Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate
2011-03-08
2011-03-08
Arani, Taghi T (Department: 2438)
Information security
Monitoring or scanning of software or data including attack...
Vulnerability assessment
C726S022000, C726S023000, C726S024000, C709S223000, C709S224000
Reexamination Certificate
active
07904962
ABSTRACT:
Disclosed is a system for modeling, analyzing, and responding to network attacks. Machines are mapped to components, components are mapped to vulnerabilities, and vulnerabilities are mapped to exploits. Each of the exploits includes at least one precondition mapped to at least one postcondition. An attack graph which defines inter-exploit distances is generated using at least one of the exploits. The attack graph is aggregated. At least one hardening option is determined using the aggregated attack graph. Hardening options include applying at least one corrective measure to at least one initial condition, where the initial condition is the initial state of a precondition.
REFERENCES:
patent: 5721931 (1998-02-01), Gephardt et al.
patent: 7013395 (2006-03-01), Swiler et al.
patent: 7073198 (2006-07-01), Flowers et al.
patent: 2006/0070128 (2006-03-01), Heimerdinger et al.
Scalable, Graph-Based Network Vulnerability Analysis by Ammann et al; Date: Nov. 2002; Publisher: ACM.
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs by Noel et al; Year:2003; Publisher: IEEE.
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security by Ortalo et al; Year: 1999; Publisher: IEEE.
Representing TCP/IP connectivity for topological analysis of network security by Ritchey et al; Year: 2002; Publisher: IEEE.
Constructing Attack Scenarios through Correlation of Intrusion Alerts by Ning et al; Date: Nov. 2002; Publisher: ACM.
Topological Analysis of Network Attack Vulnerability by Jajodia et al; Date: Nov. 3, 2003; Publisher: CiteSeerX.
Jacobs Michael A.
Jajodia Sushil
Kalapa Pramod
Noel Steven E.
O'Berry Brian C.
Arani Taghi T
George Mason Intellectual Properties, Inc.
Grossman David G.
Herzog Madhuri
Rodriguez Edgar G.
LandOfFree
Network attack modeling, analysis, and response does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Network attack modeling, analysis, and response, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Network attack modeling, analysis, and response will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2642170