Systems and methods for a simulated network attack generator
First Claim
1. A system, comprising:
- a simulated network environment comprising hardware, software, and virtualized devices that duplicate a network architecture of a user'"'"'s operational environment and user network, such that the simulated network environment operationally mimics the user'"'"'s operational environment and the user network;
a computer platform having hardware and software configured as a standalone configuration;
a module configured for executing an attack scenario against the hardware, software, and virtualized devices, within the simulated network environment while the simulated network environment is operationally mimicking the user'"'"'s operating environment and user network via the hardware, software, and virtual devices, the attack scenario comprising attack events that are one or more actions to be executed by the module, wherein the module is further configured to perform the actions on the hardware, software, and virtual devices thereby causing a failure of the hardware, software, or virtual devices within the simulated network environment; and
an interface configured for receiving additional attack event metadata regarding at least one attack event and adding the received attack event metadata to the corresponding attack event.
9 Assignments
0 Petitions
Accused Products
Abstract
A system is disclosed that generates a network attack within a simulated network environment. The system includes a module that creates one or more attack events against network devices within the simulated network environment wherein the attack events include exploitations of published and unpublished vulnerabilities and failures of hardware and software network systems, devices, or applications within the simulated network environment. Additionally, the module executes the created attack event on the simulated network environment. In addition, the system has an interface configured for receiving metadata regarding each attack event and adding the received attack event metadata to each associated attack event.
54 Citations
25 Claims
-
1. A system, comprising:
-
a simulated network environment comprising hardware, software, and virtualized devices that duplicate a network architecture of a user'"'"'s operational environment and user network, such that the simulated network environment operationally mimics the user'"'"'s operational environment and the user network; a computer platform having hardware and software configured as a standalone configuration; a module configured for executing an attack scenario against the hardware, software, and virtualized devices, within the simulated network environment while the simulated network environment is operationally mimicking the user'"'"'s operating environment and user network via the hardware, software, and virtual devices, the attack scenario comprising attack events that are one or more actions to be executed by the module, wherein the module is further configured to perform the actions on the hardware, software, and virtual devices thereby causing a failure of the hardware, software, or virtual devices within the simulated network environment; and an interface configured for receiving additional attack event metadata regarding at least one attack event and adding the received attack event metadata to the corresponding attack event. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A system, comprising:
-
a simulated network environment comprising hardware, software, and virtualized devices that duplicate a network architecture of a user'"'"'s operational environment and user network, such that the simulated network environment mimics the user'"'"'s operational environment and the user network; a module configured for executing an attack event against the hardware, software, and virtualized devices within the simulated network environment thereby causing failures of the hardware, software, or virtualized devices within the simulated network environment, the module further configured for executing the attack event on the simulated network environment along a predefined operational timeline; and an interface configured for receiving metadata regarding the attack event and adding the received attack event metadata to the associated attack event. - View Dependent Claims (24)
-
-
25. A system, comprising:
-
a simulated network environment comprising hardware, software, and virtualized devices that duplicate a network architecture of a user'"'"'s operational environment and user network, such that the simulated network environment mimics the user'"'"'s operational environment and the user network; a module configured for executing one or more attack events against the hardware, software, and virtualized devices within the simulated network environment, the attack events, when executed, causing failures of the hardware, software, or virtualized devices within the simulated network environment, the module further configured for defining a set of expected user actions within attack event metadata corresponding to the attack events and based upon the failures, that would mitigate the attack events or prevent the attack events from being successful; and an interface configured for receiving metadata regarding the one or more attack events and adding the received attack event metadata to each associated attack event.
-
Specification