Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture
Abstract
Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.
- Inventors:
- Issue Date:
- Research Org.:
- Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 1202321
- Patent Number(s):
- 9092631
- Application Number:
- 14/055,776
- Assignee:
- Battelle Memorial Institute (Richland, WA)
- Patent Classifications (CPCs):
-
G - PHYSICS G06 - COMPUTING G06F - ELECTRIC DIGITAL DATA PROCESSING
H - ELECTRICITY H04 - ELECTRIC COMMUNICATION TECHNIQUE H04L - TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- DOE Contract Number:
- AC05-76RL01830
- Resource Type:
- Patent
- Resource Relation:
- Patent File Date: 2013 Oct 16
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 97 MATHEMATICS AND COMPUTING
Citation Formats
Muller, George, Perkins, Casey J., Lancaster, Mary J., MacDonald, Douglas G., Clements, Samuel L., Hutton, William J., Patrick, Scott W., and Key, Bradley Robert. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture. United States: N. p., 2015.
Web.
Muller, George, Perkins, Casey J., Lancaster, Mary J., MacDonald, Douglas G., Clements, Samuel L., Hutton, William J., Patrick, Scott W., & Key, Bradley Robert. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture. United States.
Muller, George, Perkins, Casey J., Lancaster, Mary J., MacDonald, Douglas G., Clements, Samuel L., Hutton, William J., Patrick, Scott W., and Key, Bradley Robert. Tue .
"Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture". United States. https://www.osti.gov/servlets/purl/1202321.
@article{osti_1202321,
title = {Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture},
author = {Muller, George and Perkins, Casey J. and Lancaster, Mary J. and MacDonald, Douglas G. and Clements, Samuel L. and Hutton, William J. and Patrick, Scott W. and Key, Bradley Robert},
abstractNote = {Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2015},
month = {7}
}
Works referenced in this record:
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
conference, December 2009
- Ingols, Kyle; Chu, Matthew; Lippmann, Richard
- 2009 Annual Computer Security Applications Conference (ACSAC)
Cyber/physical security vulnerability assessment integration
conference, February 2013
- MacDonald, D.; Clements, S. L.; Patrick, S. W.
- 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2013), 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT)
Quantitative assessment of cyber security risk using bayesian network-based model
conference, April 2009
- Mo, Sheung Yin Kevin; Beling, Peter A.; Crowther, Kenneth G.
- 2009 Systems and Information Engineering Design Symposium (SIEDS)
Method for evaluating a network
patent, September 2012
- Lotem, Amnon; Choen, Gideon; Meiseles, Moshe
- US Patent Document 8,272,061
Method for simulation aided security event management
patent, March 2013
- Lotem, Amnon; Cohen, Gideon; Ban Naon, Lior
- US Patent Document 8,407,798
Embedded model interaction within attack projection framework of information system
patent, April 2013
- Bush, Stephen Francis; Kulkarni, Amit Bhavanishankar
- US Patent Document 8,433,768
Method, a system, and a computer program product for managing access change assurance
patent, December 2013
- Lotem, Amnon; Haiut, Alexander; Circus, Ravid
- US Patent Document 8,621,552
System and method for risk detection and analysis in a computer network
patent-application, September 2005
- Cohen, Gideon; Meiseles, Moshe; Reshef, Eran
- US Patent Document 11/118308; 20050193430
Value-Adaptive Security Threat Modeling and Vulnerability Ranking
patent-application, March 2009
- Chen, Yue; Boehm, Barry W.; Sheppard, Luke
- US Patent Document 12/047293; 20090077666
Systems, Program Product and Methods for Performing a Risk Assessment Workflow Process for Plant Networks and Systems
patent-application, July 2012
- Al-Harbi, Saad A.; Almadi, Soloman M.; Al-Salem, Hussain A.
- US Patent Application 12/987635; 20120180133
Threat Evaluation System and Method
patent-application, December 2013
- Flores, Roderick A.; Rolston, Britny
- US Patent Application 13/928178; 20130347116
System, Method and Apparatus for Assessing a Risk of One or More Assets Within an Operational Technology Infrastructure
patent-application, May 2014
- Martinez, Ralph; Cordero, Salvador; Obregon, Eduardo
- US Patent Application 14/078514; 20140137257