发明名称 K-zero day safety
摘要 Systems and methods for determining a safety level of a network vulnerable to attack from at least one origin to at least one target are described. Machines, components, and vulnerabilities in a network may be associated to one another. Degrees of similarity among the vulnerabilities may be determined and subsets of vulnerabilities may be grouped based on their determined degrees of similarity to one another. This data may be used to generate an attack graph describing exploitation of vulnerabilities and grouped vulnerabilities and defining vulnerability exploit condition relationships between at least one origin and at least one target. The attack graph may be analyzed using a k-zero day metric function to determine a safety level.
申请公布号 US8918884(B2) 申请公布日期 2014.12.23
申请号 US201213348457 申请日期 2012.01.11
申请人 The United States of America, as represented by the Secretary of Commerce;The National Institute of Standards and Technology;George Mason Intellectual Properties, Inc. 发明人 Jajodia Sushil;Wang Lingyu;Noel Steven;Singhal Anoop
分类号 G06F21/00;G06F21/57;H04L29/06 主分类号 G06F21/00
代理机构 DLA Piper LLP (US) 代理人 DLA Piper LLP (US)
主权项 1. A method for determining a safety level of a network vulnerable to attack from at least one origin to at least one target, the network comprising at least one machine having a plurality of components, comprising: associating, with a computer, the at least one machine with the plurality of components, the plurality of components comprising an origin component and a target component; associating, with the computer, each of the plurality of components with at least one of a plurality of vulnerabilities; determining, with the computer, a plurality of degrees of similarity among the plurality of vulnerabilities; grouping, with the computer, subsets of the plurality of vulnerabilities based on their determined degrees of similarity to one another, wherein each group of vulnerabilities is subject to a distinct zero day exploit; generating, with the computer, an attack graph describing exploitation of the plurality of vulnerabilities, the attack graph defining exploit condition relationships between the origin component and the target component; analyzing, with the computer, the attack graph using a k-zero day metric function based on a number of distinct zero day exploits required to compromise the target component in an attack starting from the origin component; and determining, with the computer, a safety level based on the analysis of the attack graph using the k-zero day metric function.
地址 Washington DC US
您可能感兴趣的专利