The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Oct. 20, 2020

Filed:

Jan. 12, 2018
Applicant:

The Boeing Company, Chicago, IL (US);

Inventors:

John A Craig, Snohomish, WA (US);

Jadranka Mead, Renton, WA (US);

James E. Vasatka, Monroe, WA (US);

Assignee:

THE BOEING COMPANY, Chicago, IL (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06N 20/20 (2019.01); G06F 21/55 (2013.01); G06F 21/57 (2013.01); G06N 20/00 (2019.01);
U.S. Cl.
CPC ...
H04L 63/1425 (2013.01); G06F 21/55 (2013.01); G06F 21/577 (2013.01); G06N 20/00 (2019.01); G06N 20/20 (2019.01); H04L 63/14 (2013.01); H04L 63/1433 (2013.01); H04L 63/20 (2013.01); G06F 2221/034 (2013.01);
Abstract

According to various embodiments, techniques for anticipatory cyber defense are disclosed. The techniques includes receiving cyber incident reports, extracting keywords from the reports, applying a shallow machine learning technique to obtain an identification of a first subset of the networked assets vulnerable to at least a first threat scenario and an identification of the first threat scenario, applying a deep machine learning technique to at least the first subset, the first threat scenario, the keywords, and the plurality of networked assets, to obtain a second subset of the networked assets vulnerable to at least a second threat scenario and the second threat scenario, simulating the networked assets and the second threat scenario to identify at least one path through the networked assets vulnerable to at least a third threat scenario, and outputting an identification of the at least one path and an identification of the third threat scenario.


Find Patent Forward Citations

Loading…