoded thereon such that when the instructions are executed, the one or more processors perform operations of;
receiving a network structure as input;
selecting a network attack method that applies an Achlioptas process;
selecting an explosive mitigation strategy;
simulating an attack-mitigation competing process for the network structure;
generating a sequence of network structures under competing processes; and
quantifying effectiveness of the selected explosive mitigation strategy against the selected network attack method by analyzing the sequence of network structures under competing processes.
1 Assignment
0 Petitions
Accused Products
Abstract
Described is a system for explosive network attack and mitigation analysis. A network structure is received as input. A network attack method that applies an Achlioptas process is selected. Then, an explosive mitigation strategy is selected. An attack-mitigation competing process is simulated for the network structure. A sequence of network structures under competing processes is generated. The effectiveness of the selected explosive mitigation strategy against the selected network attack method is quantified by analyzing the sequence of network structures under competing processes.
14 Citations
12 Claims
-
1. A system for explosive network attack mitigation, the system comprising:
-
one or more processors and a non-transitory memory having instructions encoded thereon such that when the instructions are executed, the one or more processors perform operations of; receiving a network structure as input; selecting a network attack method that applies an Achlioptas process; selecting an explosive mitigation strategy; simulating an attack-mitigation competing process for the network structure; generating a sequence of network structures under competing processes; and quantifying effectiveness of the selected explosive mitigation strategy against the selected network attack method by analyzing the sequence of network structures under competing processes. - View Dependent Claims (2, 3, 4)
-
-
5. A computer-implemented method for explosive network mitigation, comprising:
-
an act of causing a data processor to execute instructions stored on a non-transitory memory such that upon execution, the data processor performs operations of; receiving a network structure as input; selecting a network attack method that applies an Achlioptas process; selecting an explosive mitigation strategy; simulating an attack-mitigation competing process for the network structure; generating a sequence of network structures under competing processes; and quantifying effectiveness of the selected explosive mitigation strategy against the selected network attack method by analyzing the sequence of network structures under competing processes. - View Dependent Claims (6, 7, 8)
-
-
9. A computer program product for explosive network mitigation, the computer program product comprising computer-readable instructions stored on a non-transitory computer-readable medium that are executable by a computer having a processor for causing the processor to perform operations of:
-
receiving a network structure as input; selecting a network attack method that applies an Achlioptas process; selecting an explosive mitigation strategy; simulating an attack-mitigation competing process for the network structure; generating a sequence of network structures under competing processes; and quantifying effectiveness of the selected explosive mitigation strategy against the selected network attack method by analyzing the sequence of network structures under competing processes. - View Dependent Claims (10, 11, 12)
-
Specification