The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jan. 26, 2016

Filed:

Jun. 18, 2009
Applicants:

Christopher Dyson White, O'Fallon, IL (US);

Chester Randolph Ratcliffe, Iii, Belleville, IL (US);

John Christian Espinosa, Fairview Heights, IL (US);

Joel Alan Vickery, Collinsville, IL (US);

Aaron Randal Moate, St. Louis, MO (US);

Ronald David Parker, Jr., St. Louis, MO (US);

Marc Anthony Crawford, Collinsville, IL (US);

Inventors:

Christopher Dyson White, O'Fallon, IL (US);

Chester Randolph Ratcliffe, III, Belleville, IL (US);

John Christian Espinosa, Fairview Heights, IL (US);

Joel Alan Vickery, Collinsville, IL (US);

Aaron Randal Moate, St. Louis, MO (US);

Ronald David Parker, Jr., St. Louis, MO (US);

Marc Anthony Crawford, Collinsville, IL (US);

Assignee:

Camber Corporation, Huntsville, AL (US);

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 12/24 (2006.01); H04L 12/26 (2006.01); H04L 29/06 (2006.01); G06F 21/57 (2013.01); G09B 19/00 (2006.01); G06F 17/50 (2006.01); G06F 9/455 (2006.01); H04L 29/08 (2006.01);
U.S. Cl.
CPC ...
H04L 41/145 (2013.01); G06F 17/509 (2013.01); G06F 17/5009 (2013.01); G06F 21/577 (2013.01); G09B 19/0053 (2013.01); H04L 63/1433 (2013.01); G06F 9/455 (2013.01); H04L 43/50 (2013.01); H04L 67/36 (2013.01);
Abstract

A system is disclosed that generates a network attack within a simulated network environment. The system includes a module that creates one or more attack events against network devices within the simulated network environment wherein the attack events include exploitations of published and unpublished vulnerabilities and failures of hardware and software network systems, devices, or applications within the simulated network environment. Additionally, the module executes the created attack event on the simulated network environment. In addition, the system has an interface configured for receiving metadata regarding each attack event and adding the received attack event metadata to each associated attack event.


Find Patent Forward Citations

Loading…