skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

Patent ·
OSTI ID:1202321

Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

Research Organization:
Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)
Sponsoring Organization:
USDOE
DOE Contract Number:
AC05-76RL01830
Assignee:
Battelle Memorial Institute (Richland, WA)
Patent Number(s):
9,092,631
Application Number:
14/055,776
OSTI ID:
1202321
Resource Relation:
Patent File Date: 2013 Oct 16
Country of Publication:
United States
Language:
English

References (12)

Modeling Modern Network Attacks and Countermeasures Using Attack Graphs conference December 2009
Cyber/physical security vulnerability assessment integration
  • MacDonald, D.; Clements, S. L.; Patrick, S. W.
  • 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2013), 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT) https://doi.org/10.1109/ISGT.2013.6497883
conference February 2013
Quantitative assessment of cyber security risk using bayesian network-based model conference April 2009
Method for evaluating a network patent September 2012
Method for simulation aided security event management patent March 2013
Embedded model interaction within attack projection framework of information system patent April 2013
Method, a system, and a computer program product for managing access change assurance patent December 2013
System and method for risk detection and analysis in a computer network patent-application September 2005
Value-Adaptive Security Threat Modeling and Vulnerability Ranking patent-application March 2009
Systems, Program Product and Methods for Performing a Risk Assessment Workflow Process for Plant Networks and Systems patent-application July 2012
Threat Evaluation System and Method patent-application December 2013
System, Method and Apparatus for Assessing a Risk of One or More Assets Within an Operational Technology Infrastructure patent-application May 2014

Similar Records

Use of Multi-attribute Utility Functions in Evaluating Security Systems
Technical Report · Fri Jun 13 00:00:00 EDT 2008 · OSTI ID:1202321

Cyber / Physical Security Vulnerability Assessment Integration
Conference · Sat Jul 28 00:00:00 EDT 2012 · OSTI ID:1202321

Evaluation Report on "The Department's Unclassified Cyber Security Program"
Technical Report · Thu Oct 01 00:00:00 EDT 2009 · OSTI ID:1202321

Related Subjects