Network Behavior System Based on Simulation and Virtual Reality

A network security system, network technology, applied in the direction of transmission system, database model, data processing input/output process, etc., can solve the problem of insufficient number or speed of attacks

Active Publication Date: 2020-07-17
IRONNET CYBERSECURITY INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional practices for sharing information are insufficient to handle the volume or velocity of attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network Behavior System Based on Simulation and Virtual Reality
  • Network Behavior System Based on Simulation and Virtual Reality
  • Network Behavior System Based on Simulation and Virtual Reality

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In some embodiments, simulation and virtual reality systems are used to enhance operational capabilities and training of cyber defenders by sharing with each other behavior-related information, including observed behavior-related information, calculated Behavior-related information and behavior-related information generated when multiple real or virtual network participants from one or more organizations participate in scenarios, simulations, and virtual reality environments.

[0037] In some embodiments, behavior-related information is exchanged in a secure and privacy-preserving manner using a networked behavior exchange, so that two or more organizations can exchange information as part of scenarios, simulations, and virtual reality environments to enhance training, improve organizational or improve the defenses of multiple organizations sharing information.

[0038] cyberspace

[0039] Some embodiments of the cybersecurity system are based on the cyber behavior spa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure provides a network security system for managing network behavior associated with network participants to enable calculation and prediction of network behavior and to create network interactions between network participants. The system includes a web behavior space management module configured to receive input data and data from an interaction engine and an analytics workflow engine, and generate a plurality of web behavior spaces based on the received data. The system includes an interaction engine configured to process network participant data to facilitate interaction with a network behavior space, a network scene, a network map, and another network participant. The system includes an analytical workflow engine configured to analyze the network behavior space and update network data based on the analytical data and the interaction engine data. The system includes a visualization engine configured to compute a visualization and transmit the visualization for display.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to US Provisional Application No. 62 / 362,346, filed July 14, 2016, which is hereby incorporated by reference. technical field [0003] Some embodiments of the invention relate to cybersecurity in general and to simulation and virtual reality based cyber behavioral systems and knowledge sharing between cyber behavioral systems in particular. Background technique [0004] Traditionally, network defenders have only reviewed snippets of information to help understand what is actually happening on their networks. Simulating an entire network in order to see a potential course of action, defense strategies, and force onforce scenarios can be very difficult and labor-intensive. Current cybersecurity exercises allow defenders to fight each other, but these exercises do not cover every scenario that may occur on the network. Every day, the number and sophistication of new threats grows, and it...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/27G06F16/28G06F21/50G06F21/56
CPCA63F13/335A63F13/75A63F13/71G06F21/316H04L63/1433H04L63/1441G06F3/011G06F21/55G06F21/577H04L63/1425A63F2300/5553G06T19/006H04L63/14H04L63/1408
Inventor R·L·格罗斯曼K·B·亚历山大J·E·希思R·L·加雷特
Owner IRONNET CYBERSECURITY INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products