发明名称 NETWORK ATTACK SIMULATION SYSTEMS AND METHODS
摘要 A network attack simulation method including, at a network with a server and a plurality of computers, selecting one or more actions from a plurality of actions for operating on a first computer of the plurality of computers, transmitting instructions from the server to the first computer to execute the one or more selected actions, executing the one or more selected actions on the first computer, and generating data based on the execution of the selected actions. The method includes transmitting the data generated from the first computer to the server, identifying a target computer of the plurality of computers to access, transmitting one or more additional instructions from the server to the first computer to access the target computer using at least a portion of the data, and receiving confirmation from at least one of the first computer and the target computer that the target computer was accessed.
申请公布号 US2017006055(A1) 申请公布日期 2017.01.05
申请号 US201615180336 申请日期 2016.06.13
申请人 The MITRE Corporation 发明人 STROM Blake E.;KORBAN Christopher;WOLF Ross D.;MILLER Douglas;APPLEBAUM Andrew
分类号 H04L29/06;G06F17/50 主分类号 H04L29/06
代理机构 代理人
主权项 1. A computer network attack simulation server system comprising: a network connection for connecting the server system to a plurality of computers on the computer network; one or more processors; memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for: selecting one or more actions from a plurality of actions for operating on a first computer of the plurality of computers; instructing the first computer to execute the one or more selected actions; receiving, from the first computer, data generated in response to executing the one or more selected actions on the first computer; identifying a target computer of the plurality of computers to access; instructing the first computer to access the target computer using at least a portion of the data; and receiving confirmation from at least one of the first computer and the target computer that the target computer was accessed by the first computer.
地址 McLean VA US
您可能感兴趣的专利