Patents by Inventor Suzanne P. Hassell

Suzanne P. Hassell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9954884
    Abstract: Embodiments of a system and method for a cyber modeling and simulation framework arc generally described herein. In some embodiments, an interface (212) for ingest of network and vulnerability data associated with a node of a targeted network, a network visualization device (232) for presenting the network data and the vulnerability data, and for creating a network model based on the network and vulnerability data, a threat analysis simulator (240) for launching threat attacks on the targeted network and for applying modeled defenses against the threat attacks, the threat analysis simulator producing simulation results (244) and a data farming module for performing data fanning on the simulation results using different scenarios to generate a farm of data for use in designing anti-cyber-attack strategies (280) for the targeted network.
    Type: Grant
    Filed: October 23, 2013
    Date of Patent: April 24, 2018
    Assignee: Raytheon Company
    Inventors: Suzanne P. Hassell, Paul F. Beraud, III, Alen Cruz, Gangadhar Ganga, Brian J. Mastropietro, Travis C. Hester, David A. Hyde, Justin W. Toennies, Stephen R. Martin, Frank Pietryka, Niraj K. Srivastava
  • Patent number: 9424064
    Abstract: A system and method of deploying a network hopping adaptor is disclosed. In some embodiments, a network hopping adaptor may be configured to manipulate network traffic so as to change at least one network characteristic of the network traffic, and at least one network interface of a machine selected from a group of machines may be configured to send the network traffic to the network hopping adaptor. The network hopping adaptor may manipulate such characteristics as an IP address, a port number, an encryption algorithm or a compression algorithm. The group of machines may be deployed as virtual machines being executed by a virtualization server, and the network hopping adaptor may be implemented on another virtual machine being executed by the virtualization server. Alternatively, or in addition, the group of machines or the network hopping adaptor may be implemented as physical machines.
    Type: Grant
    Filed: August 1, 2014
    Date of Patent: August 23, 2016
    Assignee: Raytheon BBN Technologies Corp.
    Inventors: Gangadhar Ganga, Alen Cruz, Suzanne P. Hassell, Paul F. Beraud, III, Ledford J. Meadows, III, Stephen Patrick Marra, Jeanette M. Moody, Stephen R. Martin
  • Patent number: 9367694
    Abstract: Generally discussed herein are systems, apparatuses, or processes to recognize that a cyber threat exists or predict a future track of a cyber threat in a network. According to an example, a process for recognizing a cyber threat can include (1) determining a network layout of a network based on received network layout data, (2) receiving cyber sensor data indicating actions performed on the network, (3) calculating a first score associated with the cyber sensor data indicating that a cyber threat is present in the network by comparing a cyber threat profile of the cyber threat that details actions performed by the cyber threat to actions indicated by the cyber sensor data, (4) determining whether the calculated first score is greater than a specified threshold, or (5) determining that the cyber threat is present in response to determining the calculated first score is greater than the specified threshold.
    Type: Grant
    Filed: May 16, 2014
    Date of Patent: June 14, 2016
    Assignee: Raytheon BBN Technologies Corp.
    Inventors: Christopher R. Eck, Suzanne P. Hassell, Brian J. Mastropietro, Paul F. Beraud, III
  • Publication number: 20160036691
    Abstract: A system and method of deploying a network hopping adaptor is disclosed. In some embodiments, a network hopping adaptor may be configured to manipulate network traffic so as to change at least one network characteristic of the network traffic, and at least one network interface of a machine selected from a group of machines may be configured to send the network traffic to the network hopping adaptor. The network hopping adaptor may manipulate such characteristics as an IP address, a port number, an encryption algorithm or a compression algorithm. The group of machines may be deployed as virtual machines being executed by a virtualization server, and the network hopping adaptor may be implemented on another virtual machine being executed by the virtualization server. Alternatively, or in addition, the group of machines or the network hopping adaptor may be implemented as physical machines.
    Type: Application
    Filed: August 1, 2014
    Publication date: February 4, 2016
    Applicant: Raytheon BBN Technologies Corp.
    Inventors: Gangadhar Ganga, Alen Cruz, Suzanne P. Hassell, Paul F. Beraud, III, Ledford J. Meadows, III, Stephen Patrick Marra, Jeanette M. Moody, Stephen R. Martin
  • Publication number: 20150332054
    Abstract: Generally discussed herein are systems, apparatuses, or processes to recognize that a cyber threat exists or predict a future track of a cyber threat in a network. According to an example, a process for recognizing a cyber threat can include (1) determining a network layout of a network based on received network layout data, (2) receiving cyber sensor data indicating actions performed on the network, (3) calculating a first score associated with the cyber sensor data indicating that a cyber threat is present in the network by comparing a cyber threat profile of the cyber threat that details actions performed by the cyber threat to actions indicated by the cyber sensor data, (4) determining whether the calculated first score is greater than a specified threshold, or (5) determining that the cyber threat is present in response to determining the calculated first score is greater than the specified threshold.
    Type: Application
    Filed: May 16, 2014
    Publication date: November 19, 2015
    Applicant: Raytheon BBN Technologies Corp.
    Inventors: Christopher R. Eck, Suzanne P. Hassell, Brian J. Mastropietro, Paul F. Beraud, III
  • Publication number: 20150295948
    Abstract: Embodiments of a system and method for a cyber modeling and simulation framework arc generally described herein. In some embodiments, an interface (212) for ingest of network and vulnerability data associated with a node of a targeted network, a network visualization device (232) for presenting the network data and the vulnerability data, and for creating a network model based on the network and vulnerability data, a threat analysis simulator (240) for launching threat attacks on the targeted network and for applying modeled defenses against the threat attacks, the threat analysis simulator producing simulation results (244) and a data farming module for performing data fanning on the simulation results using different scenarios to generate a farm of data for use in designing anti-cyber-attack strategies (280) for the targeted network.
    Type: Application
    Filed: October 23, 2013
    Publication date: October 15, 2015
    Inventors: Suzanne P. Hassell, Paul F. Beraud, III, Alen Cruz, Gangadhar Ganga, Brian J. Mastropietro, Travis C. Hester, David A. Hyde, Justin W. Toennies, Stephen R. Martin, Frank Pietryka, Niraj K. Srivastava
  • Publication number: 20150236752
    Abstract: Embodiments for providing a next-time-interval routing parameter to a destination node are generally described herein. In some embodiments, a hopped routing parameter is calculated at a sending node using a static routing parameter of a destination node. The hopped routing parameter and source timing are encoded. The encoded hopped routing parameter and source timing are provided in the address fields of packets.
    Type: Application
    Filed: February 20, 2014
    Publication date: August 20, 2015
    Applicant: Raytheon BBN Technologies Corp.
    Inventors: Alen Cruz, Gangadhar Ganga, Paul F. Beraud, III, Suzanne P. Hassell, Ledford J. Meadows, III
  • Patent number: 8516596
    Abstract: In certain embodiments, analyzing cyber attacks includes receiving cyber attack parameters. A cyber attack parameter describes a performance attribute of a cyber attack scenario. The cyber attack parameters comprises at least one temporal parameter describing a temporal feature of the cyber attack scenario. The following is performed for each cyber defense of one or more cyber defenses to yield one or more sets of cyber attack metrics: simulating the cyber attack operating with a cyber defense; and determining a set of cyber attack metrics describing the cyber attack operating with the cyber defense. The cyber defenses are evaluated in accordance with the sets of cyber attack metrics.
    Type: Grant
    Filed: January 25, 2011
    Date of Patent: August 20, 2013
    Assignee: Raytheon Company
    Inventors: Juan E. Sandoval, Nicholas I. Sapankevych, Armando J. Santos, Suzanne P. Hassell
  • Patent number: 8413115
    Abstract: In accordance with certain embodiments of the present disclosure, specifying integration points of a system-of-systems includes identifying an integration point that associates interfaces of system components. The integration point is characterized according to the identification to generate a set of attributes describing the interfaces. The integration point is specified according to the set of attributes.
    Type: Grant
    Filed: August 27, 2009
    Date of Patent: April 2, 2013
    Assignee: Raytheon Company
    Inventors: Jason M. Surprise, Kristina L. Stewart, Stephen P. Marra, Suzanne P. Hassell
  • Publication number: 20110288904
    Abstract: In certain embodiments, an application maneuvering analysis tool accesses application characteristics information indicating one or more characteristics of an application for which a maneuver evaluation is desired. Using the accessed application characteristics information, the application maneuvering analysis tool determines a maneuverability index representing a maneuvering efficiency of the application and determines an implementation difficulty level according to the determined maneuverability index.
    Type: Application
    Filed: October 28, 2010
    Publication date: November 24, 2011
    Applicant: Raytheon Company
    Inventors: Suzanne P. Hassell, James D. Janscha, Jeffrey J. Wiley, Paul F. Beraud, III, Alen Cruz, Armando J. Santos, Juan E. Sandoval, Nicholas I. Sapankevych, Frederick E. Bass, JR.
  • Publication number: 20110185432
    Abstract: In certain embodiments, analyzing cyber attacks includes receiving cyber attack parameters. A cyber attack parameter describes a performance attribute of a cyber attack scenario. The cyber attack parameters comprises at least one temporal parameter describing a temporal feature of the cyber attack scenario. The following is performed for each cyber defense of one or more cyber defenses to yield one or more sets of cyber attack metrics: simulating the cyber attack operating with a cyber defense; and determining a set of cyber attack metrics describing the cyber attack operating with the cyber defense. The cyber defenses are evaluated in accordance with the sets of cyber attack metrics.
    Type: Application
    Filed: January 25, 2011
    Publication date: July 28, 2011
    Applicant: Raytheon Company
    Inventors: Juan E. Sandoval, Nicholas I. Sapankevych, Armando J. Santos, Suzanne P. Hassell
  • Patent number: 7310671
    Abstract: A troubleshooting portal method for providing connectivity between a first communication device and a second communication device. The second communication device resides in an access provider communication system. One embodiment comprises receiving a specification from a user by the first communication device, the specification comprising at least one predefined identifier that identifies the second communication device, and receiving a request to establish connectivity between the user and the second communication device; associating the predefined identifier with said second communication device; establishing connectivity between the first communication device and the second communication device based upon the specified predefined identifier; receiving at least troubleshooting data and a test from the user; and communicating the received troubleshooting data and the test to the second device.
    Type: Grant
    Filed: August 30, 2000
    Date of Patent: December 18, 2007
    Assignee: Paradyne Corporation
    Inventors: Suzanne P. Hassell, Jeff Davis, Charles J. Mele, Eric K. Vallone, Michael J. Cripps, Edward W. Landis, Warren M. Bartlett, Roopali S. Paranjpe