×

System and method for securing a computer system against malicious actions by utilizing virtualized elements

  • US 9,473,522 B1
  • Filed: 04/20/2015
  • Issued: 10/18/2016
  • Est. Priority Date: 04/20/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system for protecting a target computing system, the system comprising:

  • a memory device having executable instructions stored therein; and

    a processing device, in response to the executable instructions, configured to test for vulnerabilities on the target computing system from malicious users, the processing device configured to;

    deploy simulator nodes in the target computing system, the simulator nodes representing one or more users, program code, or devices and configured to receive electronic task data representing tasks for execution and to execute computer instructions to simulate operations of parties involved in breach scenarios;

    simulate malicious action associated with a malicious user scenario by transmitting the electronic task data to be executed by the simulator nodes in the target computing system, the electronic task data sent to each simulator node representing one or more exploitation activities on the target computing system and comprising a portion of the electronic task data in an execution queue representing the malicious user scenario;

    receive electronic result data from the deployed simulator nodes representing results associated with the electronic task data executed by the simulator nodes;

    determine whether the malicious action was successful within the target computing system based on the electronic result data;

    update a snapshot of currently known breaches on the target computing system with the determination that the malicious action was successful, the snapshot comprising a graph including nodes representative of simulator nodes and edges representative of specific scenarios with simulation results of the specific scenarios;

    determine whether the snapshot has new breach scenarios and previously known scenarios that have been fixed; and

    conclude the new breach scenarios and the previously known scenarios that have been fixed by searching the graph.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×