Synthetic cyber-risk model for vulnerability determination

作者: David Vallone , Phil J. Venables , Ruoh-Yann Huang , Peter Taylor

DOI:

关键词: Vulnerability managementComputer securityVulnerabilitySoftwareServerRisk modelTest (assessment)Engineering

摘要: A system, method, and device are presented for assessing a target network's vulnerability to real cyberthreat based on determining policy-based synthetic tests configured model the behavior of cyberthreat. Real-time feedback from network (e.g., servers, desktops, network/monitoring hardware and/or software equipment) received, analyzed, used determine whether any modifications same or new synthesized test is preferred. The technology includes self-healing processes that, using mechanisms, can attempt find patches known vulnerabilities, unknown configure resources in accordance with predefined service-level agreements.

参考文章(30)
Michael Scheidell, Intrusion detection system ,(2003)
Britny Rolston, Roderick A. Flores, Threat evaluation system and method ,(2013)
Yael Gertner, Frederick S.M. Herz, Walter Paul Labys, Distributed agent based model for security monitoring and response ,(2013)
Jeong-Rye Jeong, Sung-Do Chi, Jang-Se Lee, Hwan-Kuk Kim, Jong Park, Network security simulation system ,(2003)
Srinivasa Kakkera, Inderpal Ricky Arora, Subrat Narenda Singh, Jasvir Singh Gill, Policy/rule engine, multi-compliance framework and risk remediation ,(2015)