US 11,783,048 B2
Security assessment system
Masaki Inokuchi, Tokyo (JP); Yoshinobu Ohta, Tokyo (JP); Ron Bitton, Yehud (IL); Orly Stan, Ashdod (IL); Tomer Gluck, Ra'anana (IL); Asaf Shabtai, Hulda (IL); and Yuval Elovici, Arugot (IL)
Assigned to NEC CORPORATION, Tokyo (JP); and B. G. Negev Technologies and Applications Ltd., at Ben-Gurion University, Beer-Sheva (IL)
Appl. No. 16/980,269
Filed by NEC CORPORATION, Tokyo (JP); and B. G. Negev Technologies and Applications Ltd., at Ben-Gurion University, Beer-Sheva (IL)
PCT Filed Mar. 14, 2018, PCT No. PCT/JP2018/010017
§ 371(c)(1), (2) Date Sep. 11, 2020,
PCT Pub. No. WO2019/176022, PCT Pub. Date Sep. 19, 2019.
Prior Publication US 2021/0042423 A1, Feb. 11, 2021
Int. Cl. G06F 21/57 (2013.01)
CPC G06F 21/577 (2013.01) [G06F 2221/034 (2013.01)] 9 Claims
OG exemplary drawing
 
1. A security assessment system configured to provide a duplicated environment which duplicates an assessment target system comprising a plurality of physical components, the security assessment system comprising:
a duplicated environment design circuitry configured to select a duplication level for each physical component based on constraints specified by a user and a duplicated priority associated with the physical components in order to design the duplicated environment to produce a designed result indicative of duplicated environment design, the duplication level being indicative of any one of a simulation sub-module, an emulation sub-module, and a physical sub-module which are for reproducing the physical components of the assessment target system; and
a duplicated environment construction circuitry configured to construct the duplicated environment based on the designed result, the duplicated environment comprises components which are duplicated by one of duplication levels,
wherein the constraints comprise at least one selected from the group consisting of budget and time, and
wherein the duplicated environment design circuitry is configured to select the duplication level for each physical component that satisfies a condition that required cost doesn't exceed the budget or required time doesn't exceed the time based on the duplicated priority of each physical component that is determined based on at least one selected from the group consisting of importance of each physical component, potential to refine a security diagnosis, and difficulties to model each physical component.