Method and system for simulating a hacking attack on a network

A hacker attack, network technology, applied in transmission systems, instruments, electrical digital data processing, etc., can solve problems such as inability to find attacks

Inactive Publication Date: 2010-03-24
IVIZ TECHNO SOLUTIONS PVT
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Although the existing methods provide the ability to automatically exploit and make threats on one or more DPUs (hosts) in the network, manual intervention is still required in the process of collecting relevant information and the vulnerability of the network. Manually orchestrate the attack, then manually launch the attack to gain access to the DPU
Therefore, automatically orchestrated attacks still cannot be found in existing methods
[0008] There is no prior art describing non-human intervention or automati...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for simulating a hacking attack on a network
  • Method and system for simulating a hacking attack on a network
  • Method and system for simulating a hacking attack on a network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025]While preferred embodiments of the invention have been shown and described, it should be understood that the invention is not limited to these embodiments. Numerous modifications, changes, changes, substitutions and equivalents will be apparent to those skilled in the art without departing from the spirit and scope of the present invention described in the claims.

[0026] figure 1 is an exemplary environment in which the invention may be practiced in accordance with various embodiments of the invention. figure 1 A number of data processing units (DPUs) are shown connected together with various components of a DPU network (such as a mainframe server, intranet, Internet). Examples of DPUs may be devices such as personal computers, laptop computers, mobile phones, personal digital assistants (PDAs), Various computing devices such as smartphones. Furthermore, examples of networks between which different DPUs can exchange information or data with each other may be Local ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention describes a method for simulating a hacking attack on a Network, wherein the Network comprises at least one of a plurality of data processing units (DPUs), a plurality of users and a plurality of communication links, to assess vulnerabilities of the Network. The method includes receiving one or more scan parameters for the Network. Further, the method includes creating at least one master agent by a system to gather information about the Network, wherein the information pertains to critical and non-critical information about the Network. The method includes creating an Information Model and then incrementally updating the Information Model during the hacking attack. The Information Model is the abstract representation of information collected by the system. Furthermore, the method includes generating a Multiple Attack Vector (MAV) graph based on one or more scan parameters and the Information Model. MAV has the ability to combine plurality of low and medium severity vulnerabilities associated with the data processing units (DPUs), users and communication links, correlate vulnerabilities in combination with Information Model and generate high severity attack paths that can lead to compromise of the Network. Moreover, the method includes launching one or more attacks based on the MAV graph to compromise the Network. The method further includes installing atleast one slave agent on the compromised Network to perform the one or more attacks in a distributed manner. Moreover, the method includes performing a multi stage attack by using the at least one slave agent and the at least one master agent by repeating above steps. Finally, the method includes generating a report by the scan controller, wherein the report contains details about the compromisedNetwork and the vulnerabilities of the Network.

Description

technical field [0001] The invention disclosed herein relates generally to the field of data processing unit (DPU) security, and more specifically, to vulnerability assessment of DPU networks. Background technique [0002] Due to the widespread use of networks, corporate offices, and business solutions, we need robust security in the field of network communications, and for this reason, network security has received enormous attention in the past few years. Network communications and e-commerce introduce new threats to organizations through viruses, Trojan horses, spam senders (SPAM) senders, intruders, and more. The network refers to a public network such as the Internet and a private network such as an intranet. Cybersecurity includes all activities of an organization to protect information or data in terms of integrity, confidentiality, authentication, access control, etc. Security measures are used to guard against untrustworthy external sources such as Internet users ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/00
CPCH04L63/1433
Inventor 比卡什·巴莱尼兰扬·德
Owner IVIZ TECHNO SOLUTIONS PVT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products