International Business Machines Corporation
Cyber-attack vulnerability and propagation model

Last updated:

Abstract:

A method, computer program product and computer system to analyze network vulnerability expansion is provided. A processor receives network infrastructure data regarding a network. A processor identifies a plurality of vulnerabilities associated with one or more components of the network. A processor generates a architecture model based, at least in part, on the network infrastructure data and the plurality of vulnerabilities. A processor generates a vulnerability expansion model based, at least in part, on the architecture model. A processor determines a vulnerability expansion based, at least in part, on the vulnerability expansion model and at least one vulnerability of plurality of vulnerabilities being compromised.

Status:
Grant
Type:

Utility

Filling date:

17 Jan 2020

Issue date:

22 Mar 2022