Movatterモバイル変換


[0]ホーム

URL:


US20090319247A1 - Systems and Methods for A Simulated Network Environment and Operation Thereof - Google Patents

Systems and Methods for A Simulated Network Environment and Operation Thereof
Download PDF

Info

Publication number
US20090319247A1
US20090319247A1US12/487,614US48761409AUS2009319247A1US 20090319247 A1US20090319247 A1US 20090319247A1US 48761409 AUS48761409 AUS 48761409AUS 2009319247 A1US2009319247 A1US 2009319247A1
Authority
US
United States
Prior art keywords
network
user
simulated
traffic
attack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/487,614
Inventor
Chester Randolph Ratcliffe, III
Christopher Dyson White
Stephanie Dianne Harwell
John Christian Espinosa
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Camber Unmanned Systems Innovation Inc
Original Assignee
Camber Defense Security and Systems Solutions Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Camber Defense Security and Systems Solutions IncfiledCriticalCamber Defense Security and Systems Solutions Inc
Priority to US12/487,614priorityCriticalpatent/US20090319247A1/en
Priority to CA2728303Aprioritypatent/CA2728303A1/en
Priority to EP09767778Aprioritypatent/EP2307956A4/en
Priority to PCT/US2009/047868prioritypatent/WO2009155469A2/en
Assigned to EADS NA DEFENSE SECURITY AND SYSTEMS SOLUTIONS, INC.reassignmentEADS NA DEFENSE SECURITY AND SYSTEMS SOLUTIONS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: ESPINOSA, JOHN CHRISTIAN, HARWELL, STEPHANIE DIANNE, RATCLIFFE, CHESTER RANDOLPH, III, WHITE, CHRISTOPHER DYSON
Publication of US20090319247A1publicationCriticalpatent/US20090319247A1/en
Assigned to CAMBER DEFENSE SECURITY AND SYSTEMS SOLUTIONS, INC.reassignmentCAMBER DEFENSE SECURITY AND SYSTEMS SOLUTIONS, INC.CHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: EADS NA DEFENSE SECURITY AND SYSTEMS SOLUTIONS, INC.
Assigned to CREDIT SUISSE AG, CAYMAN ISLANDS BRANCHreassignmentCREDIT SUISSE AG, CAYMAN ISLANDS BRANCHPATENT SECURITY AGREEMENTAssignors: CAMBER DEFENSE SECURITY AND SYSTEMS SOLUTIONS, INC.
Assigned to CAMBER DEFENSE SECURITY AND SYSTEMS SOLUTIONS, INC.reassignmentCAMBER DEFENSE SECURITY AND SYSTEMS SOLUTIONS, INC.RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Methods and Systems for simulating a network environment includes simulating network components and network architecture of a user network, simulating real-world network traffic on the simulated user network, simulating network events within the simulated real-world traffic on the simulated user network, monitoring the simulated network, the simulated traffic including the simulated network events, and receiving input from a user, such inputs manually controlling/managing the simulated network components of the simulated user network responsive to the monitoring.

Description

Claims (26)

1. A system for simulating a network environment comprising:
a computer network platform having hardware and software configured as a standalone configuration and including a combination of actual network components and simulated network components that are configured to simulate an operating network for a defined set of users;
a network traffic module communicatively connected to the computer network platform and configured for generating application traffic within the simulated operating network of the computer network platform, the generated application traffic including network traffic simulating specific network traffic of the defined set of users;
a network event module communicatively connected to the computer network platform and configured for generating network events within the simulated network traffic generated by the network traffic module; and
a user interface communicatively connected to the computer network platform and configured as an operating network administrator for monitoring the simulated operating network and the simulated network traffic including the event and for controlling one or more actual or simulated network components.
US12/487,6142008-06-182009-06-18Systems and Methods for A Simulated Network Environment and Operation ThereofAbandonedUS20090319247A1 (en)

Priority Applications (4)

Application NumberPriority DateFiling DateTitle
US12/487,614US20090319247A1 (en)2008-06-182009-06-18Systems and Methods for A Simulated Network Environment and Operation Thereof
CA2728303ACA2728303A1 (en)2008-06-182009-06-19Systems and methods for a simulated network environment and operation thereof
EP09767778AEP2307956A4 (en)2008-06-182009-06-19Systems and methods for a simulated network environment and operation thereof
PCT/US2009/047868WO2009155469A2 (en)2008-06-182009-06-19Systems and methods for a simulated network environment and operation thereof

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US7372108P2008-06-182008-06-18
US17505409P2009-05-042009-05-04
US12/487,614US20090319247A1 (en)2008-06-182009-06-18Systems and Methods for A Simulated Network Environment and Operation Thereof

Publications (1)

Publication NumberPublication Date
US20090319247A1true US20090319247A1 (en)2009-12-24

Family

ID=41432119

Family Applications (8)

Application NumberTitlePriority DateFiling Date
US12/487,614AbandonedUS20090319247A1 (en)2008-06-182009-06-18Systems and Methods for A Simulated Network Environment and Operation Thereof
US12/487,634AbandonedUS20090319906A1 (en)2008-06-182009-06-18Systems and methods for reconstitution of network elements in a simulated network
US12/487,618AbandonedUS20090319248A1 (en)2008-06-182009-06-18Systems and methods for a simulated network traffic generator
US12/487,633Active2032-07-14US9246768B2 (en)2008-06-182009-06-18Systems and methods for a simulated network attack generator
US12/487,622Active2030-12-30US8751629B2 (en)2008-06-182009-06-18Systems and methods for automated building of a simulated network environment
US12/487,921Active2031-07-03US8532970B2 (en)2008-06-182009-06-19Systems and methods for network monitoring and analysis of a simulated network
US13/966,137AbandonedUS20150051893A1 (en)2008-06-182013-08-13Systems and methods for network monitoring and analysis of a simulated network
US13/966,107Active2033-11-09US10313203B2 (en)2008-06-182013-08-13Systems and methods for network monitoring and analysis of a simulated network

Family Applications After (7)

Application NumberTitlePriority DateFiling Date
US12/487,634AbandonedUS20090319906A1 (en)2008-06-182009-06-18Systems and methods for reconstitution of network elements in a simulated network
US12/487,618AbandonedUS20090319248A1 (en)2008-06-182009-06-18Systems and methods for a simulated network traffic generator
US12/487,633Active2032-07-14US9246768B2 (en)2008-06-182009-06-18Systems and methods for a simulated network attack generator
US12/487,622Active2030-12-30US8751629B2 (en)2008-06-182009-06-18Systems and methods for automated building of a simulated network environment
US12/487,921Active2031-07-03US8532970B2 (en)2008-06-182009-06-19Systems and methods for network monitoring and analysis of a simulated network
US13/966,137AbandonedUS20150051893A1 (en)2008-06-182013-08-13Systems and methods for network monitoring and analysis of a simulated network
US13/966,107Active2033-11-09US10313203B2 (en)2008-06-182013-08-13Systems and methods for network monitoring and analysis of a simulated network

Country Status (4)

CountryLink
US (8)US20090319247A1 (en)
EP (1)EP2307956A4 (en)
CA (1)CA2728303A1 (en)
WO (1)WO2009155469A2 (en)

Cited By (67)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090208910A1 (en)*2008-02-192009-08-20Architecture Technology CorporationAutomated execution and evaluation of network-based training exercises
US20120047200A1 (en)*2010-08-172012-02-23Geza SzaboUser behavior based mobile broadband user plane traffic generation system and method for real-like measurement generation
US20130124797A1 (en)*2011-11-152013-05-16Microsoft CorporationVirtual disks constructed from unused distributed storage
US20140089482A1 (en)*2012-09-272014-03-27International Business Machines CorporationDevice management for determining the affects of management actions
US20140220514A1 (en)*2013-02-042014-08-07Gamxing Inc.Games for learning regulatory best practices
EP2688002A4 (en)*2011-03-152014-10-15Omron Tateisi Electronics Co DEVICE FOR ASSISTING THE DESIGN OF A NETWORK SYSTEM
US20140308646A1 (en)*2013-03-132014-10-16Mindmarker BVMethod and System for Creating Interactive Training and Reinforcement Programs
US20150154855A1 (en)*2013-12-032015-06-04Tyco Fire & Security GmbhUser interface configuration for alarm systems
US20150309850A1 (en)*2014-04-242015-10-29Action Star Enterprise Co., Ltd.Data Transmission Method for Data Transmission System
US20160012739A1 (en)*2014-07-142016-01-14Ali JafariNetworking systems and methods for facilitating communication and collaboration using a social-networking and interactive approach
US20160077944A1 (en)*2014-09-162016-03-17Spirent Communications, Inc.Systems and methods of building sequenceable test methodologies
US20160127180A1 (en)*2014-10-302016-05-05Splunk Inc.Streamlining configuration of protocol-based network data capture by remote capture agents
US20160147427A1 (en)*2013-06-262016-05-26Hewlett-Packard Development Company, L.P.Thin client computing device taskbar and widgets
US9357429B1 (en)*2012-12-282016-05-31Sprint Communications Company L.P.Estimating average user throughput in a wireless network
US20160205145A1 (en)*2011-01-102016-07-14Vtech Telecommunications LimitedPeer-to-peer internet protocol telephone system with system-wide configuration data
US20160232366A1 (en)*2013-09-202016-08-11Schneider Electric USA, Inc.Systems and methods for verification and deployment of applications to programmable devices
US9537884B1 (en)*2016-06-012017-01-03Cyberpoint International LlcAssessment of cyber threats
US9591017B1 (en)*2013-02-082017-03-07PhishMe, Inc.Collaborative phishing attack detection
EP2656252A4 (en)*2010-12-202017-04-05Amazon Technologies, Inc.Techniques for network replication
US9628355B1 (en)*2011-07-202017-04-18Google Inc.System for validating site configuration based on real-time analytics data
US9667645B1 (en)2013-02-082017-05-30PhishMe, Inc.Performance benchmarking for simulated phishing attacks
CN107077563A (en)*2014-11-142017-08-18三菱电机株式会社 Information processing device, information processing method, and program
US9762443B2 (en)2014-04-152017-09-12Splunk Inc.Transformation of network data at remote capture agents
US20170324769A1 (en)*2016-05-042017-11-09Vasona Networks Inc.Simulating unauthorized use of a cellular communication network
US9838512B2 (en)2014-10-302017-12-05Splunk Inc.Protocol-based capture of network data using remote capture agents
US9843598B2 (en)2014-10-302017-12-12Splunk Inc.Capture triggers for capturing network data
US9906539B2 (en)2015-04-102018-02-27PhishMe, Inc.Suspicious message processing and incident response
US9923767B2 (en)2014-04-152018-03-20Splunk Inc.Dynamic configuration of remote capture agents for network data capture
US20180159868A1 (en)*2016-12-052018-06-07Institute For Information IndustryNetwork attack pattern determination apparatus, determination method, and non-transitory computer readable storage medium thereof
US10083624B2 (en)2015-07-282018-09-25Architecture Technology CorporationReal-time monitoring of network-based training exercises
US10127273B2 (en)2014-04-152018-11-13Splunk Inc.Distributed processing of network data using remote capture agents
CN109074293A (en)*2016-04-262018-12-21三菱电机株式会社It watches candidate determining device quietly, watch candidate determining method quietly and watches candidate determining program quietly
US10193857B2 (en)*2015-06-302019-01-29The United States Of America, As Represented By The Secretary Of The NavySecure unrestricted network for innovation
US10225276B2 (en)2017-01-312019-03-05Scythe Inc.Endpoint vulnerability analysis platform
US10320828B1 (en)*2015-09-302019-06-11EMC IP Holding Company LLCEvaluation of security in a cyber simulator
US10334085B2 (en)2015-01-292019-06-25Splunk Inc.Facilitating custom content extraction from network packets
US10341181B2 (en)*2016-03-072019-07-02International Business Machines CorporationMethod and apparatus to allow dynamic changes of a replica network configuration in distributed systems
US10360196B2 (en)2014-04-152019-07-23Splunk Inc.Grouping and managing event streams generated from captured network data
US10366101B2 (en)2014-04-152019-07-30Splunk Inc.Bidirectional linking of ephemeral event streams to creators of the ephemeral event streams
US10374934B2 (en)*2016-12-162019-08-06Seetharaman K GudeteeMethod and program product for a private performance network with geographical load simulation
US10432650B2 (en)2016-03-312019-10-01Stuart StanifordSystem and method to protect a webserver against application exploits and attacks
US10462004B2 (en)2014-04-152019-10-29Splunk Inc.Visualizations of statistics associated with captured network data
US10523521B2 (en)2014-04-152019-12-31Splunk Inc.Managing ephemeral event streams generated from captured network data
US10609079B2 (en)*2015-10-282020-03-31Qomplx, Inc.Application of advanced cybersecurity threat mitigation to rogue devices, privilege escalation, and risk-based vulnerability and patch management
US10693742B2 (en)2014-04-152020-06-23Splunk Inc.Inline visualizations of metrics related to captured network data
US10700950B2 (en)2014-04-152020-06-30Splunk Inc.Adjusting network data storage based on event stream statistics
US10803766B1 (en)2015-07-282020-10-13Architecture Technology CorporationModular training of network-based training exercises
US20210042145A1 (en)*2018-11-292021-02-11Bernardo StarostaMethod and System for Interactive Cyber Simulation Exercises
US10990432B1 (en)*2017-11-302021-04-27Ila CorporationMethod and system for interactive cyber simulation exercises
US11075815B2 (en)*2017-03-312021-07-27Nec CorporationNetwork building apparatus, network building method, non-transitory computer readable medium storing program
US11086897B2 (en)2014-04-152021-08-10Splunk Inc.Linking event streams across applications of a data intake and query system
US11281643B2 (en)2014-04-152022-03-22Splunk Inc.Generating event streams including aggregated values from monitored network data
US11403405B1 (en)2019-06-272022-08-02Architecture Technology CorporationPortable vulnerability identification tool for embedded non-IP devices
US11429713B1 (en)2019-01-242022-08-30Architecture Technology CorporationArtificial intelligence modeling for cyber-attack simulation protocols
US11444974B1 (en)2019-10-232022-09-13Architecture Technology CorporationSystems and methods for cyber-physical threat modeling
US20220337493A1 (en)*2021-04-192022-10-20Rakuten Mobile, IncReport generation from testing a test application in a network-as-a-service
WO2022225565A1 (en)*2021-04-192022-10-27Rakuten Mobile, Inc.Performance testing of a test application in a network-as-a-service environment
US11488493B2 (en)*2019-09-122022-11-01EC-Council International LimitedMulti-dimensional cybersecurity skills assessment method and system
US11503064B1 (en)2018-06-192022-11-15Architecture Technology CorporationAlert systems and methods for attack-related events
US11503075B1 (en)2020-01-142022-11-15Architecture Technology CorporationSystems and methods for continuous compliance of nodes
US11645388B1 (en)2018-06-192023-05-09Architecture Technology CorporationSystems and methods for detecting non-malicious faults when processing source codes
EP4202744A1 (en)*2021-12-242023-06-28Airbus Cybersecurity SasMethod for automatically evaluating training in cybersecurity and system therefor
US11722515B1 (en)2019-02-042023-08-08Architecture Technology CorporationImplementing hierarchical cybersecurity systems and methods
US11887505B1 (en)2019-04-242024-01-30Architecture Technology CorporationSystem for deploying and monitoring network-based training exercises
US12028208B1 (en)2014-05-092024-07-02Splunk Inc.Selective event stream data storage based on network traffic volume
US12137123B1 (en)2015-10-282024-11-05Qomplx LlcRapid predictive analysis of very large data sets using the distributed computational graph
US12155693B1 (en)2015-10-282024-11-26Qomplx LlcRapid predictive analysis of very large data sets using the distributed computational graph

Families Citing this family (221)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8095983B2 (en)2005-03-152012-01-10Mu Dynamics, Inc.Platform for analyzing the security of communication protocols and channels
US7958560B1 (en)2005-03-152011-06-07Mu Dynamics, Inc.Portable program for generating attacks on communication protocols and channels
US9418040B2 (en)*2005-07-072016-08-16Sciencelogic, Inc.Dynamically deployable self configuring distributed network management system
US9172611B2 (en)*2006-09-012015-10-27Spirent Communications, Inc.System and method for discovering assets and functional relationships in a network
US7958230B2 (en)2008-09-192011-06-07Mu Dynamics, Inc.Test driven deployment and monitoring of heterogeneous network systems
US8316447B2 (en)2006-09-012012-11-20Mu Dynamics, Inc.Reconfigurable message-delivery preconditions for delivering attacks to analyze the security of networked systems
US7774637B1 (en)2007-09-052010-08-10Mu Dynamics, Inc.Meta-instrumentation for security analysis
US8560634B2 (en)2007-10-172013-10-15Dispersive Networks, Inc.Apparatus, systems and methods utilizing dispersive networking
US8539098B2 (en)2007-10-172013-09-17Dispersive Networks, Inc.Multiplexed client server (MCS) communications and systems
US8472716B2 (en)*2007-12-052013-06-25Canon Kabushiki KaishaBlock-based noise detection and reduction method with pixel level classification granularity
US8307177B2 (en)2008-09-052012-11-06Commvault Systems, Inc.Systems and methods for management of virtualization data
US8893035B2 (en)*2008-09-172014-11-18Accenture Global Services LimitedMethod, system and graphical user interface for configuring a simulator to simulate a plurality of devices
US8825462B2 (en)*2008-09-172014-09-02Accenture Global Services LimitedMethod and system for simulating a plurality of devices
US9015532B2 (en)*2008-10-312015-04-21Ebay Inc.System and method to test executable instructions
JP5112277B2 (en)*2008-12-182013-01-09株式会社日立製作所 Reproduction processing method, computer system, and program
US10326848B2 (en)*2009-04-172019-06-18Empirix Inc.Method for modeling user behavior in IP networks
US9448964B2 (en)2009-05-042016-09-20Cypress Semiconductor CorporationAutonomous control in a programmable system
US8634437B2 (en)*2009-07-012014-01-21Riverbed Technology, Inc.Extended network protocols for communicating metadata with virtual machines
US9210050B2 (en)*2009-07-092015-12-08Centurylink Intellectual Property LlcSystem and method for a testing vector and associated performance map
US8751633B2 (en)2010-04-012014-06-10Cloudflare, Inc.Recording internet visitor threat information through an internet-based proxy service
US8543861B1 (en)*2010-04-022013-09-24Symantec CorporationSystems and methods for diagnosing a network configuration of a computing device
US9075694B2 (en)*2010-05-012015-07-07Shane Andrew MercerProcess execution components
US8463860B1 (en)2010-05-052013-06-11Spirent Communications, Inc.Scenario based scale testing
US8547974B1 (en)2010-05-052013-10-01Mu DynamicsGenerating communication protocol test cases based on network traffic
US11449394B2 (en)2010-06-042022-09-20Commvault Systems, Inc.Failover systems and methods for performing backup operations, including heterogeneous indexing and load balancing of backup and indexing resources
US20110125337A1 (en)*2010-08-302011-05-26Vyacheslav ZavadskyHousehold appliance adapted to work with time of use electricity rates
US8402119B2 (en)2010-09-302013-03-19Microsoft CorporationReal-load tuning of database applications
EP2465245B1 (en)2010-10-202019-04-24BlackBerry LimitedCard application toolkit support for ip multimedia system
US8983541B2 (en)2010-10-202015-03-17Blackberry LimitedCard application toolkit support for IP multimedia subsystem
WO2012068255A2 (en)2010-11-162012-05-24Art FritzsonSystems and methods for identifying and mitigating information security risks
US9152293B2 (en)*2010-12-092015-10-06Verizon Patent And Licensing Inc.Server IP addressing in a computing-on-demand system
JP2014506045A (en)2010-12-152014-03-06ザンッツ インク Network stimulation engine
WO2012085624A1 (en)*2010-12-232012-06-28Research In Motion LimitedCard toolkit support for ip multimedia subsystem
US9106514B1 (en)2010-12-302015-08-11Spirent Communications, Inc.Hybrid network software provision
US8955110B1 (en)*2011-01-142015-02-10Robert W. Twitchell, Jr.IP jamming systems utilizing virtual dispersive networking
US20120253745A1 (en)*2011-03-282012-10-04Infosys Technologies LimitedSystem and method for testing performance of mobile application server
US10749887B2 (en)2011-04-082020-08-18Proofpoint, Inc.Assessing security risks of users in a computing network
WO2012139127A1 (en)2011-04-082012-10-11Wombat Security Technologies, Inc.Context-aware training systems, apparatuses, and methods
US9558677B2 (en)2011-04-082017-01-31Wombat Security Technologies, Inc.Mock attack cybersecurity training system and methods
US9373267B2 (en)*2011-04-082016-06-21Wombat Security Technologies, Inc.Method and system for controlling context-aware cybersecurity training
US9824609B2 (en)2011-04-082017-11-21Wombat Security Technologies, Inc.Mock attack cybersecurity training system and methods
WO2012145817A1 (en)2011-04-262012-11-01Research In Motion LimitedTransmission of the pdp content activation rejection cause codes to the uicc
US8464219B1 (en)2011-04-272013-06-11Spirent Communications, Inc.Scalable control system for test execution and monitoring utilizing multiple processors
US9384032B2 (en)*2011-04-282016-07-05Clearcenter, Corp.Methods, devices, and systems for establishing, setting-up, and maintaining a virtual computer infrastructure
US9600350B2 (en)2011-06-162017-03-21Vmware, Inc.Delivery of a user interface using hypertext transfer protocol
RU2506638C2 (en)*2011-06-282014-02-10Закрытое акционерное общество "Лаборатория Касперского"System and method for hardware detection and cleaning of unknown malware installed on personal computer
US9549045B2 (en)*2011-08-292017-01-17Vmware, Inc.Sharing remote sessions of a user interface and/or graphics of a computer
US9514242B2 (en)2011-08-292016-12-06Vmware, Inc.Presenting dynamically changing images in a limited rendering environment
US8925091B2 (en)*2011-09-012014-12-30Dell Products, LpSystem and method for evaluation in a collaborative security assurance system
US9875174B1 (en)*2011-09-212018-01-23Amazon Technologies, Inc.Optimizing the execution of an application executing on a programmable execution service
CN102387137B (en)*2011-10-112015-04-08杭州东信北邮信息技术有限公司Implementation method and system of intelligent operation logic of a plurality of network devices
US8782472B2 (en)2011-10-282014-07-15Dell Products L.P.Troubleshooting system using device snapshots
US8856272B2 (en)2012-01-082014-10-07Harman International Industries, IncorporatedCloud hosted audio rendering based upon device and environment profiles
KR101863197B1 (en)2012-01-312018-05-31삼성전자주식회사Apparatus and method for informing of available devices in contents sharing network
US20130218549A1 (en)*2012-02-162013-08-22Tt Government Solutions, Inc.Dynamic time virtualization for scalable and high fidelity hybrid network emulation
AU2013272215B2 (en)*2012-03-222017-10-12Imperial Innovations LimitedAnomaly detection to identify coordinated group attacks in computer networks
US8972543B1 (en)2012-04-112015-03-03Spirent Communications, Inc.Managing clients utilizing reverse transactions
US10976359B2 (en)2012-09-012021-04-13Promptlink Communications, Inc.Functional verification process and universal platform for high-volume reverse logistics of CPE devices
US9021092B2 (en)2012-10-192015-04-28Shadow Networks, Inc.Network infrastructure obfuscation
WO2014066500A1 (en)*2012-10-232014-05-01Hassell Suzanne PCyber analysis modeling evaluation for operations (cameo) simulation system
US9794130B2 (en)2012-12-132017-10-17Coriant Operations, Inc.System, apparatus, procedure, and computer program product for planning and simulating an internet protocol network
US9311121B2 (en)2012-12-212016-04-12Commvault Systems, Inc.Archiving virtual machines in a data storage system
US20140181038A1 (en)2012-12-212014-06-26Commvault Systems, Inc.Systems and methods to categorize unprotected virtual machines
WO2014105094A1 (en)*2012-12-282014-07-03Promptlink Communications, Inc.Operational network information generated by synthesis of baseline cpe data
US11284063B2 (en)2012-12-282022-03-22Promptlink Communications, Inc.Video quality analysis and detection of blockiness, artifacts and color variation for high-volume testing of devices using automated video testing system
US20140196038A1 (en)2013-01-082014-07-10Commvault Systems, Inc.Virtual machine management in a data storage system
US20140201157A1 (en)*2013-01-112014-07-17Commvault Systems, Inc.Systems and methods for rule-based virtual machine data protection
US9398038B2 (en)*2013-02-082016-07-19PhishMe, Inc.Collaborative phishing attack detection
US9253207B2 (en)2013-02-082016-02-02PhishMe, Inc.Collaborative phishing attack detection
US9053326B2 (en)2013-02-082015-06-09PhishMe, Inc.Simulated phishing attack with sequential messages
US20140289366A1 (en)*2013-03-202014-09-25Korea Advanced Institute Of Science And TechnologyService providing method and system for instance hosting
US9939981B2 (en)2013-09-122018-04-10Commvault Systems, Inc.File manager integration with virtualization in an information management system with an enhanced storage manager, including user control and storage management of virtual machines
EP3053298B1 (en)*2013-10-032023-03-29FireEye Security Holdings US LLCDynamic adaptive defense for cyber-security threats
CA2834565C (en)*2013-11-282016-01-19Solutioninc LimitedVbn server clustering system, method of vbn server clustering, and vbn server for clustering
US10122747B2 (en)*2013-12-062018-11-06Lookout, Inc.Response generation after distributed monitoring and evaluation of multiple devices
US9262629B2 (en)2014-01-212016-02-16PhishMe, Inc.Methods and systems for preventing malicious use of phishing simulation records
US10021116B2 (en)*2014-02-192018-07-10HCA Holdings, Inc.Network segmentation
US9871889B1 (en)*2014-03-182018-01-16EMC IP Holing Company LLCTechniques for automated capture of configuration data for simulation
WO2015143530A1 (en)*2014-03-262015-10-01Cae Inc.Method for performing an objective evaluation of a simulation performed by user of a simulator
US20170141950A1 (en)*2014-03-282017-05-18Hewlett Packard Enterprise Development LpRescheduling a service on a node
US9563518B2 (en)2014-04-022017-02-07Commvault Systems, Inc.Information management by a media agent in the absence of communications with a storage manager
US20150287336A1 (en)*2014-04-042015-10-08Bank Of America CorporationAutomated phishing-email training
US10419957B2 (en)2014-05-152019-09-17Promptlink Communications, Inc.High-volume wireless device testing
US9692811B1 (en)2014-05-232017-06-27Amazon Technologies, Inc.Optimization of application parameters
US9672263B1 (en)*2014-06-232017-06-06The United States Of America As Represented By The Secretary Of The NavyReliability engineering data integration
US10097410B2 (en)*2014-06-262018-10-09Vmware, Inc.Methods and apparatus to scale application deployments in cloud computing environments
US9411963B2 (en)*2014-07-072016-08-09International Business Machines CorporationVisual display of risk-identifying metadata for identity management access requests
US20160019317A1 (en)2014-07-162016-01-21Commvault Systems, Inc.Volume or virtual machine level backup and generating placeholders for virtual machine files
US9398029B2 (en)2014-08-012016-07-19Wombat Security Technologies, Inc.Cybersecurity training system with automated application of branded content
US9710465B2 (en)2014-09-222017-07-18Commvault Systems, Inc.Efficiently restoring execution of a backed up virtual machine based on coordination with virtual-machine-file-relocation operations
US9417968B2 (en)2014-09-222016-08-16Commvault Systems, Inc.Efficiently restoring execution of a backed up virtual machine based on coordination with virtual-machine-file-relocation operations
US9436555B2 (en)2014-09-222016-09-06Commvault Systems, Inc.Efficient live-mount of a backed up virtual machine in a storage management system
US10776209B2 (en)2014-11-102020-09-15Commvault Systems, Inc.Cross-platform virtual machine backup and replication
US9983936B2 (en)2014-11-202018-05-29Commvault Systems, Inc.Virtual machine change block tracking
US9591022B2 (en)2014-12-172017-03-07The Boeing CompanyComputer defenses and counterattacks
US9892260B2 (en)2015-04-202018-02-13SafeBreach Ltd.System and method for creating and executing breach scenarios utilizing virtualized elements
WO2016172151A1 (en)*2015-04-202016-10-27SafeBreach Ltd.System and method for securing a computer system against malicious actions by utilizing virtualized elements
US9710653B2 (en)2015-04-202017-07-18SafeBreach Ltd.System and method for verifying malicious actions by utilizing virtualized elements
US10601661B2 (en)*2015-06-222020-03-24Arista Networks, Inc.Tracking state of components within a network element
US10218735B2 (en)*2015-06-302019-02-26The Mitre CorporationNetwork attack simulation systems and methods
US10672289B2 (en)2015-09-242020-06-02Circadence CorporationSystem for dynamically provisioning cyber training environments
KR102113587B1 (en)*2015-09-242020-05-22서케이든스 코퍼레이션 Mission-based game-implemented cyber education system and method
US12237199B2 (en)2015-09-242025-02-25Circadence CorporationSystem for dynamically provisioning cyber training environments
US10238948B2 (en)2015-09-242019-03-26Circadence CorporationMission-based, game-implemented cyber training system and method
US10424222B2 (en)2015-10-272019-09-24Hartford Fire Insurance CompanyDynamic interface virtualization in a networked computing environment
US20230171292A1 (en)*2015-10-282023-06-01Qomplx, Inc.Holistic external network cybersecurity evaluation and scoring
US9888022B2 (en)*2015-12-012018-02-06International Business Machines CorporationProviding application-specific threat metrics
US10511505B2 (en)2015-12-092019-12-17Keysight Technologies Singapore (Sales) Pte. Ltd.Systems and methods to recreate real world application level test packets for network testing
US10079850B1 (en)*2015-12-292018-09-18Symantec CorporationSystems and methods for provisioning cyber security simulation exercises
US9774618B2 (en)2015-12-302017-09-26IxiaMethods, systems, and computer readable media for assessing attack vulnerability of radio access network equipment
US10169033B2 (en)2016-02-122019-01-01International Business Machines CorporationAssigning a computer to a group of computers in a group infrastructure
US10565067B2 (en)2016-03-092020-02-18Commvault Systems, Inc.Virtual server cloud file system for virtual machine backup from cloud operations
US9609121B1 (en)2016-04-072017-03-28Global Tel*Link CorporationSystem and method for third party monitoring of voice and video calls
WO2017189765A1 (en)2016-04-262017-11-02Acalvio Technologies, Inc.Tunneling for network deceptions
US20180005127A1 (en)*2016-06-292018-01-04Alcatel-Lucent Usa Inc.Predicting problem events from machine data
US10567263B2 (en)*2016-08-192020-02-18Intel CorporationTechnologies for simulating service degradation in a software defined network
US10521590B2 (en)*2016-09-012019-12-31Microsoft Technology Licensing LlcDetection dictionary system supporting anomaly detection across multiple operating environments
US10242187B1 (en)*2016-09-142019-03-26Symantec CorporationSystems and methods for providing integrated security management
US10474548B2 (en)2016-09-302019-11-12Commvault Systems, Inc.Heartbeat monitoring of virtual machines for initiating failover operations in a data storage management system, using ping monitoring of target virtual machines
US10152251B2 (en)2016-10-252018-12-11Commvault Systems, Inc.Targeted backup of virtual machine
US10162528B2 (en)2016-10-252018-12-25Commvault Systems, Inc.Targeted snapshot based on virtual machine location
US10678758B2 (en)2016-11-212020-06-09Commvault Systems, Inc.Cross-platform virtual machine data and memory backup and replication
US10983511B2 (en)2017-02-142021-04-20Quest Automated Services, LLCAutomation control system
US10742583B2 (en)2017-02-282020-08-11Microsoft Technology Licensing, LlcShared command history
US10581802B2 (en)2017-03-162020-03-03Keysight Technologies Singapore (Sales) Pte. Ltd.Methods, systems, and computer readable media for advertising network security capabilities
US10524141B2 (en)*2017-03-202019-12-31T-Mobile Usa, Inc.Destructive testing of network nodes
WO2018175551A1 (en)*2017-03-222018-09-27Circadence CorporationMission-based, game-implemented cyber training system and method
US20180276022A1 (en)2017-03-242018-09-27Commvault Systems, Inc.Consistent virtual machine replication
US10387073B2 (en)2017-03-292019-08-20Commvault Systems, Inc.External dynamic virtual machine synchronization
JP6679529B2 (en)*2017-04-042020-04-15株式会社東芝 Disability training system, terminal, and disability training program
US10225396B2 (en)2017-05-182019-03-05Global Tel*Link CorporationThird party monitoring of a activity within a monitoring platform
IL252455B (en)*2017-05-232018-04-30Gabay ShaiSystem and method for on-premise cyber training
US10243904B1 (en)2017-05-262019-03-26Wombat Security Technologies, Inc.Determining authenticity of reported user action in cybersecurity risk assessment
US10860786B2 (en)2017-06-012020-12-08Global Tel*Link CorporationSystem and method for analyzing and investigating communication data from a controlled environment
US10657020B2 (en)*2017-06-052020-05-19Cisco Technology, Inc.Automation and augmentation of lab recreates using machine learning
CN109271310B (en)*2017-07-182022-07-05北京京东尚科信息技术有限公司Development testing method and device for network function of mobile application program
US10673698B2 (en)*2017-07-212020-06-02Cisco Technology, Inc.Service function chain optimization using live testing
US10757132B1 (en)*2017-09-082020-08-25Architecture Technology CorporationSystem and method for evaluating and optimizing training effectiveness
CN107749800B (en)*2017-09-222021-01-12安徽皖通邮电股份有限公司Method for realizing implicit deletion of automatic test configuration of communication equipment
US11606263B2 (en)2017-10-172023-03-14Science Applications International CorporationLarge network simulation
US10965696B1 (en)*2017-10-302021-03-30EMC IP Holding Company LLCEvaluation of anomaly detection algorithms using impersonation data derived from user data
US11190538B2 (en)2018-01-182021-11-30Risksense, Inc.Complex application attack quantification, testing, detection and prevention
US10877928B2 (en)2018-03-072020-12-29Commvault Systems, Inc.Using utilities injected into cloud-based virtual machines for speeding up virtual machine backup operations
WO2019176021A1 (en)*2018-03-142019-09-19Nec CorporationSecurity assessment system
US10965703B2 (en)2018-06-062021-03-30Reliaquest Holdings, LlcThreat mitigation system and method
US11709946B2 (en)2018-06-062023-07-25Reliaquest Holdings, LlcThreat mitigation system and method
US11379559B2 (en)*2018-07-102022-07-05EMC IP Holding Company LLCAutomatic copy validation using real-world application traffic
US20200106787A1 (en)*2018-10-012020-04-02Global Data Sentinel, Inc.Data management operating system (dmos) analysis server for detecting and remediating cybersecurity threats
US10979448B2 (en)*2018-11-022021-04-13KnowBe4, Inc.Systems and methods of cybersecurity attack simulation for incident response training and awareness
US11153152B2 (en)2018-11-212021-10-19Cisco Technology, Inc.System and methods to validate issue detection and classification in a network assurance system
US11159555B2 (en)2018-12-032021-10-26Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11281806B2 (en)2018-12-032022-03-22Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11283825B2 (en)2018-12-032022-03-22Accenture Global Solutions LimitedLeveraging attack graphs of agile security platform
US11184385B2 (en)2018-12-032021-11-23Accenture Global Solutions LimitedGenerating attack graphs in agile security platforms
US11200124B2 (en)2018-12-062021-12-14Commvault Systems, Inc.Assigning backup resources based on failover of partnered data storage servers in a data storage management system
US11138312B2 (en)*2018-12-192021-10-05Accenture Global Solutions LimitedCyber range integrating technical and non-technical participants, participant substitution with AI bots, and AI bot training
US10768971B2 (en)2019-01-302020-09-08Commvault Systems, Inc.Cross-hypervisor live mount of backed up virtual machine data
US10996974B2 (en)2019-01-302021-05-04Commvault Systems, Inc.Cross-hypervisor live mount of backed up virtual machine data, including management of cache storage for virtual machine data
USD926809S1 (en)2019-06-052021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
USD926810S1 (en)2019-06-052021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
USD926200S1 (en)2019-06-062021-07-27Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
USD926782S1 (en)2019-06-062021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
CN112055380B (en)*2019-06-062022-04-29华为技术有限公司Method and apparatus for predicting traffic volume
USD926811S1 (en)2019-06-062021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
US11695795B2 (en)2019-07-122023-07-04Accenture Global Solutions LimitedEvaluating effectiveness of security controls in enterprise networks using graph values
CN110399142B (en)*2019-07-262023-04-07四川新网银行股份有限公司Method and system for isolating gray scale from production environment version
US11494216B2 (en)*2019-08-162022-11-08Google LlcBehavior-based VM resource capture for forensics
US11533329B2 (en)2019-09-272022-12-20Keysight Technologies, Inc.Methods, systems and computer readable media for threat simulation and threat mitigation recommendations
CN110943969A (en)*2019-10-082020-03-31成都天和讯达科技有限公司Network attack scene reproduction method, system, equipment and storage medium
US10944641B1 (en)2019-11-012021-03-09Cisco Technology, Inc.Systems and methods for application traffic simulation using captured flows
US11698977B1 (en)2019-11-132023-07-11Ivanti, Inc.Predicting and quantifying weaponization of software weaknesses
CN110928197B (en)*2019-11-282021-08-17西门子交通技术(北京)有限公司Simulation test method and system for automatic control of train
US11750634B1 (en)*2019-12-122023-09-05Amazon Technologies, Inc.Threat detection model development for network-based systems
RU2747099C1 (en)*2019-12-192021-04-26Публичное акционерное общество "Сбербанк России" (ПАО Сбербанк")Automated cybersecurity event testing system
US11063849B1 (en)*2020-01-152021-07-13Sas Institute Inc.Techniques for automated software testing
JP7409116B2 (en)*2020-01-302024-01-09富士通株式会社 Program, information processing device and cyber exercise control method
US11467753B2 (en)2020-02-142022-10-11Commvault Systems, Inc.On-demand restore of virtual machine data
EP3872665A1 (en)2020-02-282021-09-01Accenture Global Solutions LimitedCyber digital twin simulator for security controls requirements
US11184330B2 (en)*2020-03-092021-11-23International Business Machines CorporationAutomated secured login for robot process automation applications
US11442768B2 (en)2020-03-122022-09-13Commvault Systems, Inc.Cross-hypervisor live recovery of virtual machines
US11099956B1 (en)2020-03-262021-08-24Commvault Systems, Inc.Snapshot-based disaster recovery orchestration of virtual machine failover and failback operations
CN111464546B (en)*2020-04-022022-03-18中国人民解放军国防科技大学Network attack defense method based on system event
US11677775B2 (en)*2020-04-102023-06-13AttackIQ, Inc.System and method for emulating a multi-stage attack on a node within a target network
US12287882B2 (en)*2020-05-152025-04-29Twilio Inc.Framework for automated penetration testing
US11748143B2 (en)2020-05-152023-09-05Commvault Systems, Inc.Live mount of virtual machines in a public cloud computing environment
CN111641619B (en)*2020-05-212022-06-17杭州安恒信息技术股份有限公司Method and device for constructing hacker portrait based on big data and computer equipment
US11876824B2 (en)2020-06-252024-01-16Accenture Global Solutions LimitedExtracting process aware analytical attack graphs through logical network analysis
US11411976B2 (en)2020-07-092022-08-09Accenture Global Solutions LimitedResource-efficient generation of analytical attack graphs
US11483213B2 (en)*2020-07-092022-10-25Accenture Global Solutions LimitedEnterprise process discovery through network traffic patterns
US12307273B2 (en)2020-08-112025-05-20Ut-Battelle, LlcData driven computer user emulation
US12034756B2 (en)2020-08-282024-07-09Accenture Global Solutions LimitedAnalytical attack graph differencing
US11223538B1 (en)*2020-09-112022-01-11Hewlett Packard Enterprise Development LpIntelligent data traffic routing in a wide area network
US11451973B2 (en)*2020-09-232022-09-20T-Mobile Usa, Inc.Simulating operation of a 5G wireless telecommunication network
US11393353B2 (en)*2020-09-302022-07-19Ui LabsIndustrial operations security training systems and methods
US20230318956A1 (en)*2020-10-022023-10-05Nippon Telegraph And Telephone CorporationTesting device, testing method, and testing program
US11831675B2 (en)2020-10-262023-11-28Accenture Global Solutions LimitedProcess risk calculation based on hardness of attack paths
US11656951B2 (en)2020-10-282023-05-23Commvault Systems, Inc.Data loss vulnerability detection
US11792306B2 (en)*2020-11-062023-10-17Improbable Worlds LimitedNetwork protocol for view replication over unreliable networks
US11973790B2 (en)2020-11-102024-04-30Accenture Global Solutions LimitedCyber digital twin simulator for automotive security assessment based on attack graphs
EP4047870B1 (en)2021-02-182024-11-13Accenture Global Solutions LimitedAutomated prioritization of process-aware cyber risk mitigation
US12386655B2 (en)*2021-03-192025-08-12Improbable Worlds LimitedEvent-based view synchronization systems and methods
CN113259257B (en)*2021-06-212021-10-19南京赛宁信息技术有限公司Background traffic generation method and device for custom rate distribution in network shooting range
US11783001B2 (en)2021-07-082023-10-10Bank Of America CorporationSystem and method for splitting a video stream using breakpoints based on recognizing workflow patterns
US11880250B2 (en)2021-07-212024-01-23Accenture Global Solutions LimitedOptimizing energy consumption of production lines using intelligent digital twins
US11895150B2 (en)2021-07-282024-02-06Accenture Global Solutions LimitedDiscovering cyber-attack process model based on analytical attack graphs
US12231461B2 (en)2021-08-122025-02-18Accenture Global Solutions LimitedPrioritizing security controls using a cyber digital twin simulator
US12355798B2 (en)2021-08-252025-07-08Accenture Global Solutions LimitedAutomated prioritization of cyber risk mitigation by simulating exploits
CN114205123A (en)*2021-11-202022-03-18湖北天融信网络安全技术有限公司Attack and defense confrontation-based threat hunting method, device, equipment and storage medium
CN114296406B (en)*2021-11-242024-01-19北京六方云信息技术有限公司Network attack and defense display system, method and device and computer readable storage medium
US12088617B1 (en)*2022-01-182024-09-10Cpacket Networks Inc.Network monitor with a homodyne detector for early identification of network attacks
CN114531292A (en)*2022-02-222022-05-24北京华电云博科技有限公司Simulation display platform for detecting power network attack
US12289336B2 (en)2022-04-082025-04-29Accenture Global Solutions LimitedOntology-based risk propagation over digital twins
US12348552B2 (en)2022-06-152025-07-01Accenture Global Solutions LimitedAutomated prediction of cyber-security attack techniques using knowledge mesh
WO2023244230A1 (en)*2022-06-162023-12-21Rakuten Mobile, Inc.System and method for filtering and visual presentation of real-time network analysis of device compliance
CN115348176A (en)*2022-07-282022-11-15中网信安科技有限公司 A method of importing and editing information elements using a controlled network
US12407710B2 (en)2022-08-102025-09-02AttackIQ, Inc.Method for generating attack graphs based on Markov chains
CN115469943B (en)*2022-09-222023-05-16安芯网盾(北京)科技有限公司Detection method and device for command execution of JAVA virtual terminal
US12360942B2 (en)2023-01-192025-07-15Commvault Systems, Inc.Selection of a simulated archiving plan for a desired dataset
US12321386B1 (en)*2023-03-302025-06-03Juniper Networks, Inc.Generating XML configuration sub-streams based on an XML configuration stream and a metadata tree associated with the XML configuration stream
WO2025008890A1 (en)*2023-07-032025-01-09Jio Platforms LimitedMethod and system for automatically monitoring a network
US20250174145A1 (en)*2023-11-292025-05-29The Boeing CompanySystems and methods for development of training programs for people based on training data and operation data

Citations (33)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5907696A (en)*1996-07-031999-05-25Cabletron Systems, Inc.Network device simulator
US6023563A (en)*1996-08-202000-02-08Shani; RonNetworking switch having the network presence of a bridge
US6272450B1 (en)*1998-06-162001-08-07Telefonaktiebolaget L M Ericsson (Publ)Cellular network traffic simulator (cents)
US6363423B1 (en)*1999-04-262002-03-263Com CorporationSystem and method for remotely generating, assigning and updating network adapter card in a computing system
US20030061017A1 (en)*2001-09-272003-03-27AlcatelMethod and a system for simulating the behavior of a network and providing on-demand dimensioning
US20030233404A1 (en)*2002-06-132003-12-18Hopkins Christopher D.Offline simulation of online session between client and server
US20040122645A1 (en)*2002-12-192004-06-24Shevenell Michael P.Method and apparatus for the simulation of computer networks
US20040236866A1 (en)*2003-05-212004-11-25Diego DugatkinAutomated characterization of network traffic
US20040257604A1 (en)*2003-06-172004-12-23Canon Kabushiki KaishaInformation processing apparatus, information processing method, program, and strong medium
US20050099959A1 (en)*2003-11-122005-05-12Roger StandridgeGenerating processed traffic
US6901357B1 (en)*1999-12-142005-05-31Microsoft CorporationSystem and method for simulating network connection characteristics
US20050229255A1 (en)*2004-04-132005-10-13Gula Ronald JSystem and method for scanning a network
US7047176B2 (en)*2000-05-052006-05-16Fujitsu LimitedMethod and system for hardware simulation
US7089172B2 (en)*2001-12-282006-08-08Testout CorporationSystem and method for simulating a computer environment and evaluating a user's performance within a simulation
US20060256720A1 (en)*2005-05-122006-11-16Martin Curran-GrayIn-line network simulator
US7155376B2 (en)*2001-06-222006-12-26Caliper CorporationTraffic data management and simulation system
US20070078950A1 (en)*2002-06-132007-04-05Salesforce.Com, Inc.Offline web services api to mirror online web services api
US7210087B2 (en)*2004-05-222007-04-24Advantest America R&D Center, Inc.Method and system for simulating a modular test system
US20070130208A1 (en)*2005-11-212007-06-07Christof BornhoevdHierarchical, multi-tiered mapping and monitoring architecture for service-to-device re-mapping for smart items
US7257082B2 (en)*2003-03-312007-08-14IxiaSelf-similar traffic generation
US7263471B2 (en)*2001-06-142007-08-28Telecom Italia S.P.A.System and method for stimulating the behavior of a network for mobile radio apparatus
US7296080B2 (en)*2001-07-172007-11-13Mcafee, Inc.Method of simulating network communications
US20070277237A1 (en)*2006-05-242007-11-29Verizon Business Federal Network Systems LlcInformation operations support system, method, and computer program product
US7318015B2 (en)*2001-06-132008-01-08Verizon Business Global LlcMethod, system and program product for generating scenarios utilizing graphical objects representing hierarchically arranged elements of a modeled environment
US7330806B2 (en)*2000-08-082008-02-12Reohr Iii JohnVirtualized network
US20080043627A1 (en)*2006-08-152008-02-21Pradeep SinghNetwork Simulation and Analysis using Operational Forwarding Data
US7376550B1 (en)*2005-10-262008-05-20Juniper Networks, Inc.Simulation of network traffic using non-deterministic user behavior models
US7469203B2 (en)*2003-08-222008-12-23Opnet Technologies, Inc.Wireless network hybrid simulation
US7487074B2 (en)*2002-12-172009-02-03Honda Motor Co., Ltd.Road traffic simulation apparatus
US20090157371A1 (en)*2007-12-122009-06-18Verizon Services Organization Inc.Multi-layered Model for Survivability Analysis of Network Services
US7881915B2 (en)*2005-09-022011-02-01Hntb Holdings Ltd.System and method for collecting and modeling object simulation data
US7912021B2 (en)*2005-12-222011-03-22Telecom Italia S.P.A.Method and system for simulating a communication network, related network and computer program product therefor
US7978601B1 (en)*2004-11-222011-07-12At&T Intellectual Property Ii, L.P.Method and apparatus for network performance analysis

Family Cites Families (53)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5440719A (en)*1992-10-271995-08-08Cadence Design Systems, Inc.Method simulating data traffic on network in accordance with a client/sewer paradigm
US5702038A (en)*1996-04-101997-12-30Miller; Judith A.Organizer bag for strollers
US5926463A (en)*1997-10-061999-07-203Com CorporationMethod and apparatus for viewing and managing a configuration of a computer network
US6657955B1 (en)*1999-05-272003-12-02Alcatel Canada Inc.Buffering system employing per traffic flow accounting congestion control
US8032634B1 (en)*1999-08-232011-10-04Oracle America, Inc.Approach for allocating resources to an apparatus based on resource requirements
US7315801B1 (en)*2000-01-142008-01-01Secure Computing CorporationNetwork security modeling system and method
DE10015619A1 (en)*2000-03-292001-10-04Endress Hauser Gmbh Co Programmable field device
EP1146749A1 (en)2000-04-072001-10-17Canal+ Technologies Société AnonymeApparatus and method for testing applications
US20020065675A1 (en)*2000-11-272002-05-30Grainger Jeffry J.Computer implemented method of managing information disclosure statements
US7770223B2 (en)*2001-04-122010-08-03Computer Associates Think, Inc.Method and apparatus for security management via vicarious network devices
US6622856B2 (en)2001-04-252003-09-23Johnson & Johnson Consumer Companies, Inc.Relief kit
US7325252B2 (en)*2001-05-182008-01-29Achilles Guard Inc.Network security testing
DE60135449D1 (en)*2001-06-142008-10-02Ibm Intrusion detection in data processing systems
TWI244603B (en)*2001-07-052005-12-01Dainippon Screen MfgSubstrate processing system for managing device information of substrate processing device
US6950405B2 (en)*2001-07-162005-09-27Agilent Technologies, Inc.Traffic stream generator having a non-consecutive addressing mechanism
US6892241B2 (en)*2001-09-282005-05-10Networks Associates Technology, Inc.Anti-virus policy enforcement system and method
DE10295497D2 (en)*2001-11-242005-01-27Tesa Ag Crosslinking of photoinitiator-initialized polyacrylates
US7200545B2 (en)*2001-12-282007-04-03Testout CorporationSystem and method for simulating computer network devices for competency training and testing simulations
EP1490820A4 (en)*2002-03-182007-03-21Merck & Co IncComputer assisted and/or implemented process and system for managing and/or providing a medical information portal for healthcare providers
US7379857B2 (en)*2002-05-102008-05-27Lockheed Martin CorporationMethod and system for simulating computer networks to facilitate testing of computer network security
US7139798B2 (en)*2002-05-172006-11-21Groove Networks, Inc.Method and apparatus for connecting a secure peer-to-peer collaboration system to an external system
US20040023686A1 (en)*2002-07-312004-02-05Lavaflow, LlpMethod of and apparatus for outputting a picture file
US6952779B1 (en)*2002-10-012005-10-04Gideon CohenSystem and method for risk detection and analysis in a computer network
US8209680B1 (en)*2003-04-112012-06-26Vmware, Inc.System and method for disk imaging on diverse computers
US7621162B2 (en)*2003-12-302009-11-24Alcatel LucentHierarchical flow-characterizing multiplexor
US7613105B2 (en)*2004-01-302009-11-03Microsoft CorporationMethods and systems for removing data inconsistencies for a network simulation
US7583587B2 (en)*2004-01-302009-09-01Microsoft CorporationFault detection and diagnosis
US8204984B1 (en)*2004-04-012012-06-19Fireeye, Inc.Systems and methods for detecting encrypted bot command and control communication channels
US7418376B1 (en)*2004-04-082008-08-26Cisco Systems, Inc.Method for generating a simulated network based on an actual managed network
CA2467603A1 (en)*2004-05-182005-11-18Ibm Canada Limited - Ibm Canada LimiteeVisualization firewall rules in an auto provisioning environment
JP4519553B2 (en)*2004-07-272010-08-04富士フイルム株式会社 Radiation irradiation control method, apparatus and program
US7818515B1 (en)*2004-08-102010-10-19Symantec Operating CorporationSystem and method for enforcing device grouping rules for storage virtualization
US20060071772A1 (en)*2004-10-012006-04-06Janes Stephen DSystem and method for test simulation
US8683031B2 (en)*2004-10-292014-03-25Trustwave Holdings, Inc.Methods and systems for scanning and monitoring content on a network
KR100609710B1 (en)*2004-11-252006-08-08한국전자통신연구원 Network simulation device and method for abnormal traffic analysis
US7373550B2 (en)*2005-02-032008-05-13Arm LimitedGeneration of a computer program to test for correct operation of a data processing apparatus
US7668140B2 (en)*2005-05-112010-02-23Alcatel-Lucent Usa Inc.Roaming between wireless access point
US20070007895A1 (en)*2005-07-112007-01-11Ching-Hui LinRear Plate Structure and Manufacturing Method thereof for a Plasma Display Panel
US7693699B2 (en)*2005-08-192010-04-06Opnet Technologies, Inc.Incremental update of virtual devices in a modeled network
US8898734B2 (en)*2005-08-202014-11-25Riverbed Technology, Inc.Analyzing security compliance within a network
US20070066297A1 (en)*2005-09-202007-03-22Ghobad Heidari-BateniNetwork monitoring system and method
US20070213966A1 (en)*2006-03-132007-09-13Finisar CorporationTraffic generator program
US8176153B2 (en)*2006-05-022012-05-08Cisco Technology, Inc.Virtual server cloning
WO2008017001A2 (en)*2006-08-022008-02-07Moka5, Inc.Sharing live appliances
US20080072321A1 (en)*2006-09-012008-03-20Mark WahlSystem and method for automating network intrusion training
US8413237B2 (en)*2006-10-232013-04-02Alcatel LucentMethods of simulating vulnerability
US8799448B2 (en)*2006-12-202014-08-05Microsoft CorporationGenerating rule packs for monitoring computer systems
WO2009003126A1 (en)*2007-06-262008-12-31Core Sdi, IncorporatedSystem and method for simulating computer network attacks
US9076342B2 (en)*2008-02-192015-07-07Architecture Technology CorporationAutomated execution and evaluation of network-based training exercises
US20090217263A1 (en)*2008-02-252009-08-27Alexander GebhartVirtual appliance factory
US8719398B2 (en)*2008-02-292014-05-06Microsoft CorporationNetwork performance monitor
US8577845B2 (en)*2008-06-132013-11-05Symantec Operating CorporationRemote, granular restore from full virtual machine backup
US7769049B2 (en)*2008-10-172010-08-03IxiaTraffic generator using parallel coherent transmit engines

Patent Citations (34)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5907696A (en)*1996-07-031999-05-25Cabletron Systems, Inc.Network device simulator
US6023563A (en)*1996-08-202000-02-08Shani; RonNetworking switch having the network presence of a bridge
US6272450B1 (en)*1998-06-162001-08-07Telefonaktiebolaget L M Ericsson (Publ)Cellular network traffic simulator (cents)
US6363423B1 (en)*1999-04-262002-03-263Com CorporationSystem and method for remotely generating, assigning and updating network adapter card in a computing system
US6901357B1 (en)*1999-12-142005-05-31Microsoft CorporationSystem and method for simulating network connection characteristics
US7047176B2 (en)*2000-05-052006-05-16Fujitsu LimitedMethod and system for hardware simulation
US7330806B2 (en)*2000-08-082008-02-12Reohr Iii JohnVirtualized network
US7318015B2 (en)*2001-06-132008-01-08Verizon Business Global LlcMethod, system and program product for generating scenarios utilizing graphical objects representing hierarchically arranged elements of a modeled environment
US7263471B2 (en)*2001-06-142007-08-28Telecom Italia S.P.A.System and method for stimulating the behavior of a network for mobile radio apparatus
US7155376B2 (en)*2001-06-222006-12-26Caliper CorporationTraffic data management and simulation system
US7296080B2 (en)*2001-07-172007-11-13Mcafee, Inc.Method of simulating network communications
US20030061017A1 (en)*2001-09-272003-03-27AlcatelMethod and a system for simulating the behavior of a network and providing on-demand dimensioning
US7089172B2 (en)*2001-12-282006-08-08Testout CorporationSystem and method for simulating a computer environment and evaluating a user's performance within a simulation
US20030233404A1 (en)*2002-06-132003-12-18Hopkins Christopher D.Offline simulation of online session between client and server
US20070078950A1 (en)*2002-06-132007-04-05Salesforce.Com, Inc.Offline web services api to mirror online web services api
US7487074B2 (en)*2002-12-172009-02-03Honda Motor Co., Ltd.Road traffic simulation apparatus
US20040122645A1 (en)*2002-12-192004-06-24Shevenell Michael P.Method and apparatus for the simulation of computer networks
US7257082B2 (en)*2003-03-312007-08-14IxiaSelf-similar traffic generation
US20040236866A1 (en)*2003-05-212004-11-25Diego DugatkinAutomated characterization of network traffic
US20040257604A1 (en)*2003-06-172004-12-23Canon Kabushiki KaishaInformation processing apparatus, information processing method, program, and strong medium
US7469203B2 (en)*2003-08-222008-12-23Opnet Technologies, Inc.Wireless network hybrid simulation
US20050099959A1 (en)*2003-11-122005-05-12Roger StandridgeGenerating processed traffic
US7327686B2 (en)*2003-11-122008-02-05IxiaGenerating processed traffic
US20050229255A1 (en)*2004-04-132005-10-13Gula Ronald JSystem and method for scanning a network
US7210087B2 (en)*2004-05-222007-04-24Advantest America R&D Center, Inc.Method and system for simulating a modular test system
US7978601B1 (en)*2004-11-222011-07-12At&T Intellectual Property Ii, L.P.Method and apparatus for network performance analysis
US20060256720A1 (en)*2005-05-122006-11-16Martin Curran-GrayIn-line network simulator
US7881915B2 (en)*2005-09-022011-02-01Hntb Holdings Ltd.System and method for collecting and modeling object simulation data
US7376550B1 (en)*2005-10-262008-05-20Juniper Networks, Inc.Simulation of network traffic using non-deterministic user behavior models
US20070130208A1 (en)*2005-11-212007-06-07Christof BornhoevdHierarchical, multi-tiered mapping and monitoring architecture for service-to-device re-mapping for smart items
US7912021B2 (en)*2005-12-222011-03-22Telecom Italia S.P.A.Method and system for simulating a communication network, related network and computer program product therefor
US20070277237A1 (en)*2006-05-242007-11-29Verizon Business Federal Network Systems LlcInformation operations support system, method, and computer program product
US20080043627A1 (en)*2006-08-152008-02-21Pradeep SinghNetwork Simulation and Analysis using Operational Forwarding Data
US20090157371A1 (en)*2007-12-122009-06-18Verizon Services Organization Inc.Multi-layered Model for Survivability Analysis of Network Services

Cited By (127)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9384677B2 (en)2008-02-192016-07-05Architecture Technology CorporationAutomated execution and evaluation of network-based training exercises
US10068493B2 (en)*2008-02-192018-09-04Architecture Technology CorporationAutomated execution and evaluation of network-based training exercises
US10777093B1 (en)2008-02-192020-09-15Architecture Technology CorporationAutomated execution and evaluation of network-based training exercises
US20090208910A1 (en)*2008-02-192009-08-20Architecture Technology CorporationAutomated execution and evaluation of network-based training exercises
US20170032695A1 (en)*2008-02-192017-02-02Architecture Technology CorporationAutomated execution and evaluation of network-based training exercises
US9076342B2 (en)2008-02-192015-07-07Architecture Technology CorporationAutomated execution and evaluation of network-based training exercises
US10027749B2 (en)2008-03-312018-07-17Amazon Technologies, Inc.Techniques for network replication
US20120047200A1 (en)*2010-08-172012-02-23Geza SzaboUser behavior based mobile broadband user plane traffic generation system and method for real-like measurement generation
US8280956B2 (en)*2010-08-172012-10-02Telefonakitiebolaget LM Ericsson (publ)User behavior based mobile broadband user plane traffic generation system and method for real-like measurement generation
EP2656252A4 (en)*2010-12-202017-04-05Amazon Technologies, Inc.Techniques for network replication
US10868861B2 (en)2010-12-202020-12-15Amazon Technologies, Inc.Techniques for network replication
EP3525118A1 (en)*2010-12-202019-08-14Amazon Technologies, Inc.Techniques for network replication
US20160205145A1 (en)*2011-01-102016-07-14Vtech Telecommunications LimitedPeer-to-peer internet protocol telephone system with system-wide configuration data
US9756085B2 (en)*2011-01-102017-09-05Vtech Telecommunications LimitedPeer-to-peer internet protocol telephone system with system-wide configuration data
EP2688002A4 (en)*2011-03-152014-10-15Omron Tateisi Electronics Co DEVICE FOR ASSISTING THE DESIGN OF A NETWORK SYSTEM
US9628355B1 (en)*2011-07-202017-04-18Google Inc.System for validating site configuration based on real-time analytics data
US20130124797A1 (en)*2011-11-152013-05-16Microsoft CorporationVirtual disks constructed from unused distributed storage
US8775734B2 (en)*2011-11-152014-07-08Microsoft CorporationVirtual disks constructed from unused distributed storage
US9191267B2 (en)*2012-09-272015-11-17International Business Machines CorporationDevice management for determining the effects of management actions
US20140089482A1 (en)*2012-09-272014-03-27International Business Machines CorporationDevice management for determining the affects of management actions
US9357429B1 (en)*2012-12-282016-05-31Sprint Communications Company L.P.Estimating average user throughput in a wireless network
US20140220514A1 (en)*2013-02-042014-08-07Gamxing Inc.Games for learning regulatory best practices
US20140220541A1 (en)*2013-02-042014-08-07Gamxing Inc.Reporting results of games for learning regulatory best practices
US10187407B1 (en)2013-02-082019-01-22Cofense Inc.Collaborative phishing attack detection
US9591017B1 (en)*2013-02-082017-03-07PhishMe, Inc.Collaborative phishing attack detection
US9667645B1 (en)2013-02-082017-05-30PhishMe, Inc.Performance benchmarking for simulated phishing attacks
US9674221B1 (en)2013-02-082017-06-06PhishMe, Inc.Collaborative phishing attack detection
US10819744B1 (en)2013-02-082020-10-27Cofense IncCollaborative phishing attack detection
US20140308646A1 (en)*2013-03-132014-10-16Mindmarker BVMethod and System for Creating Interactive Training and Reinforcement Programs
US20160147427A1 (en)*2013-06-262016-05-26Hewlett-Packard Development Company, L.P.Thin client computing device taskbar and widgets
US20160232366A1 (en)*2013-09-202016-08-11Schneider Electric USA, Inc.Systems and methods for verification and deployment of applications to programmable devices
US10095886B2 (en)*2013-09-202018-10-09Schneider Electric USA, Inc.Systems and methods for verification and deployment of applications to programmable devices
US9842486B2 (en)*2013-12-032017-12-12Tyco Fire & Security GmbhUser interface configuration for alarm systems
US20150154855A1 (en)*2013-12-032015-06-04Tyco Fire & Security GmbhUser interface configuration for alarm systems
US9762443B2 (en)2014-04-152017-09-12Splunk Inc.Transformation of network data at remote capture agents
US10360196B2 (en)2014-04-152019-07-23Splunk Inc.Grouping and managing event streams generated from captured network data
US11818018B1 (en)2014-04-152023-11-14Splunk Inc.Configuring event streams based on identified security risks
US10462004B2 (en)2014-04-152019-10-29Splunk Inc.Visualizations of statistics associated with captured network data
US11716248B1 (en)2014-04-152023-08-01Splunk Inc.Selective event stream data storage based on network traffic volume
US11451453B2 (en)2014-04-152022-09-20Splunk Inc.Configuring the generation of ephemeral event streams by remote capture agents
US9923767B2 (en)2014-04-152018-03-20Splunk Inc.Dynamic configuration of remote capture agents for network data capture
US11314737B2 (en)2014-04-152022-04-26Splunk Inc.Transforming event data using values obtained by querying a data source
US11296951B2 (en)2014-04-152022-04-05Splunk Inc.Interval-based generation of event streams by remote capture agents
US10693742B2 (en)2014-04-152020-06-23Splunk Inc.Inline visualizations of metrics related to captured network data
US10523521B2 (en)2014-04-152019-12-31Splunk Inc.Managing ephemeral event streams generated from captured network data
US11281643B2 (en)2014-04-152022-03-22Splunk Inc.Generating event streams including aggregated values from monitored network data
US12204531B1 (en)2014-04-152025-01-21Splunk Inc.Dynamically modifying remote capture agent event stream destinations
US10127273B2 (en)2014-04-152018-11-13Splunk Inc.Distributed processing of network data using remote capture agents
US11252056B2 (en)2014-04-152022-02-15Splunk Inc.Transforming event data generated by remote capture agents using user-generated code
US12212475B1 (en)2014-04-152025-01-28Splunk Inc.Applying updated configuration dynamically to remote capture agents
US11245581B2 (en)2014-04-152022-02-08Splunk Inc.Selective event stream data storage based on historical stream data
US11108659B2 (en)2014-04-152021-08-31Splunk Inc.Using storage reactors to transform event data generated by remote capture agents
US11086897B2 (en)2014-04-152021-08-10Splunk Inc.Linking event streams across applications of a data intake and query system
US10257059B2 (en)2014-04-152019-04-09Splunk Inc.Transforming event data using remote capture agents and transformation servers
US10951474B2 (en)2014-04-152021-03-16Splunk Inc.Configuring event stream generation in cloud-based computing environments
US10700950B2 (en)2014-04-152020-06-30Splunk Inc.Adjusting network data storage based on event stream statistics
US12381780B1 (en)2014-04-152025-08-05Splunk Inc.Configuring generation of time-series event data from network packets captured by remote capture agent
US10374883B2 (en)2014-04-152019-08-06Splunk Inc.Application-based configuration of network data capture by remote capture agents
US10348583B2 (en)2014-04-152019-07-09Splunk Inc.Generating and transforming timestamped event data at a remote capture agent
US11863408B1 (en)2014-04-152024-01-02Splunk Inc.Generating event streams including modified network data monitored by remote capture agents
US10366101B2 (en)2014-04-152019-07-30Splunk Inc.Bidirectional linking of ephemeral event streams to creators of the ephemeral event streams
US9459940B2 (en)*2014-04-242016-10-04Action Star Enterprise Co., Ltd.Data transmission method for data transmission system
US20150309850A1 (en)*2014-04-242015-10-29Action Star Enterprise Co., Ltd.Data Transmission Method for Data Transmission System
US12028208B1 (en)2014-05-092024-07-02Splunk Inc.Selective event stream data storage based on network traffic volume
US20160012739A1 (en)*2014-07-142016-01-14Ali JafariNetworking systems and methods for facilitating communication and collaboration using a social-networking and interactive approach
US20160077944A1 (en)*2014-09-162016-03-17Spirent Communications, Inc.Systems and methods of building sequenceable test methodologies
US9817737B2 (en)*2014-09-162017-11-14Spirent Communications, Inc.Systems and methods of building sequenceable test methodologies
US10382599B2 (en)2014-10-302019-08-13Splunk Inc.Configuring generation of event streams by remote capture agents
US20160127180A1 (en)*2014-10-302016-05-05Splunk Inc.Streamlining configuration of protocol-based network data capture by remote capture agents
US9843598B2 (en)2014-10-302017-12-12Splunk Inc.Capture triggers for capturing network data
US9838512B2 (en)2014-10-302017-12-05Splunk Inc.Protocol-based capture of network data using remote capture agents
US10701191B2 (en)2014-10-302020-06-30Splunk Inc.Configuring rules for filtering events to be included in event streams
US11936764B1 (en)2014-10-302024-03-19Splunk Inc.Generating event streams based on application-layer events captured by remote capture agents
US11425229B2 (en)2014-10-302022-08-23Splunk Inc.Generating event streams from encrypted network traffic monitored by remote capture agents
US10805438B2 (en)2014-10-302020-10-13Splunk Inc.Configuring the protocol-based generation of event streams by remote capture agents
US10812514B2 (en)2014-10-302020-10-20Splunk Inc.Configuring the generation of additional time-series event data by remote capture agents
US10193916B2 (en)2014-10-302019-01-29Splunk Inc.Configuring the generation of event data based on a triggering search query
US10264106B2 (en)2014-10-302019-04-16Splunk Inc.Configuring generation of multiple event streams from a packet flow
CN107077563A (en)*2014-11-142017-08-18三菱电机株式会社 Information processing device, information processing method, and program
US11115505B2 (en)2015-01-292021-09-07Splunk Inc.Facilitating custom content extraction rule configuration for remote capture agents
US10334085B2 (en)2015-01-292019-06-25Splunk Inc.Facilitating custom content extraction from network packets
US11973852B2 (en)2015-01-292024-04-30Splunk Inc.Generating event data at remote capture agents based on identified network addresses
US9906554B2 (en)2015-04-102018-02-27PhishMe, Inc.Suspicious message processing and incident response
US9906539B2 (en)2015-04-102018-02-27PhishMe, Inc.Suspicious message processing and incident response
US10193857B2 (en)*2015-06-302019-01-29The United States Of America, As Represented By The Secretary Of The NavySecure unrestricted network for innovation
US10803766B1 (en)2015-07-282020-10-13Architecture Technology CorporationModular training of network-based training exercises
US10083624B2 (en)2015-07-282018-09-25Architecture Technology CorporationReal-time monitoring of network-based training exercises
US10872539B1 (en)2015-07-282020-12-22Architecture Technology CorporationReal-time monitoring of network-based training exercises
US10320828B1 (en)*2015-09-302019-06-11EMC IP Holding Company LLCEvaluation of security in a cyber simulator
US12143424B1 (en)2015-10-282024-11-12Qomplx LlcRapid predictive analysis of very large data sets using the distributed computational graph
US12149565B1 (en)2015-10-282024-11-19Qomplx LlcRapid predictive analysis of very large data sets using the distributed computational graph
US10609079B2 (en)*2015-10-282020-03-31Qomplx, Inc.Application of advanced cybersecurity threat mitigation to rogue devices, privilege escalation, and risk-based vulnerability and patch management
US12137123B1 (en)2015-10-282024-11-05Qomplx LlcRapid predictive analysis of very large data sets using the distributed computational graph
US12143425B1 (en)2015-10-282024-11-12Qomplx LlcRapid predictive analysis of very large data sets using the distributed computational graph
US12155693B1 (en)2015-10-282024-11-26Qomplx LlcRapid predictive analysis of very large data sets using the distributed computational graph
US10341181B2 (en)*2016-03-072019-07-02International Business Machines CorporationMethod and apparatus to allow dynamic changes of a replica network configuration in distributed systems
US10432650B2 (en)2016-03-312019-10-01Stuart StanifordSystem and method to protect a webserver against application exploits and attacks
CN109074293A (en)*2016-04-262018-12-21三菱电机株式会社It watches candidate determining device quietly, watch candidate determining method quietly and watches candidate determining program quietly
US20170324769A1 (en)*2016-05-042017-11-09Vasona Networks Inc.Simulating unauthorized use of a cellular communication network
US9948672B2 (en)*2016-05-042018-04-17Vasona Networks Inc.Simulating unauthorized use of a cellular communication network
US9537884B1 (en)*2016-06-012017-01-03Cyberpoint International LlcAssessment of cyber threats
US20180159868A1 (en)*2016-12-052018-06-07Institute For Information IndustryNetwork attack pattern determination apparatus, determination method, and non-transitory computer readable storage medium thereof
US10742668B2 (en)*2016-12-052020-08-11Institute For Information IndustryNetwork attack pattern determination apparatus, determination method, and non-transitory computer readable storage medium thereof
US10374934B2 (en)*2016-12-162019-08-06Seetharaman K GudeteeMethod and program product for a private performance network with geographical load simulation
US10225276B2 (en)2017-01-312019-03-05Scythe Inc.Endpoint vulnerability analysis platform
US11075815B2 (en)*2017-03-312021-07-27Nec CorporationNetwork building apparatus, network building method, non-transitory computer readable medium storing program
US20230168916A1 (en)*2017-11-302023-06-01Bernardo StarostaMethod and System for Interactive Cyber Simulation Exercises
US10990432B1 (en)*2017-11-302021-04-27Ila CorporationMethod and system for interactive cyber simulation exercises
US11503064B1 (en)2018-06-192022-11-15Architecture Technology CorporationAlert systems and methods for attack-related events
US11645388B1 (en)2018-06-192023-05-09Architecture Technology CorporationSystems and methods for detecting non-malicious faults when processing source codes
US11997129B1 (en)2018-06-192024-05-28Architecture Technology CorporationAttack-related events and alerts
US20210042145A1 (en)*2018-11-292021-02-11Bernardo StarostaMethod and System for Interactive Cyber Simulation Exercises
US11429713B1 (en)2019-01-242022-08-30Architecture Technology CorporationArtificial intelligence modeling for cyber-attack simulation protocols
US12032681B1 (en)2019-01-242024-07-09Architecture Technology CorporationSystem for cyber-attack simulation using artificial intelligence modeling
US11722515B1 (en)2019-02-042023-08-08Architecture Technology CorporationImplementing hierarchical cybersecurity systems and methods
US11887505B1 (en)2019-04-242024-01-30Architecture Technology CorporationSystem for deploying and monitoring network-based training exercises
US12019756B1 (en)2019-06-272024-06-25Architecture Technology CorporationAutomated cyber evaluation system
US11403405B1 (en)2019-06-272022-08-02Architecture Technology CorporationPortable vulnerability identification tool for embedded non-IP devices
US11488493B2 (en)*2019-09-122022-11-01EC-Council International LimitedMulti-dimensional cybersecurity skills assessment method and system
US12120146B1 (en)2019-10-232024-10-15Architecture Technology CorporationSystems and methods for applying attack tree models and physics-based models for detecting cyber-physical threats
US11444974B1 (en)2019-10-232022-09-13Architecture Technology CorporationSystems and methods for cyber-physical threat modeling
US11503075B1 (en)2020-01-142022-11-15Architecture Technology CorporationSystems and methods for continuous compliance of nodes
WO2022225565A1 (en)*2021-04-192022-10-27Rakuten Mobile, Inc.Performance testing of a test application in a network-as-a-service environment
US20220337493A1 (en)*2021-04-192022-10-20Rakuten Mobile, IncReport generation from testing a test application in a network-as-a-service
US11652725B2 (en)*2021-04-192023-05-16Rakuten Mobile, Inc.Performance testing of a test application in a network-as-a-service environment
FR3131406A1 (en)*2021-12-242023-06-30Airbus Cybersecurity Sas Method for automatic evaluation of cybersecurity training and associated system
EP4202744A1 (en)*2021-12-242023-06-28Airbus Cybersecurity SasMethod for automatically evaluating training in cybersecurity and system therefor

Also Published As

Publication numberPublication date
WO2009155469A2 (en)2009-12-23
US20090319906A1 (en)2009-12-24
EP2307956A2 (en)2011-04-13
US20090319249A1 (en)2009-12-24
CA2728303A1 (en)2009-12-23
US8532970B2 (en)2013-09-10
US20090319647A1 (en)2009-12-24
US20090319248A1 (en)2009-12-24
US20090320137A1 (en)2009-12-24
WO2009155469A3 (en)2010-05-06
US20150051893A1 (en)2015-02-19
US9246768B2 (en)2016-01-26
US10313203B2 (en)2019-06-04
US8751629B2 (en)2014-06-10
EP2307956A4 (en)2012-12-19
US20140046644A1 (en)2014-02-13

Similar Documents

PublicationPublication DateTitle
US8751629B2 (en)Systems and methods for automated building of a simulated network environment
US20140046645A1 (en)Systems and methods for network monitoring and analysis of a simulated network
US10872539B1 (en)Real-time monitoring of network-based training exercises
Cappos et al.Seattle: a platform for educational cloud computing
US8406682B2 (en)Virtual laboratory smart agent
Willems et al.Online assessment for hands-on cyber security training in a virtual lab
Pizzonia et al.Netkit: network emulation for education
US20150269856A1 (en)Virtual classroom management system and interface
Thompson et al.Individualizing cybersecurity lab exercises with labtainers
Lieskovan et al.Building open source cyber range to teach cyber security
Huff et al.Cyber arena: an open-source solution for scalable cybersecurity labs in the cloud
Moritz et al.Enhancing a virtual security lab with a private cloud framework
Willems et al.Tele-Lab IT-Security: an Architecture for an online virtual IT Security Lab.
Guerrero et al.Tectonic: An Academic Cyber Range
Wei et al.A laboratory for hands-on cyber threat hunting education
SantosEnvironment for Practical Evaluations in Network Administration
KITAMURA et al.Development of Server System Construction Training System
Perry et al.VCP VMware Certified Professional on vSphere 4 Review Guide:(Exam VCP-410)
GoesAutomating the creation of virtual educational environments to enhance cybersecurity and information technology education
SequeiraAWS Certified SysOps Administrator-Associate (SOA-C01) Cert Guide
Blum et al.CompTIA Linux+ Study Guide: Exam XK0-005
BertelliProgettazione e sviluppo di un framework basato su microservizi per la creazione e il funzionamento di un cyber range
Sierszen et al.Environment for (E-) learning of wide campus/corporate network configuration and maintenance
Baca et al.VCAP5-DCA Official Cert Guide: VMware Certified Advanced Professional 5-Data Center Administration
Perry et al.VCP VMware certified professional on vSphere 4 study guide: exam VCP-410

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:EADS NA DEFENSE SECURITY AND SYSTEMS SOLUTIONS, IN

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:RATCLIFFE, CHESTER RANDOLPH, III;WHITE, CHRISTOPHER DYSON;HARWELL, STEPHANIE DIANNE;AND OTHERS;REEL/FRAME:023001/0579

Effective date:20090629

ASAssignment

Owner name:CAMBER DEFENSE SECURITY AND SYSTEMS SOLUTIONS, INC

Free format text:CHANGE OF NAME;ASSIGNOR:EADS NA DEFENSE SECURITY AND SYSTEMS SOLUTIONS, INC.;REEL/FRAME:026616/0991

Effective date:20110513

ASAssignment

Owner name:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK

Free format text:PATENT SECURITY AGREEMENT;ASSIGNOR:CAMBER DEFENSE SECURITY AND SYSTEMS SOLUTIONS, INC.;REEL/FRAME:026645/0426

Effective date:20110722

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:CAMBER DEFENSE SECURITY AND SYSTEMS SOLUTIONS, INC

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:037910/0084

Effective date:20160307


[8]ページ先頭

©2009-2025 Movatter.jp