SYSTEM AND METHOD FOR GENERATING A NETWORK DIAGRAM

    公开(公告)号:US20200169476A1

    公开(公告)日:2020-05-28

    申请号:US16655946

    申请日:2019-10-17

    Abstract: An exemplary system and method for generating a network diagram. The system includes a first interface for receiving one or more first datasets of network data. A processor configured to generate a first network diagram and identify changes in a network by overlaying one or more network diagram layers or a second network diagram on the first network diagram. The one or more network diagram layers corresponding to captured packets of the first datasets or of second datasets and the second network diagram corresponding to captured packets of the second datasets. A second interface for graphically displaying the network diagram by highlighting and/or animating one or more nodes and/or node connections based on at least one of the identified changes from the overlay.

    SYSTEM AND METHOD FOR SECURING A NETWORK

    公开(公告)号:US20220141248A1

    公开(公告)日:2022-05-05

    申请号:US17575917

    申请日:2022-01-14

    Abstract: A system for generating a cyber-attack to penetrate a network. The system includes an identification module configured to identify at least one vulnerability of the network by examining at least one of a node of the network, data transmission within the network, or data received from a cyber defense mechanism; a generation module configured to generate a cyber-attack based on the at least one vulnerability of the network, and a goal to be achieved by the cyber-attack. The system includes a penetration module configured to penetrate the network with the cyber-attack and determine an effectiveness rating of the penetration; and a feedback module configured to provide a feedback to the identification module based on at least the effectiveness rating of the penetration.

    SYSTEM AND METHOD FOR SECURING A NETWORK

    公开(公告)号:US20210273967A1

    公开(公告)日:2021-09-02

    申请号:US16453212

    申请日:2019-06-26

    Abstract: A system for generating a cyber-attack to penetrate a network. The system includes an identification module configured to identify at least one vulnerability of the network by examining at least one of a node of the network, data transmission within the network, or data received from a cyber defense mechanism; a generation module configured to generate a cyber-attack based on the at least one vulnerability of the network, and a goal to be achieved by the cyber-attack. The system includes a penetration module configured to penetrate the network with the cyber-attack and determine an effectiveness rating of the penetration; and a feedback module configured to provide a feedback to the identification module based on at least the effectiveness rating of the penetration.

Patent Agency Ranking