CA2916203C - Detecteurs heterogenes destines a la defense de reseaux - Google Patents

Detecteurs heterogenes destines a la defense de reseaux Download PDF

Info

Publication number
CA2916203C
CA2916203C CA2916203A CA2916203A CA2916203C CA 2916203 C CA2916203 C CA 2916203C CA 2916203 A CA2916203 A CA 2916203A CA 2916203 A CA2916203 A CA 2916203A CA 2916203 C CA2916203 C CA 2916203C
Authority
CA
Canada
Prior art keywords
samples
normal
based sensor
malicious
network traffic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CA2916203A
Other languages
English (en)
Other versions
CA2916203A1 (fr
Inventor
Eamon Hirata Jordan
Evan Joseph Kelly
Kevin Barry Jordan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
RESURGO LLC
Original Assignee
RESURGO LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by RESURGO LLC filed Critical RESURGO LLC
Publication of CA2916203A1 publication Critical patent/CA2916203A1/fr
Application granted granted Critical
Publication of CA2916203C publication Critical patent/CA2916203C/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
CA2916203A 2014-09-17 2014-09-17 Detecteurs heterogenes destines a la defense de reseaux Active CA2916203C (fr)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2014/056164 WO2016043739A1 (fr) 2014-09-17 2014-09-17 Capteurs hétérogènes pour défense de réseau

Publications (2)

Publication Number Publication Date
CA2916203A1 CA2916203A1 (fr) 2016-03-17
CA2916203C true CA2916203C (fr) 2018-02-20

Family

ID=55533623

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2916203A Active CA2916203C (fr) 2014-09-17 2014-09-17 Detecteurs heterogenes destines a la defense de reseaux

Country Status (3)

Country Link
CA (1) CA2916203C (fr)
MX (1) MX362750B (fr)
WO (1) WO2016043739A1 (fr)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11070581B1 (en) 2017-08-24 2021-07-20 Wells Fargo Bank, N.A. Eliminating network security blind spots
CN109600180B (zh) * 2018-12-17 2020-01-03 电子科技大学 一种基于频谱信息的无线通信智能流量感知系统
CN110753064B (zh) * 2019-10-28 2021-05-07 中国科学技术大学 机器学习和规则匹配融合的安全检测系统
CN112511593A (zh) * 2020-11-03 2021-03-16 浙江大学 拟态waf中的流量分发方法
CN113973008B (zh) * 2021-09-28 2023-06-02 佳源科技股份有限公司 基于拟态技术和机器学习的检测系统、方法、设备及介质

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7600258B2 (en) * 2005-07-01 2009-10-06 Symantec Corporation Methods and systems for detecting and preventing the spread of malware on instant messaging (IM) networks by using fictitious buddies
US8489689B1 (en) * 2006-05-31 2013-07-16 Proofpoint, Inc. Apparatus and method for obfuscation detection within a spam filtering model
US8571696B2 (en) * 2009-06-10 2013-10-29 Fisher-Rosemount Systems, Inc. Methods and apparatus to predict process quality in a process control system
WO2013172780A2 (fr) * 2012-05-16 2013-11-21 Unomaly Ab Procédé, appareil et programme informatique pour analyser des événements dans un système informatique

Also Published As

Publication number Publication date
WO2016043739A1 (fr) 2016-03-24
MX2016002727A (es) 2016-10-06
MX362750B (es) 2019-02-07
CA2916203A1 (fr) 2016-03-17

Similar Documents

Publication Publication Date Title
US8887285B2 (en) Heterogeneous sensors for network defense
CA2916203C (fr) Detecteurs heterogenes destines a la defense de reseaux
Vukalović et al. Advanced persistent threats-detection and defense
US9641545B2 (en) Methods, systems, and computer program products for detecting communication anomalies in a network based on overlap between sets of users communicating with entities in the network
Vance Flow based analysis of Advanced Persistent Threats detecting targeted attacks in cloud computing
Pecchia et al. Identifying compromised users in shared computing infrastructures: A data-driven bayesian network approach
CN116781430B (zh) 用于燃气管网的网络信息安全系统及其方法
US20220224724A1 (en) Artificial intelligence based analyst as an evaluator
Wilkens et al. Multi-stage attack detection via kill chain state machines
Abdullayev et al. SQL Injection Attack: Quick View
Goel et al. Anomaly based intrusion detection model using supervised machine learning techniques
Pandey et al. A lifecycle based approach for malware analysis
CN113660222A (zh) 基于强制访问控制的态势感知防御方法及系统
Pastrana et al. Randomized anagram revisited
Rowe et al. Challenges in monitoring cyberarms compliance
Barabas et al. Behavioral signature generation using shadow honeypot
Liu et al. An entropy-based method for attack detection in large scale network
Quader et al. Persistent threat pattern discovery
Alshammari et al. Deception for cyber adversaries: status, challenges, and perspectives
Barbu et al. Intruder monitoring system for local networks using Python
Alalloush et al. API Malware Analysis: Exploring Detection And Forensics Strategies For Secure Software Development
Schaffhauser et al. Efficient detection and recovery of malicious PowerShell scripts embedded into digital images
Zhai et al. Network intrusion early warning model based on DS evidence theory
CN112637217B (zh) 基于诱饵生成的云计算系统的主动防御方法及装置
Mejia-Ricart Data-Driven Adversarial Behavior Models for Cybersecurity