Log in
Enquire now
‌

US Patent 7013395 Method and tool for network vulnerability analysis

OverviewStructured DataIssuesContributors

Contents

Is a
Patent
Patent
0

Patent attributes

Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
0
Patent Number
70133950
Patent Inventor Names
Cynthia A. Phillips0
Laura Painton Swiler0
Date of Patent
March 14, 2006
0
Patent Application Number
098056400
Date Filed
March 13, 2001
0
Patent Citations Received
‌
US Patent 12093383 Tracking malware root causes with an event graph
0
‌
US Patent 11995191 Side-channel attack on HMAC-SHA-2 and associated testing
0
0
0
0
‌
US Patent 12086250 Detecting anomalous I/O patterns indicative of ransomware attacks
0
‌
US Patent 11882145 Detection of vulnerabilities in a computer network
0
‌
US Patent 11930046 System and method for determining vulnerability metrics for graph-based configuration security
0
...
Patent Primary Examiner
‌
Kambiz Zand
0
Patent abstract

A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in “attack templates”) to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in “attacker profiles”). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding “epsilon optimal paths.”

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 7013395 Method and tool for network vulnerability analysis

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.