发明名称 Methods of simulating vulnerability
摘要 Methods of simulating vulnerability are provided. In an example, multi-stage vulnerability across multiple systems may be simulated by first simulating a probing of at least one intermediate entity, the at least one intermediate entity connected to a target system, second simulating a probing of the target system if the first simulated probing is successful and generating an attack graph based on the results of the first and second simulating steps. In another example, multi-system vulnerability may be simulated by receiving a plurality of attributes associated with vulnerabilities of a plurality of systems within a network, the plurality of systems including at least one target system and generating an attack graph including one or more attack chains based at least in part on the received plurality of attributes. In another example, system (e.g., single-system) vulnerability may be simulated by first simulating whether vulnerabilities exploited from a first system state cause a transition to a second system state, the second system state having a higher-privilege level than the first system state within a target system and generating an attack graph based at least in part on the results of the simulation.
申请公布号 US2008098479(A1) 申请公布日期 2008.04.24
申请号 US20060584598 申请日期 2006.10.23
申请人 O'ROURKE PAUL F;SHANLEY ROBERT J 发明人 O'ROURKE PAUL F.;SHANLEY ROBERT J.
分类号 G06F11/00;G06F12/14;G06F12/16;G06F15/18;G08B23/00 主分类号 G06F11/00
代理机构 代理人
主权项
地址