US 12,231,461 B2
Prioritizing security controls using a cyber digital twin simulator
Gal Engelberg, Pardes-hana (IL); Dan Klein, Rosh Ha'ayin (IL); Alexander Basovskiy, Hod Ha'sharon (IL); and Nimrod Busany, Tel Aviv (IL)
Assigned to Accenture Global Solutions Limited, Dublin (IE)
Filed by Accenture Global Solutions Limited, Dublin (IE)
Filed on Aug. 10, 2022, as Appl. No. 17/818,784.
Claims priority of provisional application 63/232,399, filed on Aug. 12, 2021.
Prior Publication US 2023/0067128 A1, Mar. 2, 2023
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1441 (2013.01) [H04L 63/1425 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A computer-implemented method for mitigating cyber security risk of an enterprise network, the computer-implemented method comprising:
receiving an analytical attack graph (AAG) representing paths within the enterprise network with respect to at least one target asset, the AAG at least partially defining a digital twin of the enterprise network and comprising a set of rule nodes, each rule node of the set of rule nodes representing an attack tactic of a plurality of attack tactics that is used to move along a path of the AAG;
integrating the AAG with a knowledge graph (KG) comprising a set of asset nodes and a set of tactic nodes, each asset node of the set of asset nodes representing a digital asset that is affected by one or more of the plurality of attack tactics and each tactic node of the set of tactic nodes representing a tactic for attacking the digital asset of the enterprise network, wherein integrating the AAG with the KG comprises mapping each rule node of the set of rule nodes to a respective tactic node of the set of tactic nodes of the KG;
determining, based on integrating the AAG with the KG, a plurality of security controls, each security control of the plurality of security controls having an assigned priority value; and
selectively implementing one or more security controls of the plurality of security controls in the enterprise network based at least partially on the assigned priority values of the plurality of security controls.