HK1257497A1 - 評估網絡安全技術的有效性 - Google Patents
評估網絡安全技術的有效性Info
- Publication number
- HK1257497A1 HK1257497A1 HK18116287.8A HK18116287A HK1257497A1 HK 1257497 A1 HK1257497 A1 HK 1257497A1 HK 18116287 A HK18116287 A HK 18116287A HK 1257497 A1 HK1257497 A1 HK 1257497A1
- Authority
- HK
- Hong Kong
- Prior art keywords
- assessing effectiveness
- cybersecurity technologies
- cybersecurity
- technologies
- assessing
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562238974P | 2015-10-08 | 2015-10-08 | |
US201662374953P | 2016-08-15 | 2016-08-15 | |
PCT/US2016/055670 WO2017116525A2 (en) | 2015-10-08 | 2016-10-06 | Assessing effectiveness of cybersecurity technologies |
Publications (1)
Publication Number | Publication Date |
---|---|
HK1257497A1 true HK1257497A1 (zh) | 2019-10-25 |
Family
ID=58499149
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
HK18116287.8A HK1257497A1 (zh) | 2015-10-08 | 2018-12-19 | 評估網絡安全技術的有效性 |
Country Status (5)
Country | Link |
---|---|
US (2) | US10270798B2 (zh) |
EP (1) | EP3360043A4 (zh) |
CA (1) | CA3001463A1 (zh) |
HK (1) | HK1257497A1 (zh) |
WO (1) | WO2017116525A2 (zh) |
Families Citing this family (53)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3360043A4 (en) * | 2015-10-08 | 2019-04-24 | Siege Technologies LLC | ASSESSING THE EFFECTIVENESS OF CYBER SECURITY TECHNOLOGIES |
US20180004958A1 (en) * | 2016-07-01 | 2018-01-04 | Hewlett Packard Enterprise Development Lp | Computer attack model management |
GB2554981A (en) | 2016-08-16 | 2018-04-18 | British Telecomm | Configuration parameters for virtual machines |
WO2018033350A1 (en) | 2016-08-16 | 2018-02-22 | British Telecommunications Public Limited Company | Reconfigured virtual machine to mitigate attack |
GB2554982B (en) * | 2016-08-16 | 2019-02-13 | British Telecomm | Security in virtualised computing environments |
GB2555176B (en) * | 2016-08-16 | 2019-02-13 | British Telecomm | Machine learning for attack mitigation in virtual machines |
GB2554984B (en) * | 2016-08-16 | 2019-02-13 | British Telecomm | Secure configuration in a virtualised computing environment |
GB2554983B (en) | 2016-08-16 | 2019-02-13 | British Telecomm | Attack assessment in a virtualised computing environment |
US11423144B2 (en) | 2016-08-16 | 2022-08-23 | British Telecommunications Public Limited Company | Mitigating security attacks in virtualized computing environments |
US10999308B2 (en) | 2017-01-30 | 2021-05-04 | Xm Cyber Ltd. | Setting-up penetration testing campaigns |
US10581802B2 (en) | 2017-03-16 | 2020-03-03 | Keysight Technologies Singapore (Sales) Pte. Ltd. | Methods, systems, and computer readable media for advertising network security capabilities |
US10862918B2 (en) * | 2017-04-21 | 2020-12-08 | Raytheon Bbn Technologies Corp. | Multi-dimensional heuristic search as part of an integrated decision engine for evolving defenses |
US11082450B2 (en) * | 2017-04-21 | 2021-08-03 | Raytheon Bbn Technologies Corp. | User interface supporting an integrated decision engine for evolving defenses |
US11620386B2 (en) * | 2017-05-17 | 2023-04-04 | Threatmodeler Software Inc. | Threat modeling systems and related methods including mitigating components |
US11568059B2 (en) | 2017-05-17 | 2023-01-31 | Threatmodeler Software Inc. | Systems and methods for automated threat model generation from diagram files |
US11314872B2 (en) * | 2017-05-17 | 2022-04-26 | Threatmodeler Software Inc. | Systems and methods for automated threat modeling when deploying infrastructure as a code |
US10705868B2 (en) | 2017-08-07 | 2020-07-07 | Modelop, Inc. | Dynamically configurable microservice model for data analysis using sensors |
CN107343011A (zh) * | 2017-09-04 | 2017-11-10 | 北京经纬信安科技有限公司 | 一种基于动态目标防御的内源威胁防御设备 |
US10447721B2 (en) | 2017-09-13 | 2019-10-15 | Xm Cyber Ltd. | Systems and methods for using multiple lateral movement strategies in penetration testing |
US20200106792A1 (en) * | 2017-10-19 | 2020-04-02 | Circadence Corporation | Method and system for penetration testing classification based on captured log data |
EP3711279A1 (en) | 2017-11-15 | 2020-09-23 | XM Cyber Ltd. | Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign |
US10440044B1 (en) | 2018-04-08 | 2019-10-08 | Xm Cyber Ltd. | Identifying communicating network nodes in the same local network |
US11252172B1 (en) * | 2018-05-10 | 2022-02-15 | State Farm Mutual Automobile Insurance Company | Systems and methods for automated penetration testing |
WO2019222662A1 (en) | 2018-05-18 | 2019-11-21 | Nehemiah Security, Llc | Methods and apparatuses to evaluate cyber security risk by establishing a probability of a cyber-attack being successful |
US10382473B1 (en) | 2018-09-12 | 2019-08-13 | Xm Cyber Ltd. | Systems and methods for determining optimal remediation recommendations in penetration testing |
CN109347830B (zh) * | 2018-10-23 | 2021-04-20 | 中国人民解放军战略支援部队信息工程大学 | 一种网络动态防御系统及方法 |
US11257393B2 (en) * | 2018-10-26 | 2022-02-22 | Circadence Corporation | Method and system for evaluating individual and group cyber threat awareness |
US10469521B1 (en) | 2018-11-04 | 2019-11-05 | Xm Cyber Ltd. | Using information about exportable data in penetration testing |
US11277430B2 (en) * | 2018-11-23 | 2022-03-15 | Booz Allen Hamilton Inc. | System and method for securing a network |
WO2020121078A1 (en) | 2018-12-13 | 2020-06-18 | Xm Cyber Ltd. | Systems and methods for dynamic removal of agents from nodes of penetration testing systems |
CN109726011A (zh) * | 2018-12-26 | 2019-05-07 | 广州云趣信息科技有限公司 | 一种基于嵌入式人工智能的网络安全测试系统及实现方法 |
US10462177B1 (en) | 2019-02-06 | 2019-10-29 | Xm Cyber Ltd. | Taking privilege escalation into account in penetration testing campaigns |
US11831669B2 (en) * | 2019-02-14 | 2023-11-28 | Raytheon Bbn Technologies Corp. | Systems and methods for evaluating cyber assets |
US11283827B2 (en) | 2019-02-28 | 2022-03-22 | Xm Cyber Ltd. | Lateral movement strategy during penetration testing of a networked system |
US11038920B1 (en) | 2019-03-28 | 2021-06-15 | Rapid7, Inc. | Behavior management of deception system fleets |
US11206281B2 (en) | 2019-05-08 | 2021-12-21 | Xm Cyber Ltd. | Validating the use of user credentials in a penetration testing campaign |
US10637883B1 (en) | 2019-07-04 | 2020-04-28 | Xm Cyber Ltd. | Systems and methods for determining optimal remediation recommendations in penetration testing |
US10880326B1 (en) | 2019-08-01 | 2020-12-29 | Xm Cyber Ltd. | Systems and methods for determining an opportunity for node poisoning in a penetration testing campaign, based on actual network traffic |
US11488493B2 (en) | 2019-09-12 | 2022-11-01 | EC-Council International Limited | Multi-dimensional cybersecurity skills assessment method and system |
US11533329B2 (en) | 2019-09-27 | 2022-12-20 | Keysight Technologies, Inc. | Methods, systems and computer readable media for threat simulation and threat mitigation recommendations |
US11005878B1 (en) | 2019-11-07 | 2021-05-11 | Xm Cyber Ltd. | Cooperation between reconnaissance agents in penetration testing campaigns |
RU2747099C1 (ru) * | 2019-12-19 | 2021-04-26 | Публичное акционерное общество "Сбербанк России" (ПАО Сбербанк") | Автоматизированная система тестирования событий кибербезопасности |
US11575700B2 (en) | 2020-01-27 | 2023-02-07 | Xm Cyber Ltd. | Systems and methods for displaying an attack vector available to an attacker of a networked system |
CN111314131A (zh) * | 2020-02-13 | 2020-06-19 | 北京奇艺世纪科技有限公司 | 任务下发方法和装置、存储介质和电子装置 |
US11582256B2 (en) | 2020-04-06 | 2023-02-14 | Xm Cyber Ltd. | Determining multiple ways for compromising a network node in a penetration testing campaign |
US11934532B2 (en) * | 2021-06-09 | 2024-03-19 | Bank Of America Corporation | System for quantification of cybersecurity module efficacy using Q-matrix based correlation analysis |
CN114301640B (zh) * | 2021-12-15 | 2023-09-01 | 中电信数智科技有限公司 | 一种基于SRv6网络协议进行的攻防演练的方法及系统 |
CN114301716B (zh) * | 2022-02-22 | 2023-05-26 | 绿盟科技集团股份有限公司 | 一种网络安全评估方法、装置、网络安全设备及存储介质 |
US11954209B2 (en) | 2022-03-18 | 2024-04-09 | International Business Machines Corporation | Cognitive malware awareness improvement with cyclamates |
CN114679327B (zh) * | 2022-04-06 | 2024-06-21 | 网络通信与安全紫金山实验室 | 网络攻击等级确定方法、装置、计算机设备和存储介质 |
CN115296909B (zh) * | 2022-08-04 | 2023-11-10 | 北京天融信网络安全技术有限公司 | 获得目标蜜罐系统的方法、装置、介质和攻击响应方法 |
CN116055089A (zh) * | 2022-11-08 | 2023-05-02 | 北京永信至诚科技股份有限公司 | 一种网络靶场的训练评估方法及装置 |
CN116318945B (zh) * | 2023-03-09 | 2023-10-20 | 南京航空航天大学 | 一种基于内生动态防御架构的多目标服务功能链部署方法 |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6535227B1 (en) | 2000-02-08 | 2003-03-18 | Harris Corporation | System and method for assessing the security posture of a network and having a graphical user interface |
US9525696B2 (en) * | 2000-09-25 | 2016-12-20 | Blue Coat Systems, Inc. | Systems and methods for processing data flows |
US7657938B2 (en) * | 2003-10-28 | 2010-02-02 | International Business Machines Corporation | Method and system for protecting computer networks by altering unwanted network data traffic |
US20050131828A1 (en) | 2003-12-16 | 2005-06-16 | Glenn Gearhart | Method and system for cyber-security damage assessment and evaluation measurement (CDAEM) |
US8494955B2 (en) | 2004-03-23 | 2013-07-23 | John S. Quarterman | Method, system, and service for quantifying network risk to price insurance premiums and bonds |
US20070180522A1 (en) * | 2006-01-30 | 2007-08-02 | Bagnall Robert J | Security system and method including individual applications |
US8494832B2 (en) * | 2007-06-20 | 2013-07-23 | Sanjeev Krishnan | Method and apparatus for software simulation |
KR100901696B1 (ko) * | 2007-07-04 | 2009-06-08 | 한국전자통신연구원 | 보안 이벤트의 컨텐츠에 기반한 보안 이벤트 샘플링 장치및 방법 |
WO2009152282A1 (en) * | 2008-06-10 | 2009-12-17 | Object Security Llc | Model driven compliance, evaluation, accreditation and monitoring |
GB2474545B (en) * | 2009-09-24 | 2015-06-24 | Fisher Rosemount Systems Inc | Integrated unified threat management for a process control system |
US8407789B1 (en) * | 2009-11-16 | 2013-03-26 | Symantec Corporation | Method and system for dynamically optimizing multiple filter/stage security systems |
US8516596B2 (en) | 2010-01-26 | 2013-08-20 | Raytheon Company | Cyber attack analysis |
US8918785B1 (en) * | 2010-12-29 | 2014-12-23 | Amazon Technologies, Inc. | Managing virtual machine network through security assessment |
US9426169B2 (en) | 2012-02-29 | 2016-08-23 | Cytegic Ltd. | System and method for cyber attacks analysis and decision support |
WO2014066500A1 (en) * | 2012-10-23 | 2014-05-01 | Hassell Suzanne P | Cyber analysis modeling evaluation for operations (cameo) simulation system |
RU2514142C1 (ru) * | 2012-12-25 | 2014-04-27 | Закрытое акционерное общество "Лаборатория Касперского" | Способ повышения эффективности работы аппаратного ускорения эмуляции приложений |
US9680855B2 (en) * | 2014-06-30 | 2017-06-13 | Neo Prime, LLC | Probabilistic model for cyber risk forecasting |
US9690933B1 (en) * | 2014-12-22 | 2017-06-27 | Fireeye, Inc. | Framework for classifying an object as malicious with machine learning for deploying updated predictive models |
EP3360043A4 (en) * | 2015-10-08 | 2019-04-24 | Siege Technologies LLC | ASSESSING THE EFFECTIVENESS OF CYBER SECURITY TECHNOLOGIES |
US10021126B2 (en) * | 2016-02-26 | 2018-07-10 | KnowBe4, Inc. | Systems and methods for creating and running heterogeneous phishing attack campaigns |
-
2016
- 2016-10-06 EP EP16882228.6A patent/EP3360043A4/en not_active Withdrawn
- 2016-10-06 WO PCT/US2016/055670 patent/WO2017116525A2/en active Application Filing
- 2016-10-06 CA CA3001463A patent/CA3001463A1/en not_active Abandoned
- 2016-10-06 US US15/286,990 patent/US10270798B2/en not_active Expired - Fee Related
-
2018
- 2018-12-19 HK HK18116287.8A patent/HK1257497A1/zh unknown
-
2019
- 2019-04-22 US US16/390,352 patent/US10581894B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
WO2017116525A3 (en) | 2017-08-31 |
EP3360043A2 (en) | 2018-08-15 |
WO2017116525A9 (en) | 2019-10-31 |
US20170104780A1 (en) | 2017-04-13 |
US20190253448A1 (en) | 2019-08-15 |
CA3001463A1 (en) | 2017-07-06 |
WO2017116525A2 (en) | 2017-07-06 |
EP3360043A4 (en) | 2019-04-24 |
US10581894B2 (en) | 2020-03-03 |
US10270798B2 (en) | 2019-04-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HK1257497A1 (zh) | 評估網絡安全技術的有效性 | |
IL287113A (en) | smyd inhibitors | |
IL259560A (en) | Inhibitors of the menin-mll interaction | |
IL251584B (en) | Dihydropyrrolopyridines ror–gamma inhibitors | |
IL250642A0 (en) | glycosidase inhibitors | |
IL246902A0 (en) | Dihydropyrrolopyridine ror–gamma inhibitors | |
ZA201604272B (en) | Inhibitors of glutaminase | |
SG11201609265RA (en) | Characterizing states of subject | |
IL248895A0 (en) | Phosphatidylinositol 3-kinase inhibitors | |
GB201521059D0 (en) | Inhibitors of metallo-beta-lactamases | |
IL265139B (en) | Dopamine-b-hydroxylase inhibitors | |
ZA201706282B (en) | Solid forms of menaquinols | |
GB201501004D0 (en) | Inhibitors | |
GB201612860D0 (en) | Inhibitors | |
IL247366A0 (en) | Inhibitors of wnt signaling pathways | |
GB201400299D0 (en) | Corrosion inhibitors | |
GB201401005D0 (en) | Inhibitor | |
GB201520949D0 (en) | Inhibitors | |
GB201511584D0 (en) | Viprodi - Goblet of Fire | |
GB201413138D0 (en) | Assessment of structures | |
GB201413139D0 (en) | Assessment of structures | |
GB201400388D0 (en) | Assessment of assemblies | |
GB201418154D0 (en) | Inhibitors | |
GB201400300D0 (en) | Corrosion inhibitors |