-
公开(公告)号:US10346628B2
公开(公告)日:2019-07-09
申请号:US15164673
申请日:2016-05-25
Applicant: Architecture Technology Corporation
Inventor: Daniel James Tingstrom , Judson Powers , Matthew P. Donovan
Abstract: An example method includes selecting, based at least on first and second policies, first and second containers in which to execute first and second applications, respectively. The example method further includes isolating execution of the first application in the first container, and isolating execution of the second application in the second container. The example method also includes applying, based at least on the first policy, a first group of security controls to the first application executing in the first container, wherein the first container defines a first domain in which the first application is executed, and applying, based at least on the second policy, a second group of security controls to the second application executing in the second container, wherein the second container defines a second domain in which the second application is executed.
-
公开(公告)号:US10777093B1
公开(公告)日:2020-09-15
申请号:US16059716
申请日:2018-08-09
Applicant: Architecture Technology Corporation
Inventor: Stephen K. Brueckner , Frank N. Adelstein , Haim Yehuda Bar , Matthew P. Donovan
Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
-
公开(公告)号:US11042647B1
公开(公告)日:2021-06-22
申请号:US16723097
申请日:2019-12-20
Applicant: Architecture Technology Corporation
Inventor: Robert A. Joyce , Matthew P. Donovan
Abstract: An example method includes monitoring execution of one or more applications on a runtime computing system that includes a plurality of processing units, receiving, from the runtime computing system during execution of the applications, monitoring information that includes at least one of function call data or application programming interface call data associated with operations performed by the plurality of processing units during execution of the applications, importing the monitoring information into a risk model, analyzing the monitoring information within the risk model to determine one or more potential vulnerabilities and one or more impacts of the one or more vulnerabilities in the runtime computing system, and outputting, for display in a graphical user interface, a graphical representation of the one or more potential vulnerabilities and the one or more impacts within the risk model.
-
公开(公告)号:US10803766B1
公开(公告)日:2020-10-13
申请号:US15712057
申请日:2017-09-21
Applicant: Architecture Technology Corporation
Inventor: Matthew P. Donovan , Tyler J. Mitchell , Dahyun Hollister
Abstract: An example method includes deploying, by a modular training system and on one or more virtual machines in a network, one or more training environments that are configured to execute one or more training exercises; deploying, by the modular training system and for execution by one or more remote host computing systems that are communicatively coupled to the network, one or more software agents that are executed during the one or more training exercises, wherein the one or more software agents are configured to collect parameter data from the one or more remote host computing systems while the one or more trainees perform actions during the training exercise; and receiving, by the modular training system and from the one or more remote host computing system via the network, the parameter data collected by the one or more software agents during execution of the one or more training exercises.
-
公开(公告)号:US10558809B1
公开(公告)日:2020-02-11
申请号:US15485784
申请日:2017-04-12
Applicant: Architecture Technology Corporation
Inventor: Robert A. Joyce , Matthew P. Donovan
Abstract: An example method includes monitoring execution of one or more applications on a runtime computing system that includes a plurality of processing units, receiving, from the runtime computing system during execution of the applications, monitoring information that includes at least one of function call data or application programming interface call data associated with operations performed by the plurality of processing units during execution of the applications, importing the monitoring information into a risk model, analyzing the monitoring information within the risk model to determine one or more potential vulnerabilities and one or more impacts of the one or more vulnerabilities in the runtime computing system, and outputting, for display in a graphical user interface, a graphical representation of the one or more potential vulnerabilities and the one or more impacts within the risk model.
-
公开(公告)号:US20150213730A1
公开(公告)日:2015-07-30
申请号:US14683923
申请日:2015-04-10
Applicant: Architecture Technology Corporation
Inventor: Stephen K. Brueckner , Frank N. Adelstein , Haim Yehuda Bar , Matthew P. Donovan
IPC: G09B19/00
CPC classification number: G09B19/0053 , G09B5/00 , G09B7/00 , G09B9/00 , G09B19/003 , H04L63/029 , H04L63/1441 , H04L63/145 , H04L63/1458 , H04L63/1475
Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
-
公开(公告)号:US10909257B1
公开(公告)日:2021-02-02
申请号:US16460246
申请日:2019-07-02
Applicant: Architecture Technology Corporation
Inventor: Daniel James Tingstrom , Judson Powers , Matthew P. Donovan
Abstract: An example method includes selecting, based at least on first and second policies, first and second containers in which to execute first and second applications, respectively. The example method further includes isolating execution of the first application in the first container, and isolating execution of the second application in the second container. The example method also includes applying, based at least on the first policy, a first group of security controls to the first application executing in the first container, wherein the first container defines a first domain in which the first application is executed, and applying, based at least on the second policy, a second group of security controls to the second application executing in the second container, wherein the second container defines a second domain in which the second application is executed.
-
公开(公告)号:US10068493B2
公开(公告)日:2018-09-04
申请号:US15199279
申请日:2016-06-30
Applicant: Architecture Technology Corporation
Inventor: Stephen K. Brueckner , Frank N. Adelstein , Haim Yehuda Bar , Matthew P. Donovan
Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
-
公开(公告)号:US20170177892A1
公开(公告)日:2017-06-22
申请号:US15164673
申请日:2016-05-25
Applicant: Architecture Technology Corporation
Inventor: Daniel James Tingstrom , Judson Powers , Matthew P. Donovan
CPC classification number: G06F21/6218 , G06F16/22 , G06F21/53 , G06F2221/2113 , H04W12/08 , H04W12/0806
Abstract: An example method includes selecting, based at least on first and second policies, first and second containers in which to execute first and second applications, respectively. The example method further includes isolating execution of the first application in the first container, and isolating execution of the second application in the second container. The example method also includes applying, based at least on the first policy, a first group of security controls to the first application executing in the first container, wherein the first container defines a first domain in which the first application is executed, and applying, based at least on the second policy, a second group of security controls to the second application executing in the second container, wherein the second container defines a second domain in which the second application is executed.
-
10.
公开(公告)号:US20170032694A1
公开(公告)日:2017-02-02
申请号:US14811403
申请日:2015-07-28
Applicant: Architecture Technology Corporation
Inventor: Stephen K. Brueckner , Matthew P. Donovan
CPC classification number: G09B19/0053 , G09B5/02
Abstract: An example method includes outputting a graphical dashboard that includes one or more learning objective nodes and one or more skill nodes, selecting one or more software agents that are associated with the one or more skill nodes, providing, to at least one host computing system, an indication of the one or more software agents that are configured to collect parameter data from the at least one host computing system while a trainee performs actions, receiving the parameter data collected by the one or more software agents during execution, determining, based on the parameter data, that the one or more skills represented by the one or more skill nodes have been demonstrated by the trainee, and updating the one or more skill nodes to graphically indicate that one or more represented skills have been demonstrated.
Abstract translation: 示例性方法包括输出包括一个或多个学习目标节点和一个或多个技能节点的图形仪表板,选择与所述一个或多个技能节点相关联的一个或多个软件代理,向至少一个主计算系统, 所述一个或多个软件代理的指示被配置为在所述受训者执行动作时收集来自所述至少一个主计算系统的参数数据,在执行期间接收由所述一个或多个软件代理收集的参数数据,基于 参数数据,所述一个或多个技能节点所表示的一个或多个技能已由受训者证明,并且更新一个或多个技能节点以图形地表示已经证明了一个或多个表示的技能。
-
-
-
-
-
-
-
-
-