CPC G06F 9/45558 (2013.01) [G06F 9/4881 (2013.01); G06F 16/2336 (2019.01); G06F 16/289 (2019.01); G06F 21/566 (2013.01); G06F 2009/45562 (2013.01); G06F 2009/45595 (2013.01)] | 27 Claims |
1. A computer-implemented method of automating emulations, the method comprising:
using a number of processors to perform the steps of:
collecting publicly available network data over a predefined time interval, wherein the collected network data might comprise structured and unstructured data;
converting any unstructured data in the collected network data into structured data;
storing the structured data in a database, including both structured data originally in the collected network data and structured data converted from unstructured data in the collected network data;
comparing the stored structured data to known network vulnerabilities;
creating an emulated network according to the collected network data and the comparison of the stored structured data with known vulnerabilities;
creating a number of virtual machines to run on the emulated network;
running a number of director programs on the virtual machines;
running a number of guest actor programs on the virtual machines, wherein the actor programs imitate real user behavior on the emulated network;
delivering, by the director programs, task commands to the guest actor programs to imitate real user behavior; and
presenting the imitated behavior to a user via an interface.
|