US 11,729,196 B2
Modeling cyber-physical attack paths in the internet-of-things
Gabriela F. Ciocarlie, New York, NY (US); Ioannis Agadakos, Jersey City, NJ (US); Chien-Ying Chen, Champaign, IL (US); Matteo Campanelli, Brindisi (IT); Prashant Anantharaman, Hanover, NH (US); Monowar Hasan, Champaign, IL (US); Ulf Lindqvist, San Luis Obispo, CA (US); Michael Locasto, Lebanon, NJ (US); Bogdan Copos, Palo Alto, CA (US); Tancrède Lepoint, New York, NY (US); and Matthew Filippone, Barnegat, NJ (US)
Assigned to SRI International, Menlo Park, CA (US)
Appl. No. 16/634,591
Filed by SRI International, Menlo Park, CA (US)
PCT Filed Aug. 13, 2018, PCT No. PCT/US2018/046499
§ 371(c)(1), (2) Date Jan. 28, 2020,
PCT Pub. No. WO2019/036365, PCT Pub. Date Feb. 21, 2019.
Claims priority of provisional application 62/544,774, filed on Aug. 12, 2017.
Prior Publication US 2020/0162500 A1, May 21, 2020
Int. Cl. H04L 9/00 (2022.01); H04L 9/40 (2022.01); H04L 41/14 (2022.01)
CPC H04L 63/1433 (2013.01) [H04L 41/145 (2013.01); H04L 63/1416 (2013.01)] 22 Claims
OG exemplary drawing
 
1. A method for determining a weakness or risk for devices of an Internet-of-things (IoT) network, comprising:
determining a representation of a physical environment of the IoT network and expected physical and cyber interactions between the devices of the IoT network based at least in part on operating characteristics of the devices of the IoT network;
monitoring the physical environment and actual interactions between the devices of the IoT network to generate a network model including at least one of uncharacteristic physical or cyber interaction paths between the devices of the IoT network over which physical or cyber interactions can potentially occur;
comparing the determined representation of the physical environment of the IoT network and the expected physical and cyber interactions between the devices of the IoT network and the network model to determine unexpected interaction paths between devices of the IoT network;
based on the determined unexpected interaction paths between the devices of the IoT network, determining at least one weakness or risk of at least one of the IoT network or of at least one of the devices of the IoT network; and
providing a metric of security of at least one of the IoT network or of at least one of the devices of the IoT network based on at least one of the determined weakness or risk.