System and method for risk detection and analysis in a...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000

Reexamination Certificate

active

06952779

ABSTRACT:
The present invention provides systems and methods for risk detection and analysis in a computer network. Computerized, automated systems and methods can be provided. Raw vulnerability information and network information can be utilized in determining actual vulnerability information associated with network nodes. Methods are provided in which computer networks are modeled, and the models utilized in performing attack simulations and determining risks associated with vulnerabilities. Risks can be evaluated and prioritized, and fix information can be provided.

REFERENCES:
patent: 4773028 (1988-09-01), Tallman
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5278901 (1994-01-01), Shieh et al.
patent: 5295230 (1994-03-01), Kung
patent: 5361359 (1994-11-01), Tajalli et al.
patent: 5475625 (1995-12-01), Glaschick
patent: 5485409 (1996-01-01), Gupta et al.
patent: 5557742 (1996-09-01), Smaha et al.
patent: 5621889 (1997-04-01), Lermuzeaux et al.
patent: 5796942 (1998-08-01), Esbensen
patent: 5812763 (1998-09-01), Teng
patent: 5819094 (1998-10-01), Sato et al.
patent: 5850516 (1998-12-01), Schneier
patent: 5892903 (1999-04-01), Klaus
patent: 5923849 (1999-07-01), Venkatraman
patent: 5926463 (1999-07-01), Ahearn et al.
patent: 5931946 (1999-08-01), Terada
patent: 5958010 (1999-09-01), Agarwal et al.
patent: 5991881 (1999-11-01), Conklin
patent: 6070244 (2000-05-01), Orchier et al.
patent: 6088804 (2000-07-01), Hill et al.
patent: 6134664 (2000-10-01), Walker
patent: 6185689 (2001-02-01), Todd, Sr. et al.
patent: 6205552 (2001-03-01), Fudge
patent: 6212558 (2001-04-01), Antur et al.
patent: 6253337 (2001-06-01), Maloney et al.
patent: 6275942 (2001-08-01), Bernhard et al.
patent: 6282546 (2001-08-01), Gleichauf et al.
patent: 6295607 (2001-09-01), Johnson
patent: 6298445 (2001-10-01), Shostack et al.
patent: 6301613 (2001-10-01), Ahlstrom et al.
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6301699 (2001-10-01), Hollander et al.
patent: 6324656 (2001-11-01), Gleichauf et al.
patent: 6415321 (2002-07-01), Gleichauf et al.
patent: 6546493 (2003-04-01), Magdych et al.
Swiler, Laura Painton, et al.; “A Graph-Based Network-Vulnerability Analysis System”, Sandia Report, Jan. 1998, pp. 1-21.
Phillips, Cynthia, et al.; “A Preliminary Classification Scheme for Information System Threats, Attacks, and Defenses; A Cause and Effect Model; and Some Analysis Based on that Model”, Sandia National Laboratories, Sep., 1998, pp. 1-78.
http://www-2.cs.cmu.edu/afs/cs.cmu.edu/project/venari/www/usenix96-kindred-wing.html, Kindred, Darrell, et al.; “Fast, Automatic Checking of Security Protocols”, pp. 1-19.
Wing, Jeannette M., et al.; “Survivability Analysis of Networked Systems”, Computer Science Dept., Carnegie Mellon Univ., Pittsburgh, PA; Information and Communications Univ., Taejon, Korea, May, 14, 2001, pp. 1-31.
Wyss, Gregory D., et al.; “Information Systems Vulnerability: A Systems Analysis Perspective”, Sandia National Laboratories, pp. 1-14.
http://www.math.uiuc.edu/Hilda/htmlcalenders/Apr24—00/jha—apr24-00.html, Jha, Somesh; “Survivability Analysis of Software Specifications”, Department of Mathmatics, University of Illinois at Urbana-Champaign, Abstract.
Oleg Sheyner, et al.; “Toward Compositional Analysis of Security Protocols Using Theorem Proving”, School of Computer Science, CarnegieMellon Univ., Jan. 2000, pp. 1-28.
Jha, Somesh, et al.; “Minimization and Reliability Analyses of Attack Graphs”, School of Computer Science, Carnegie Mellon University, pp. 1-30.
Deswarte, Yves, et al.; “Experimental Validation of a Security Metrics”, LAAS-CNRS, pp. 1-6.
Mummidi, Sailaja, et al.; “Information Management System Vulnerability Analysis Study”, New Mexico Tech., Nov. 8, 2001, pp. 1-16.
http://www
aseo.org/committees/energy data/energy assurance/, pp. 1-2.
Hutchinson, Bob, et al.; “Lessons Learned Through Sandia's Cyber Assessment Program”, Sandi National Laboratories, pp. 1-17.
http://www.comp.nus.edu.sg/apsec2000/index—right.html, Wing, Jeannete M.; “Survivability Analysis of Networked Systems”, Carnegie Mellon University, Abstract; van Lamsweerde, Axel; “Building Formal Models for Software Requirements”, Universite Catholique de Louvain, Abstract.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for risk detection and analysis in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for risk detection and analysis in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for risk detection and analysis in a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3472376

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.