×

Probabilistic model for cyber risk forecasting

  • US 9,680,855 B2
  • Filed: 06/30/2014
  • Issued: 06/13/2017
  • Est. Priority Date: 06/30/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method in a computing system having a processor, the method comprising:

  • receiving target organization information, asset information, system information, threat information, and known and modeled threat agent information descriptive of a networked system of at least one target organization;

    calculating, by the processor, threat characteristics for the networked system of the at least one target organization, based on the target organization information, the asset information, the system information, the threat information, and the known and modeled threat agent information descriptive of the at least one target organization;

    determining, by the processor, a time-dependent interactive model involving one or more likely future pathways for at least one or more threats based on the calculated threat characteristics for the networked system of the at least one target organization,wherein at least one of the one or more likely future pathways includes a plurality of path segments,wherein at least one of the plurality of path segments is based on an unobserved event,wherein at least one of the one or more likely future pathways includes a path segment based on an observed event, andwherein at least one of the one or more likely future pathways includes known and modeled attack agent objectives, attacker attributes, attack tactics and techniques, and time-related interactions of one or more attackers or attack behaviors and one or more sets of response actions of the targeted organization,wherein the one or more sets of response actions of the targeted organization includes;

    effects of automatic security control measures within the networked system; and

    human responses modeled by computing probabilities as a function of reward-cost from an attacker'"'"'s perspective and from a targeted organization'"'"'s perspective;

    estimating, by the processor, for the one or more likely future pathways;

    probabilities that the unobserved event will occur, andprobability distributions of times of occurrence of the unobserved event;

    determining, by the processor, a probability distribution of damage to assets of the at least one target organization and a probability distribution of one or more incidents of such damage to the assets based on the estimated probabilities that the unobserved event will occur and based on the estimated probability distributions of times of occurrence of the unobserved event; and

    dynamically reconfiguring or deploying operation of one or more hardware components of the networked system at the one or more likely future pathways based on the determined probability distribution of damage to the assets and the probability distribution of one or more incidents of such damage to the assets,wherein reconfiguring or deploying operation of one or more components of the networked system includes reconfiguring or deploying a firewall, security device, or sensor with respect to the one or more likely future pathways.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×