×

Method and device for simulating network resiliance against attacks

  • US 9,954,884 B2
  • Filed: 10/23/2013
  • Issued: 04/24/2018
  • Est. Priority Date: 10/23/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method for providing a cyber modeling and simulation framework, comprising:

  • receiving, at an ingest interface, network and vulnerability data associated with nodes of a targeted network;

    presenting, on a network visualization device, the network data and the vulnerability data;

    creating a network model based on the network and vulnerability data presented on the network visualization device;

    simulating a launching of threat attacks on the targeted network using the created network model, wherein one or more of the threat attacks include an unknown behavior or an unpredictable characteristic, wherein the threat attacks include separate attack phases with associated time frames in which the threat attacks affect the targeted network differently in each of the separate attack phases;

    applying, to the simulated launching of threat attacks, modeled defenses against the threat attacks, wherein the modeled defenses includes defenses at first locations of the targeted network for a first simulation and the defenses provided at second locations of the targeted network for a second simulation, the second locations including at least one different location than the first locations;

    producing simulation results from the simulating the launching of threat attacks and the applying the modeled defenses;

    performing data farming to produce the simulation results using different scenarios to generate a farm of data and wherein data farming includes simulating the launching of same threat attacks on different configurations of the targeted network and wherein data farming includes simulating the launching of different threat attacks on the same configuration of the targeted network, wherein the same threat attacks include the one or more of the threat attacks that include an unknown behavior or an unpredictable characteristic;

    analyzing the data produced from performing the data farming to determine a statistically significant representation of the results; and

    designing anti-cyber-attack strategies for the targeted network based on the performed the data farming.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×