首页> 外国专利> Graph-based approach to deterring persistent security threats

Graph-based approach to deterring persistent security threats

机译:基于图的方法来阻止持续的安全威胁

摘要

A processing device comprises a processor coupled to a memory and implements a graph-based approach to protection of a system comprising information technology infrastructure from a persistent security threat. Attack-escalation states of the persistent security threat are assigned to respective nodes in a graph, and defensive costs for preventing transitions between pairs of the nodes are assigned to respective edges in the graph. A minimum cut of the graph is computed, and a defensive strategy is determined based on the minimum cut. The system comprising information technology infrastructure subject to the persistent security threat is configured in accordance with the defensive strategy in order to deter the persistent security threat.
机译:处理设备包括耦合到存储器的处理器,并实现基于图的方法来保护包括信息技术基础设施的系统免受持续的安全威胁。将持久性安全威胁的攻击升级状态分配给图中的各个节点,并将用于防止节点对之间的过渡的防御成本分配给图中的各个边缘。计算该图的最小割,并基于该最小割确定防御策略。根据防御策略配置包括经受持久安全威胁的信息技术基础设施的系统,以便阻止持久安全威胁。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号