NDSU Research Foundation (20240291848). AUTONOMOUS DISTRIBUTED CYBERSECURITY TESTING simplified abstract
Contents
AUTONOMOUS DISTRIBUTED CYBERSECURITY TESTING
Organization Name
Inventor(s)
Jeremy Straub of Fargo ND (US)
Jordan Milbrath of Fargo ND (US)
AUTONOMOUS DISTRIBUTED CYBERSECURITY TESTING - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240291848 titled 'AUTONOMOUS DISTRIBUTED CYBERSECURITY TESTING
The patent application describes a system for autonomous cybersecurity probing, which includes modules for scanning, command, attack, and verification.
- The scanning module converts target computing device or network scans into machine-readable form.
- The command module contains nodes representing facts, rules, actions, and verifiers associated with vulnerabilities identified by the scanning module.
- The attack module assigns attacks based on vulnerabilities identified by the command module.
- The verifier module determines the success or failure of the assigned attack and reports back to the command module.
Potential Applications: - Automated cybersecurity testing and probing - Network security monitoring and threat detection
Problems Solved: - Streamlining cybersecurity probing processes - Enhancing the efficiency of vulnerability detection and response
Benefits: - Improved cybersecurity posture - Faster identification and mitigation of vulnerabilities - Reduction in manual effort for cybersecurity testing
Commercial Applications: Cybersecurity companies can utilize this technology to offer automated cybersecurity probing services to clients, enhancing their security posture and reducing the risk of cyber attacks.
Questions about Autonomous Cybersecurity Probing: 1. How does the system determine whether to launch an attack? The system determines whether to launch an attack based on the vulnerabilities identified during the scanning process and the rules and actions associated with those vulnerabilities in the command module.
2. What role does the verifier module play in the system? The verifier module assesses the success or failure of the assigned attack and provides feedback to the command module for further action.
Original Abstract Submitted
a system for autonomous cybersecurity probing includes a scanning module adapted to convert a target computing device or network scan to machine readable form. the scanning module includes an ingest module which processes the scan to create nodes representing the target ports, port status, and vulnerabilities. a command module includes a plurality of nodes representing facts, rules, actions, and verifiers associated with one or more vulnerabilities identified by the scanning module. the command module is configured to determine whether to launch an attack. an attack module is configured to, on receipt of instructions from the command module, assign an attack based on a one of the one or more vulnerabilities. a verifier module is configured to determine success or failure of the assigned attack and to return an indicator of the determined success or failure to the command module. methods for cybersecurity probing using the described system are provided.