Network attack modeling, analysis, and response
Disclosed is a system for modeling, analyzing, and responding to network attacks. Machines are mapped to components, components are mapped to vulnerabilities, and vulnerabilities are mapped to exploits. Each of the exploits includes at least one precondition mapped to at least one postcondition. An...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | WEIERBACH ROBERT G O'BERRY BRIAN C KALAPA PRAMOD JAJODIA SUSHIL JACOBS MICHAEL A NOEL STEVEN E ROBERTSON ERIC B |
description | Disclosed is a system for modeling, analyzing, and responding to network attacks. Machines are mapped to components, components are mapped to vulnerabilities, and vulnerabilities are mapped to exploits. Each of the exploits includes at least one precondition mapped to at least one postcondition. An attack graph which defines inter-exploit distances is generated using at least one of the exploits. The attack graph is aggregated. At least one hardening option is determined using the aggregated attack graph. Hardening options include applying at least one corrective measure to at least one initial condition, where the initial condition is the initial state of a precondition. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US7904962B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US7904962B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US7904962B13</originalsourceid><addsrcrecordid>eNrjZND3Sy0pzy_KVkgsKUlMzlbIzU9JzcnMS9dRSMxLzKksziwGsVIUilKLC_LzilN5GFjTEnOKU3mhNDeDgptriLOHbmpBfjxQTWJyal5qSXxosLmlgYmlmZGToTERSgDTyCqf</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Network attack modeling, analysis, and response</title><source>esp@cenet</source><creator>WEIERBACH ROBERT G ; O'BERRY BRIAN C ; KALAPA PRAMOD ; JAJODIA SUSHIL ; JACOBS MICHAEL A ; NOEL STEVEN E ; ROBERTSON ERIC B</creator><creatorcontrib>WEIERBACH ROBERT G ; O'BERRY BRIAN C ; KALAPA PRAMOD ; JAJODIA SUSHIL ; JACOBS MICHAEL A ; NOEL STEVEN E ; ROBERTSON ERIC B</creatorcontrib><description>Disclosed is a system for modeling, analyzing, and responding to network attacks. Machines are mapped to components, components are mapped to vulnerabilities, and vulnerabilities are mapped to exploits. Each of the exploits includes at least one precondition mapped to at least one postcondition. An attack graph which defines inter-exploit distances is generated using at least one of the exploits. The attack graph is aggregated. At least one hardening option is determined using the aggregated attack graph. Hardening options include applying at least one corrective measure to at least one initial condition, where the initial condition is the initial state of a precondition.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2011</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20110308&DB=EPODOC&CC=US&NR=7904962B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20110308&DB=EPODOC&CC=US&NR=7904962B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>WEIERBACH ROBERT G</creatorcontrib><creatorcontrib>O'BERRY BRIAN C</creatorcontrib><creatorcontrib>KALAPA PRAMOD</creatorcontrib><creatorcontrib>JAJODIA SUSHIL</creatorcontrib><creatorcontrib>JACOBS MICHAEL A</creatorcontrib><creatorcontrib>NOEL STEVEN E</creatorcontrib><creatorcontrib>ROBERTSON ERIC B</creatorcontrib><title>Network attack modeling, analysis, and response</title><description>Disclosed is a system for modeling, analyzing, and responding to network attacks. Machines are mapped to components, components are mapped to vulnerabilities, and vulnerabilities are mapped to exploits. Each of the exploits includes at least one precondition mapped to at least one postcondition. An attack graph which defines inter-exploit distances is generated using at least one of the exploits. The attack graph is aggregated. At least one hardening option is determined using the aggregated attack graph. Hardening options include applying at least one corrective measure to at least one initial condition, where the initial condition is the initial state of a precondition.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2011</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZND3Sy0pzy_KVkgsKUlMzlbIzU9JzcnMS9dRSMxLzKksziwGsVIUilKLC_LzilN5GFjTEnOKU3mhNDeDgptriLOHbmpBfjxQTWJyal5qSXxosLmlgYmlmZGToTERSgDTyCqf</recordid><startdate>20110308</startdate><enddate>20110308</enddate><creator>WEIERBACH ROBERT G</creator><creator>O'BERRY BRIAN C</creator><creator>KALAPA PRAMOD</creator><creator>JAJODIA SUSHIL</creator><creator>JACOBS MICHAEL A</creator><creator>NOEL STEVEN E</creator><creator>ROBERTSON ERIC B</creator><scope>EVB</scope></search><sort><creationdate>20110308</creationdate><title>Network attack modeling, analysis, and response</title><author>WEIERBACH ROBERT G ; O'BERRY BRIAN C ; KALAPA PRAMOD ; JAJODIA SUSHIL ; JACOBS MICHAEL A ; NOEL STEVEN E ; ROBERTSON ERIC B</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US7904962B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2011</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>WEIERBACH ROBERT G</creatorcontrib><creatorcontrib>O'BERRY BRIAN C</creatorcontrib><creatorcontrib>KALAPA PRAMOD</creatorcontrib><creatorcontrib>JAJODIA SUSHIL</creatorcontrib><creatorcontrib>JACOBS MICHAEL A</creatorcontrib><creatorcontrib>NOEL STEVEN E</creatorcontrib><creatorcontrib>ROBERTSON ERIC B</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>WEIERBACH ROBERT G</au><au>O'BERRY BRIAN C</au><au>KALAPA PRAMOD</au><au>JAJODIA SUSHIL</au><au>JACOBS MICHAEL A</au><au>NOEL STEVEN E</au><au>ROBERTSON ERIC B</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Network attack modeling, analysis, and response</title><date>2011-03-08</date><risdate>2011</risdate><abstract>Disclosed is a system for modeling, analyzing, and responding to network attacks. Machines are mapped to components, components are mapped to vulnerabilities, and vulnerabilities are mapped to exploits. Each of the exploits includes at least one precondition mapped to at least one postcondition. An attack graph which defines inter-exploit distances is generated using at least one of the exploits. The attack graph is aggregated. At least one hardening option is determined using the aggregated attack graph. Hardening options include applying at least one corrective measure to at least one initial condition, where the initial condition is the initial state of a precondition.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US7904962B1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | Network attack modeling, analysis, and response |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T20%3A07%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=WEIERBACH%20ROBERT%20G&rft.date=2011-03-08&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS7904962B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |