FR3106914B1 - Method for monitoring data exchanged on a network and intrusion detection device - Google Patents

Method for monitoring data exchanged on a network and intrusion detection device Download PDF

Info

Publication number
FR3106914B1
FR3106914B1 FR2000991A FR2000991A FR3106914B1 FR 3106914 B1 FR3106914 B1 FR 3106914B1 FR 2000991 A FR2000991 A FR 2000991A FR 2000991 A FR2000991 A FR 2000991A FR 3106914 B1 FR3106914 B1 FR 3106914B1
Authority
FR
France
Prior art keywords
technique
network
detection device
monitoring data
intrusion detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
FR2000991A
Other languages
French (fr)
Other versions
FR3106914A1 (en
Inventor
Hichem Sedjelmaci
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Orange SA
Original Assignee
Orange SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Orange SA filed Critical Orange SA
Priority to FR2000991A priority Critical patent/FR3106914B1/en
Priority to PCT/FR2021/050157 priority patent/WO2021152262A1/en
Publication of FR3106914A1 publication Critical patent/FR3106914A1/en
Application granted granted Critical
Publication of FR3106914B1 publication Critical patent/FR3106914B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/088Non-supervised learning, e.g. competitive learning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • General Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Biophysics (AREA)
  • Biomedical Technology (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Molecular Biology (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Telephonic Communication Services (AREA)
  • Testing And Monitoring For Control Systems (AREA)

Abstract

Procédé de surveillance de données échangées sur un réseau et dispositif de détection d’intrusions Le procédé comprend, pour au moins un sous-ensemble de données : une première étape d’application (E20) audit sous-ensemble d’une première technique (G) de détection d’intrusions ;si une anomalie est détectée (E30) : une deuxième étape d’application (E60) d’une deuxième technique (D) de détection d’intrusions audit sous-ensemble ;une troisième étape d’application (E80) d’une troisième technique (LF) de détection d’intrusions audit sous-ensemble, utilisant des résultats des première et deuxième étapes d’application ;une étape d’utilisation (E100) d’un résultat de la troisième étape d’application pour un apprentissage de la deuxième technique ; une étape d’utilisation (E130) d’un résultat d’une application (E110) audit sous-ensemble de la deuxième technique après apprentissage pour un apprentissage de la première technique. Figure 3Method for monitoring data exchanged on a network and intrusion detection device The method comprises, for at least one subset of data: a first step of applying (E20) to said subset a first technique (G ) for detecting intrusions; if an anomaly is detected (E30): a second step for applying (E60) a second technique (D) for detecting intrusions to said sub-assembly; a third step for applying ( E80) of a third technique (LF) for detecting intrusions to said subset, using results from the first and second application steps;a step of using (E100) a result from the third application step application for learning the second technique; a step of using (E130) a result of an application (E110) to said subset of the second technique after learning for learning the first technique. Figure 3

FR2000991A 2020-01-31 2020-01-31 Method for monitoring data exchanged on a network and intrusion detection device Active FR3106914B1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
FR2000991A FR3106914B1 (en) 2020-01-31 2020-01-31 Method for monitoring data exchanged on a network and intrusion detection device
PCT/FR2021/050157 WO2021152262A1 (en) 2020-01-31 2021-01-28 Method for monitoring data exchanged on a network and device for detecting intrusions

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR2000991 2020-01-31
FR2000991A FR3106914B1 (en) 2020-01-31 2020-01-31 Method for monitoring data exchanged on a network and intrusion detection device

Publications (2)

Publication Number Publication Date
FR3106914A1 FR3106914A1 (en) 2021-08-06
FR3106914B1 true FR3106914B1 (en) 2022-10-28

Family

ID=71111512

Family Applications (1)

Application Number Title Priority Date Filing Date
FR2000991A Active FR3106914B1 (en) 2020-01-31 2020-01-31 Method for monitoring data exchanged on a network and intrusion detection device

Country Status (2)

Country Link
FR (1) FR3106914B1 (en)
WO (1) WO2021152262A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11770713B2 (en) * 2020-07-06 2023-09-26 T-Mobile Usa, Inc. Distributed security system for vulnerability-risk-threat (VRT) detection
US11800361B2 (en) 2020-07-06 2023-10-24 T-Mobile Usa, Inc. Security system with 5G network traffic incubation
US11516670B2 (en) 2020-07-06 2022-11-29 T-Mobile Usa, Inc. Security system for vulnerability-risk-threat (VRT) detection
US11622273B2 (en) 2020-07-06 2023-04-04 T-Mobile Usa, Inc. Security system for directing 5G network traffic
US11743729B2 (en) 2020-07-06 2023-08-29 T-Mobile Usa, Inc. Security system for managing 5G network traffic

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3732844A1 (en) * 2017-12-29 2020-11-04 Nokia Solutions and Networks Oy Intelligent defense and filtration platform for network traffic

Also Published As

Publication number Publication date
FR3106914A1 (en) 2021-08-06
WO2021152262A1 (en) 2021-08-05

Similar Documents

Publication Publication Date Title
FR3106914B1 (en) Method for monitoring data exchanged on a network and intrusion detection device
CN106961419B (en) WebShell detection method, device and system
CN107251037B (en) Blacklist generation device, blacklist generation system, blacklist generation method, and recording medium
US20140337974A1 (en) System and method for semantic integration of heterogeneous data sources for context aware intrusion detection
US20190253441A1 (en) Detecting cyber-attacks with sonification
US20110261710A1 (en) Analysis apparatus and method for abnormal network traffic
CN106534146A (en) Safety monitoring system and method
Goli et al. Network traffic classification techniques-a review
EP3343421A1 (en) System to detect machine-initiated events in time series data
Fallah et al. Android malware detection using network traffic based on sequential deep learning models
JP2015222471A (en) Malicious communication pattern detecting device, malicious communication pattern detecting method, and malicious communication pattern detecting program
CN111988305A (en) Data node abnormal behavior detection method and server applied to Internet of things
Pichan et al. A logging model for enabling digital forensics in iot, in an inter-connected iot, cloud eco-systems
CN105656730A (en) Network application quick discovery method and system based on TCP data packet
CN111400707A (en) File macro virus detection method, device, equipment and storage medium
Kolpe et al. Botnet detection using Bayes classifier
CN113225331A (en) Method, system and device for detecting host intrusion safety based on graph neural network
Shirani et al. A method for intrusion detection in web services based on time series
CN101296224B (en) P2P flux recognition system and method
JP2019185223A (en) Information processor and information processing method
KR20210059991A (en) METHOD FOR IoT ANALYZING MALICIOUS BEHAVIOR AND COMPUTING DEVICE FOR EXECUTING THE METHOD
Daihes et al. MORTON: detection of malicious routines in large-scale DNS traffic
CN111627462B (en) Semantic analysis-based emotion recognition method and device
TWI667587B (en) Information security protection method
CN113779564A (en) Security event prediction method and device

Legal Events

Date Code Title Description
PLFP Fee payment

Year of fee payment: 2

PLSC Publication of the preliminary search report

Effective date: 20210806

PLFP Fee payment

Year of fee payment: 3

PLFP Fee payment

Year of fee payment: 4

PLFP Fee payment

Year of fee payment: 5