Keysight Technologies, Inc.
METHODS, SYSTEMS AND COMPUTER READABLE MEDIA FOR THREAT SIMULATION AND THREAT MITIGATION RECOMMENDATIONS

Last updated:

Abstract:

The subject matter described herein includes methods, systems, and computer readable media for threat simulation and threat mitigation recommendations. A method for threat simulation and threat mitigation recommendations includes performing a first threat simulation using at least one attack vector, wherein performing the first threat simulation includes generating simulated network traffic associated with the at least one attack vector and sending, via at least one intermediate node, the simulated network traffic to a test agent in a target network, wherein the test agent is configured to simulate at least one protected asset in the target network; determining, using simulated network traffic arrival metrics, at least one threat mitigation recommendation; and providing, via a user interface, the at least one threat mitigation recommendation to a user.

Status:
Application
Type:

Utility

Filling date:

27 Sep 2019

Issue date:

1 Apr 2021