International Business Machines Corporation
PREVENTING VULNERABLE CONFIGURATIONS IN SENSOR-BASED DEVICES

Last updated:

Abstract:

Aspects of the invention include a computer-implemented method, including performing simulations of a form of cyber-attack based on different input parameters to determine a respective time to perform each cyber-attack on a plurality of features of a sensor-based device. Additionally, performing simulations of a plurality of mitigating processes for each cyber-attack based on different input parameters to determine a respective time to perform each mitigating process. An associated risk level of each cyber-attack is determined based at least in part on the simulations. A mitigation process is selected based at least in part on the associated risk levels.

Status:
Application
Type:

Utility

Filling date:

31 Jan 2020

Issue date:

5 Aug 2021