Network attack modeling, analysis, and response

Disclosed is a system for modeling, analyzing, and responding to network attacks. Machines are mapped to components, components are mapped to vulnerabilities, and vulnerabilities are mapped to exploits. Each of the exploits includes at least one precondition mapped to at least one postcondition. An...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: WEIERBACH ROBERT G, O'BERRY BRIAN C, KALAPA PRAMOD, JAJODIA SUSHIL, JACOBS MICHAEL A, NOEL STEVEN E, ROBERTSON ERIC B
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator WEIERBACH ROBERT G
O'BERRY BRIAN C
KALAPA PRAMOD
JAJODIA SUSHIL
JACOBS MICHAEL A
NOEL STEVEN E
ROBERTSON ERIC B
description Disclosed is a system for modeling, analyzing, and responding to network attacks. Machines are mapped to components, components are mapped to vulnerabilities, and vulnerabilities are mapped to exploits. Each of the exploits includes at least one precondition mapped to at least one postcondition. An attack graph which defines inter-exploit distances is generated using at least one of the exploits. The attack graph is aggregated. At least one hardening option is determined using the aggregated attack graph. Hardening options include applying at least one corrective measure to at least one initial condition, where the initial condition is the initial state of a precondition.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US7904962B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US7904962B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US7904962B13</originalsourceid><addsrcrecordid>eNrjZND3Sy0pzy_KVkgsKUlMzlbIzU9JzcnMS9dRSMxLzKksziwGsVIUilKLC_LzilN5GFjTEnOKU3mhNDeDgptriLOHbmpBfjxQTWJyal5qSXxosLmlgYmlmZGToTERSgDTyCqf</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Network attack modeling, analysis, and response</title><source>esp@cenet</source><creator>WEIERBACH ROBERT G ; O'BERRY BRIAN C ; KALAPA PRAMOD ; JAJODIA SUSHIL ; JACOBS MICHAEL A ; NOEL STEVEN E ; ROBERTSON ERIC B</creator><creatorcontrib>WEIERBACH ROBERT G ; O'BERRY BRIAN C ; KALAPA PRAMOD ; JAJODIA SUSHIL ; JACOBS MICHAEL A ; NOEL STEVEN E ; ROBERTSON ERIC B</creatorcontrib><description>Disclosed is a system for modeling, analyzing, and responding to network attacks. Machines are mapped to components, components are mapped to vulnerabilities, and vulnerabilities are mapped to exploits. Each of the exploits includes at least one precondition mapped to at least one postcondition. An attack graph which defines inter-exploit distances is generated using at least one of the exploits. The attack graph is aggregated. At least one hardening option is determined using the aggregated attack graph. Hardening options include applying at least one corrective measure to at least one initial condition, where the initial condition is the initial state of a precondition.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2011</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20110308&amp;DB=EPODOC&amp;CC=US&amp;NR=7904962B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20110308&amp;DB=EPODOC&amp;CC=US&amp;NR=7904962B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>WEIERBACH ROBERT G</creatorcontrib><creatorcontrib>O'BERRY BRIAN C</creatorcontrib><creatorcontrib>KALAPA PRAMOD</creatorcontrib><creatorcontrib>JAJODIA SUSHIL</creatorcontrib><creatorcontrib>JACOBS MICHAEL A</creatorcontrib><creatorcontrib>NOEL STEVEN E</creatorcontrib><creatorcontrib>ROBERTSON ERIC B</creatorcontrib><title>Network attack modeling, analysis, and response</title><description>Disclosed is a system for modeling, analyzing, and responding to network attacks. Machines are mapped to components, components are mapped to vulnerabilities, and vulnerabilities are mapped to exploits. Each of the exploits includes at least one precondition mapped to at least one postcondition. An attack graph which defines inter-exploit distances is generated using at least one of the exploits. The attack graph is aggregated. At least one hardening option is determined using the aggregated attack graph. Hardening options include applying at least one corrective measure to at least one initial condition, where the initial condition is the initial state of a precondition.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2011</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZND3Sy0pzy_KVkgsKUlMzlbIzU9JzcnMS9dRSMxLzKksziwGsVIUilKLC_LzilN5GFjTEnOKU3mhNDeDgptriLOHbmpBfjxQTWJyal5qSXxosLmlgYmlmZGToTERSgDTyCqf</recordid><startdate>20110308</startdate><enddate>20110308</enddate><creator>WEIERBACH ROBERT G</creator><creator>O'BERRY BRIAN C</creator><creator>KALAPA PRAMOD</creator><creator>JAJODIA SUSHIL</creator><creator>JACOBS MICHAEL A</creator><creator>NOEL STEVEN E</creator><creator>ROBERTSON ERIC B</creator><scope>EVB</scope></search><sort><creationdate>20110308</creationdate><title>Network attack modeling, analysis, and response</title><author>WEIERBACH ROBERT G ; O'BERRY BRIAN C ; KALAPA PRAMOD ; JAJODIA SUSHIL ; JACOBS MICHAEL A ; NOEL STEVEN E ; ROBERTSON ERIC B</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US7904962B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2011</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>WEIERBACH ROBERT G</creatorcontrib><creatorcontrib>O'BERRY BRIAN C</creatorcontrib><creatorcontrib>KALAPA PRAMOD</creatorcontrib><creatorcontrib>JAJODIA SUSHIL</creatorcontrib><creatorcontrib>JACOBS MICHAEL A</creatorcontrib><creatorcontrib>NOEL STEVEN E</creatorcontrib><creatorcontrib>ROBERTSON ERIC B</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>WEIERBACH ROBERT G</au><au>O'BERRY BRIAN C</au><au>KALAPA PRAMOD</au><au>JAJODIA SUSHIL</au><au>JACOBS MICHAEL A</au><au>NOEL STEVEN E</au><au>ROBERTSON ERIC B</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Network attack modeling, analysis, and response</title><date>2011-03-08</date><risdate>2011</risdate><abstract>Disclosed is a system for modeling, analyzing, and responding to network attacks. Machines are mapped to components, components are mapped to vulnerabilities, and vulnerabilities are mapped to exploits. Each of the exploits includes at least one precondition mapped to at least one postcondition. An attack graph which defines inter-exploit distances is generated using at least one of the exploits. The attack graph is aggregated. At least one hardening option is determined using the aggregated attack graph. Hardening options include applying at least one corrective measure to at least one initial condition, where the initial condition is the initial state of a precondition.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US7904962B1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Network attack modeling, analysis, and response
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T20%3A07%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=WEIERBACH%20ROBERT%20G&rft.date=2011-03-08&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS7904962B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true