HK1257497A1 - 評估網絡安全技術的有效性 - Google Patents

評估網絡安全技術的有效性

Info

Publication number
HK1257497A1
HK1257497A1 HK18116287.8A HK18116287A HK1257497A1 HK 1257497 A1 HK1257497 A1 HK 1257497A1 HK 18116287 A HK18116287 A HK 18116287A HK 1257497 A1 HK1257497 A1 HK 1257497A1
Authority
HK
Hong Kong
Prior art keywords
assessing effectiveness
cybersecurity technologies
cybersecurity
technologies
assessing
Prior art date
Application number
HK18116287.8A
Other languages
English (en)
Inventor
Kara Zaffarano
Joshua Taylor
Samuel Hamilton
Original Assignee
Siege Tech Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siege Tech Llc filed Critical Siege Tech Llc
Publication of HK1257497A1 publication Critical patent/HK1257497A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
HK18116287.8A 2015-10-08 2018-12-19 評估網絡安全技術的有效性 HK1257497A1 (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201562238974P 2015-10-08 2015-10-08
US201662374953P 2016-08-15 2016-08-15
PCT/US2016/055670 WO2017116525A2 (en) 2015-10-08 2016-10-06 Assessing effectiveness of cybersecurity technologies

Publications (1)

Publication Number Publication Date
HK1257497A1 true HK1257497A1 (zh) 2019-10-25

Family

ID=58499149

Family Applications (1)

Application Number Title Priority Date Filing Date
HK18116287.8A HK1257497A1 (zh) 2015-10-08 2018-12-19 評估網絡安全技術的有效性

Country Status (5)

Country Link
US (2) US10270798B2 (zh)
EP (1) EP3360043A4 (zh)
CA (1) CA3001463A1 (zh)
HK (1) HK1257497A1 (zh)
WO (1) WO2017116525A2 (zh)

Families Citing this family (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3360043A4 (en) * 2015-10-08 2019-04-24 Siege Technologies LLC ASSESSING THE EFFECTIVENESS OF CYBER SECURITY TECHNOLOGIES
US20180004958A1 (en) * 2016-07-01 2018-01-04 Hewlett Packard Enterprise Development Lp Computer attack model management
GB2554981A (en) 2016-08-16 2018-04-18 British Telecomm Configuration parameters for virtual machines
WO2018033350A1 (en) 2016-08-16 2018-02-22 British Telecommunications Public Limited Company Reconfigured virtual machine to mitigate attack
GB2554982B (en) * 2016-08-16 2019-02-13 British Telecomm Security in virtualised computing environments
GB2555176B (en) * 2016-08-16 2019-02-13 British Telecomm Machine learning for attack mitigation in virtual machines
GB2554984B (en) * 2016-08-16 2019-02-13 British Telecomm Secure configuration in a virtualised computing environment
GB2554983B (en) 2016-08-16 2019-02-13 British Telecomm Attack assessment in a virtualised computing environment
US11423144B2 (en) 2016-08-16 2022-08-23 British Telecommunications Public Limited Company Mitigating security attacks in virtualized computing environments
US10999308B2 (en) 2017-01-30 2021-05-04 Xm Cyber Ltd. Setting-up penetration testing campaigns
US10581802B2 (en) 2017-03-16 2020-03-03 Keysight Technologies Singapore (Sales) Pte. Ltd. Methods, systems, and computer readable media for advertising network security capabilities
US10862918B2 (en) * 2017-04-21 2020-12-08 Raytheon Bbn Technologies Corp. Multi-dimensional heuristic search as part of an integrated decision engine for evolving defenses
US11082450B2 (en) * 2017-04-21 2021-08-03 Raytheon Bbn Technologies Corp. User interface supporting an integrated decision engine for evolving defenses
US11620386B2 (en) * 2017-05-17 2023-04-04 Threatmodeler Software Inc. Threat modeling systems and related methods including mitigating components
US11568059B2 (en) 2017-05-17 2023-01-31 Threatmodeler Software Inc. Systems and methods for automated threat model generation from diagram files
US11314872B2 (en) * 2017-05-17 2022-04-26 Threatmodeler Software Inc. Systems and methods for automated threat modeling when deploying infrastructure as a code
US10705868B2 (en) 2017-08-07 2020-07-07 Modelop, Inc. Dynamically configurable microservice model for data analysis using sensors
CN107343011A (zh) * 2017-09-04 2017-11-10 北京经纬信安科技有限公司 一种基于动态目标防御的内源威胁防御设备
US10447721B2 (en) 2017-09-13 2019-10-15 Xm Cyber Ltd. Systems and methods for using multiple lateral movement strategies in penetration testing
US20200106792A1 (en) * 2017-10-19 2020-04-02 Circadence Corporation Method and system for penetration testing classification based on captured log data
EP3711279A1 (en) 2017-11-15 2020-09-23 XM Cyber Ltd. Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
US10440044B1 (en) 2018-04-08 2019-10-08 Xm Cyber Ltd. Identifying communicating network nodes in the same local network
US11252172B1 (en) * 2018-05-10 2022-02-15 State Farm Mutual Automobile Insurance Company Systems and methods for automated penetration testing
WO2019222662A1 (en) 2018-05-18 2019-11-21 Nehemiah Security, Llc Methods and apparatuses to evaluate cyber security risk by establishing a probability of a cyber-attack being successful
US10382473B1 (en) 2018-09-12 2019-08-13 Xm Cyber Ltd. Systems and methods for determining optimal remediation recommendations in penetration testing
CN109347830B (zh) * 2018-10-23 2021-04-20 中国人民解放军战略支援部队信息工程大学 一种网络动态防御系统及方法
US11257393B2 (en) * 2018-10-26 2022-02-22 Circadence Corporation Method and system for evaluating individual and group cyber threat awareness
US10469521B1 (en) 2018-11-04 2019-11-05 Xm Cyber Ltd. Using information about exportable data in penetration testing
US11277430B2 (en) * 2018-11-23 2022-03-15 Booz Allen Hamilton Inc. System and method for securing a network
WO2020121078A1 (en) 2018-12-13 2020-06-18 Xm Cyber Ltd. Systems and methods for dynamic removal of agents from nodes of penetration testing systems
CN109726011A (zh) * 2018-12-26 2019-05-07 广州云趣信息科技有限公司 一种基于嵌入式人工智能的网络安全测试系统及实现方法
US10462177B1 (en) 2019-02-06 2019-10-29 Xm Cyber Ltd. Taking privilege escalation into account in penetration testing campaigns
US11831669B2 (en) * 2019-02-14 2023-11-28 Raytheon Bbn Technologies Corp. Systems and methods for evaluating cyber assets
US11283827B2 (en) 2019-02-28 2022-03-22 Xm Cyber Ltd. Lateral movement strategy during penetration testing of a networked system
US11038920B1 (en) 2019-03-28 2021-06-15 Rapid7, Inc. Behavior management of deception system fleets
US11206281B2 (en) 2019-05-08 2021-12-21 Xm Cyber Ltd. Validating the use of user credentials in a penetration testing campaign
US10637883B1 (en) 2019-07-04 2020-04-28 Xm Cyber Ltd. Systems and methods for determining optimal remediation recommendations in penetration testing
US10880326B1 (en) 2019-08-01 2020-12-29 Xm Cyber Ltd. Systems and methods for determining an opportunity for node poisoning in a penetration testing campaign, based on actual network traffic
US11488493B2 (en) 2019-09-12 2022-11-01 EC-Council International Limited Multi-dimensional cybersecurity skills assessment method and system
US11533329B2 (en) 2019-09-27 2022-12-20 Keysight Technologies, Inc. Methods, systems and computer readable media for threat simulation and threat mitigation recommendations
US11005878B1 (en) 2019-11-07 2021-05-11 Xm Cyber Ltd. Cooperation between reconnaissance agents in penetration testing campaigns
RU2747099C1 (ru) * 2019-12-19 2021-04-26 Публичное акционерное общество "Сбербанк России" (ПАО Сбербанк") Автоматизированная система тестирования событий кибербезопасности
US11575700B2 (en) 2020-01-27 2023-02-07 Xm Cyber Ltd. Systems and methods for displaying an attack vector available to an attacker of a networked system
CN111314131A (zh) * 2020-02-13 2020-06-19 北京奇艺世纪科技有限公司 任务下发方法和装置、存储介质和电子装置
US11582256B2 (en) 2020-04-06 2023-02-14 Xm Cyber Ltd. Determining multiple ways for compromising a network node in a penetration testing campaign
US11934532B2 (en) * 2021-06-09 2024-03-19 Bank Of America Corporation System for quantification of cybersecurity module efficacy using Q-matrix based correlation analysis
CN114301640B (zh) * 2021-12-15 2023-09-01 中电信数智科技有限公司 一种基于SRv6网络协议进行的攻防演练的方法及系统
CN114301716B (zh) * 2022-02-22 2023-05-26 绿盟科技集团股份有限公司 一种网络安全评估方法、装置、网络安全设备及存储介质
US11954209B2 (en) 2022-03-18 2024-04-09 International Business Machines Corporation Cognitive malware awareness improvement with cyclamates
CN114679327B (zh) * 2022-04-06 2024-06-21 网络通信与安全紫金山实验室 网络攻击等级确定方法、装置、计算机设备和存储介质
CN115296909B (zh) * 2022-08-04 2023-11-10 北京天融信网络安全技术有限公司 获得目标蜜罐系统的方法、装置、介质和攻击响应方法
CN116055089A (zh) * 2022-11-08 2023-05-02 北京永信至诚科技股份有限公司 一种网络靶场的训练评估方法及装置
CN116318945B (zh) * 2023-03-09 2023-10-20 南京航空航天大学 一种基于内生动态防御架构的多目标服务功能链部署方法

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6535227B1 (en) 2000-02-08 2003-03-18 Harris Corporation System and method for assessing the security posture of a network and having a graphical user interface
US9525696B2 (en) * 2000-09-25 2016-12-20 Blue Coat Systems, Inc. Systems and methods for processing data flows
US7657938B2 (en) * 2003-10-28 2010-02-02 International Business Machines Corporation Method and system for protecting computer networks by altering unwanted network data traffic
US20050131828A1 (en) 2003-12-16 2005-06-16 Glenn Gearhart Method and system for cyber-security damage assessment and evaluation measurement (CDAEM)
US8494955B2 (en) 2004-03-23 2013-07-23 John S. Quarterman Method, system, and service for quantifying network risk to price insurance premiums and bonds
US20070180522A1 (en) * 2006-01-30 2007-08-02 Bagnall Robert J Security system and method including individual applications
US8494832B2 (en) * 2007-06-20 2013-07-23 Sanjeev Krishnan Method and apparatus for software simulation
KR100901696B1 (ko) * 2007-07-04 2009-06-08 한국전자통신연구원 보안 이벤트의 컨텐츠에 기반한 보안 이벤트 샘플링 장치및 방법
WO2009152282A1 (en) * 2008-06-10 2009-12-17 Object Security Llc Model driven compliance, evaluation, accreditation and monitoring
GB2474545B (en) * 2009-09-24 2015-06-24 Fisher Rosemount Systems Inc Integrated unified threat management for a process control system
US8407789B1 (en) * 2009-11-16 2013-03-26 Symantec Corporation Method and system for dynamically optimizing multiple filter/stage security systems
US8516596B2 (en) 2010-01-26 2013-08-20 Raytheon Company Cyber attack analysis
US8918785B1 (en) * 2010-12-29 2014-12-23 Amazon Technologies, Inc. Managing virtual machine network through security assessment
US9426169B2 (en) 2012-02-29 2016-08-23 Cytegic Ltd. System and method for cyber attacks analysis and decision support
WO2014066500A1 (en) * 2012-10-23 2014-05-01 Hassell Suzanne P Cyber analysis modeling evaluation for operations (cameo) simulation system
RU2514142C1 (ru) * 2012-12-25 2014-04-27 Закрытое акционерное общество "Лаборатория Касперского" Способ повышения эффективности работы аппаратного ускорения эмуляции приложений
US9680855B2 (en) * 2014-06-30 2017-06-13 Neo Prime, LLC Probabilistic model for cyber risk forecasting
US9690933B1 (en) * 2014-12-22 2017-06-27 Fireeye, Inc. Framework for classifying an object as malicious with machine learning for deploying updated predictive models
EP3360043A4 (en) * 2015-10-08 2019-04-24 Siege Technologies LLC ASSESSING THE EFFECTIVENESS OF CYBER SECURITY TECHNOLOGIES
US10021126B2 (en) * 2016-02-26 2018-07-10 KnowBe4, Inc. Systems and methods for creating and running heterogeneous phishing attack campaigns

Also Published As

Publication number Publication date
WO2017116525A3 (en) 2017-08-31
EP3360043A2 (en) 2018-08-15
WO2017116525A9 (en) 2019-10-31
US20170104780A1 (en) 2017-04-13
US20190253448A1 (en) 2019-08-15
CA3001463A1 (en) 2017-07-06
WO2017116525A2 (en) 2017-07-06
EP3360043A4 (en) 2019-04-24
US10581894B2 (en) 2020-03-03
US10270798B2 (en) 2019-04-23

Similar Documents

Publication Publication Date Title
HK1257497A1 (zh) 評估網絡安全技術的有效性
IL287113A (en) smyd inhibitors
IL259560A (en) Inhibitors of the menin-mll interaction
IL251584B (en) Dihydropyrrolopyridines ror–gamma inhibitors
IL250642A0 (en) glycosidase inhibitors
IL246902A0 (en) Dihydropyrrolopyridine ror–gamma inhibitors
ZA201604272B (en) Inhibitors of glutaminase
SG11201609265RA (en) Characterizing states of subject
IL248895A0 (en) Phosphatidylinositol 3-kinase inhibitors
GB201521059D0 (en) Inhibitors of metallo-beta-lactamases
IL265139B (en) Dopamine-b-hydroxylase inhibitors
ZA201706282B (en) Solid forms of menaquinols
GB201501004D0 (en) Inhibitors
GB201612860D0 (en) Inhibitors
IL247366A0 (en) Inhibitors of wnt signaling pathways
GB201400299D0 (en) Corrosion inhibitors
GB201401005D0 (en) Inhibitor
GB201520949D0 (en) Inhibitors
GB201511584D0 (en) Viprodi - Goblet of Fire
GB201413138D0 (en) Assessment of structures
GB201413139D0 (en) Assessment of structures
GB201400388D0 (en) Assessment of assemblies
GB201418154D0 (en) Inhibitors
GB201400300D0 (en) Corrosion inhibitors