-
公开(公告)号:US20200169476A1
公开(公告)日:2020-05-28
申请号:US16655946
申请日:2019-10-17
Applicant: Booz Allen Hamilton Inc.
Inventor: Chelsea VELA , Justin HOFFMAN
Abstract: An exemplary system and method for generating a network diagram. The system includes a first interface for receiving one or more first datasets of network data. A processor configured to generate a first network diagram and identify changes in a network by overlaying one or more network diagram layers or a second network diagram on the first network diagram. The one or more network diagram layers corresponding to captured packets of the first datasets or of second datasets and the second network diagram corresponding to captured packets of the second datasets. A second interface for graphically displaying the network diagram by highlighting and/or animating one or more nodes and/or node connections based on at least one of the identified changes from the overlay.
-
公开(公告)号:US20220141248A1
公开(公告)日:2022-05-05
申请号:US17575917
申请日:2022-01-14
Applicant: Booz Allen Hamilton Inc.
Inventor: Chelsea VELA , Justin HOFFMAN
IPC: H04L9/40
Abstract: A system for generating a cyber-attack to penetrate a network. The system includes an identification module configured to identify at least one vulnerability of the network by examining at least one of a node of the network, data transmission within the network, or data received from a cyber defense mechanism; a generation module configured to generate a cyber-attack based on the at least one vulnerability of the network, and a goal to be achieved by the cyber-attack. The system includes a penetration module configured to penetrate the network with the cyber-attack and determine an effectiveness rating of the penetration; and a feedback module configured to provide a feedback to the identification module based on at least the effectiveness rating of the penetration.
-
公开(公告)号:US20210273967A1
公开(公告)日:2021-09-02
申请号:US16453212
申请日:2019-06-26
Applicant: Booz Allen Hamilton Inc.
Inventor: Chelsea VELA , Justin HOFFMAN
IPC: H04L29/06
Abstract: A system for generating a cyber-attack to penetrate a network. The system includes an identification module configured to identify at least one vulnerability of the network by examining at least one of a node of the network, data transmission within the network, or data received from a cyber defense mechanism; a generation module configured to generate a cyber-attack based on the at least one vulnerability of the network, and a goal to be achieved by the cyber-attack. The system includes a penetration module configured to penetrate the network with the cyber-attack and determine an effectiveness rating of the penetration; and a feedback module configured to provide a feedback to the identification module based on at least the effectiveness rating of the penetration.
-
-