US 12,407,710 B2
Method for generating attack graphs based on Markov chains
Stephen Lincoln, San Diego, CA (US); Rajesh Sharma, San Diego, CA (US); Jeremy Miller, San Diego, CA (US); Stephan Chenette, San Diego, CA (US); and Albert Lopez, San Diego, CA (US)
Assigned to AttackIQ, Inc., San Diego, CA (US)
Filed by AttackIQ, Inc., San Diego, CA (US)
Filed on Aug. 10, 2023, as Appl. No. 18/232,700.
Claims priority of provisional application 63/396,867, filed on Aug. 10, 2022.
Prior Publication US 2024/0056470 A1, Feb. 15, 2024
Int. Cl. H04L 9/40 (2022.01); G06N 7/01 (2023.01)
CPC H04L 63/1433 (2013.01) [G06N 7/01 (2023.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
during a first time period:
accessing a set of historical data representing permutations of techniques, in a set of techniques, implemented in attacks on a second computer network occurring prior to the first time period;
generating a transition probability container defining a set of transition probabilities based on the set of historical data, the set of transition probabilities comprising a first transition probability representing a first probability of transitioning from a first technique, in the set of techniques, to a second technique in the set of techniques;
defining a set of emission probability containers corresponding to the set of techniques, the set of emission probability containers comprising a first emission probability container representing:
a second probability of detecting the second technique; and
a third probability of preventing the second technique;
defining an initial technique container representing an initial probability distribution of techniques in the set of techniques; and
generating a model correlating a target sequence of observations with a hidden state sequence of techniques based on the transition probability container, the set of emission probability containers, and the initial technique container; and
during a second time period succeeding the first time period:
calculating a sequence of techniques in the set of techniques based on the model, the sequence of techniques exhibiting greatest probability to yield, for each technique in the sequence of techniques:
absence of detection of the technique; and
absence of prevention of the technique;
generating an attack graph comprising a set of nodes linked according to the sequence of techniques, each node in the set of nodes:
corresponding to a technique in the sequence of techniques; and
storing a behavior executable by a target asset on a target network to emulate the technique; and
scheduling the target asset on the target network to selectively execute behaviors stored in the set of nodes in the attack graph during a third time period succeeding the second time period.