Multi-domain application execution management

    公开(公告)号:US10346628B2

    公开(公告)日:2019-07-09

    申请号:US15164673

    申请日:2016-05-25

    Abstract: An example method includes selecting, based at least on first and second policies, first and second containers in which to execute first and second applications, respectively. The example method further includes isolating execution of the first application in the first container, and isolating execution of the second application in the second container. The example method also includes applying, based at least on the first policy, a first group of security controls to the first application executing in the first container, wherein the first container defines a first domain in which the first application is executed, and applying, based at least on the second policy, a second group of security controls to the second application executing in the second container, wherein the second container defines a second domain in which the second application is executed.

    Automated execution and evaluation of network-based training exercises

    公开(公告)号:US10777093B1

    公开(公告)日:2020-09-15

    申请号:US16059716

    申请日:2018-08-09

    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.

    Software assurance system for runtime environments

    公开(公告)号:US11042647B1

    公开(公告)日:2021-06-22

    申请号:US16723097

    申请日:2019-12-20

    Abstract: An example method includes monitoring execution of one or more applications on a runtime computing system that includes a plurality of processing units, receiving, from the runtime computing system during execution of the applications, monitoring information that includes at least one of function call data or application programming interface call data associated with operations performed by the plurality of processing units during execution of the applications, importing the monitoring information into a risk model, analyzing the monitoring information within the risk model to determine one or more potential vulnerabilities and one or more impacts of the one or more vulnerabilities in the runtime computing system, and outputting, for display in a graphical user interface, a graphical representation of the one or more potential vulnerabilities and the one or more impacts within the risk model.

    Modular training of network-based training exercises

    公开(公告)号:US10803766B1

    公开(公告)日:2020-10-13

    申请号:US15712057

    申请日:2017-09-21

    Abstract: An example method includes deploying, by a modular training system and on one or more virtual machines in a network, one or more training environments that are configured to execute one or more training exercises; deploying, by the modular training system and for execution by one or more remote host computing systems that are communicatively coupled to the network, one or more software agents that are executed during the one or more training exercises, wherein the one or more software agents are configured to collect parameter data from the one or more remote host computing systems while the one or more trainees perform actions during the training exercise; and receiving, by the modular training system and from the one or more remote host computing system via the network, the parameter data collected by the one or more software agents during execution of the one or more training exercises.

    Software assurance system for runtime environments

    公开(公告)号:US10558809B1

    公开(公告)日:2020-02-11

    申请号:US15485784

    申请日:2017-04-12

    Abstract: An example method includes monitoring execution of one or more applications on a runtime computing system that includes a plurality of processing units, receiving, from the runtime computing system during execution of the applications, monitoring information that includes at least one of function call data or application programming interface call data associated with operations performed by the plurality of processing units during execution of the applications, importing the monitoring information into a risk model, analyzing the monitoring information within the risk model to determine one or more potential vulnerabilities and one or more impacts of the one or more vulnerabilities in the runtime computing system, and outputting, for display in a graphical user interface, a graphical representation of the one or more potential vulnerabilities and the one or more impacts within the risk model.

    Multi-domain application execution management

    公开(公告)号:US10909257B1

    公开(公告)日:2021-02-02

    申请号:US16460246

    申请日:2019-07-02

    Abstract: An example method includes selecting, based at least on first and second policies, first and second containers in which to execute first and second applications, respectively. The example method further includes isolating execution of the first application in the first container, and isolating execution of the second application in the second container. The example method also includes applying, based at least on the first policy, a first group of security controls to the first application executing in the first container, wherein the first container defines a first domain in which the first application is executed, and applying, based at least on the second policy, a second group of security controls to the second application executing in the second container, wherein the second container defines a second domain in which the second application is executed.

    Automated execution and evaluation of network-based training exercises

    公开(公告)号:US10068493B2

    公开(公告)日:2018-09-04

    申请号:US15199279

    申请日:2016-06-30

    Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.

    MULTI-DOMAIN APPLICATION EXECUTION MANAGEMENT

    公开(公告)号:US20170177892A1

    公开(公告)日:2017-06-22

    申请号:US15164673

    申请日:2016-05-25

    Abstract: An example method includes selecting, based at least on first and second policies, first and second containers in which to execute first and second applications, respectively. The example method further includes isolating execution of the first application in the first container, and isolating execution of the second application in the second container. The example method also includes applying, based at least on the first policy, a first group of security controls to the first application executing in the first container, wherein the first container defines a first domain in which the first application is executed, and applying, based at least on the second policy, a second group of security controls to the second application executing in the second container, wherein the second container defines a second domain in which the second application is executed.

    REAL-TIME MONITORING OF NETWORK-BASED TRAINING EXERCISES
    10.
    发明申请
    REAL-TIME MONITORING OF NETWORK-BASED TRAINING EXERCISES 审中-公开
    基于网络的培训练习的实时监控

    公开(公告)号:US20170032694A1

    公开(公告)日:2017-02-02

    申请号:US14811403

    申请日:2015-07-28

    CPC classification number: G09B19/0053 G09B5/02

    Abstract: An example method includes outputting a graphical dashboard that includes one or more learning objective nodes and one or more skill nodes, selecting one or more software agents that are associated with the one or more skill nodes, providing, to at least one host computing system, an indication of the one or more software agents that are configured to collect parameter data from the at least one host computing system while a trainee performs actions, receiving the parameter data collected by the one or more software agents during execution, determining, based on the parameter data, that the one or more skills represented by the one or more skill nodes have been demonstrated by the trainee, and updating the one or more skill nodes to graphically indicate that one or more represented skills have been demonstrated.

    Abstract translation: 示例性方法包括输出包括一个或多个学习目标节点和一个或多个技能节点的图形仪表板,选择与所述一个或多个技能节点相关联的一个或多个软件代理,向至少一个主计算系统, 所述一个或多个软件代理的指示被配置为在所述受训者执行动作时收集来自所述至少一个主计算系统的参数数据,在执行期间接收由所述一个或多个软件代理收集的参数数据,基于 参数数据,所述一个或多个技能节点所表示的一个或多个技能已由受训者证明,并且更新一个或多个技能节点以图形地表示已经证明了一个或多个表示的技能。

Patent Agency Ranking