CA2916203C - Detecteurs heterogenes destines a la defense de reseaux - Google Patents
Detecteurs heterogenes destines a la defense de reseaux Download PDFInfo
- Publication number
- CA2916203C CA2916203C CA2916203A CA2916203A CA2916203C CA 2916203 C CA2916203 C CA 2916203C CA 2916203 A CA2916203 A CA 2916203A CA 2916203 A CA2916203 A CA 2916203A CA 2916203 C CA2916203 C CA 2916203C
- Authority
- CA
- Canada
- Prior art keywords
- samples
- normal
- based sensor
- malicious
- network traffic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2014/056164 WO2016043739A1 (fr) | 2014-09-17 | 2014-09-17 | Capteurs hétérogènes pour défense de réseau |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2916203A1 CA2916203A1 (fr) | 2016-03-17 |
CA2916203C true CA2916203C (fr) | 2018-02-20 |
Family
ID=55533623
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2916203A Active CA2916203C (fr) | 2014-09-17 | 2014-09-17 | Detecteurs heterogenes destines a la defense de reseaux |
Country Status (3)
Country | Link |
---|---|
CA (1) | CA2916203C (fr) |
MX (1) | MX362750B (fr) |
WO (1) | WO2016043739A1 (fr) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11070581B1 (en) | 2017-08-24 | 2021-07-20 | Wells Fargo Bank, N.A. | Eliminating network security blind spots |
CN109600180B (zh) * | 2018-12-17 | 2020-01-03 | 电子科技大学 | 一种基于频谱信息的无线通信智能流量感知系统 |
CN110753064B (zh) * | 2019-10-28 | 2021-05-07 | 中国科学技术大学 | 机器学习和规则匹配融合的安全检测系统 |
CN112511593A (zh) * | 2020-11-03 | 2021-03-16 | 浙江大学 | 拟态waf中的流量分发方法 |
CN113973008B (zh) * | 2021-09-28 | 2023-06-02 | 佳源科技股份有限公司 | 基于拟态技术和机器学习的检测系统、方法、设备及介质 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7600258B2 (en) * | 2005-07-01 | 2009-10-06 | Symantec Corporation | Methods and systems for detecting and preventing the spread of malware on instant messaging (IM) networks by using fictitious buddies |
US8489689B1 (en) * | 2006-05-31 | 2013-07-16 | Proofpoint, Inc. | Apparatus and method for obfuscation detection within a spam filtering model |
US8571696B2 (en) * | 2009-06-10 | 2013-10-29 | Fisher-Rosemount Systems, Inc. | Methods and apparatus to predict process quality in a process control system |
WO2013172780A2 (fr) * | 2012-05-16 | 2013-11-21 | Unomaly Ab | Procédé, appareil et programme informatique pour analyser des événements dans un système informatique |
-
2014
- 2014-09-17 MX MX2016002727A patent/MX362750B/es active IP Right Grant
- 2014-09-17 CA CA2916203A patent/CA2916203C/fr active Active
- 2014-09-17 WO PCT/US2014/056164 patent/WO2016043739A1/fr active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2016043739A1 (fr) | 2016-03-24 |
MX2016002727A (es) | 2016-10-06 |
MX362750B (es) | 2019-02-07 |
CA2916203A1 (fr) | 2016-03-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8887285B2 (en) | Heterogeneous sensors for network defense | |
CA2916203C (fr) | Detecteurs heterogenes destines a la defense de reseaux | |
Vukalović et al. | Advanced persistent threats-detection and defense | |
US9641545B2 (en) | Methods, systems, and computer program products for detecting communication anomalies in a network based on overlap between sets of users communicating with entities in the network | |
Vance | Flow based analysis of Advanced Persistent Threats detecting targeted attacks in cloud computing | |
Pecchia et al. | Identifying compromised users in shared computing infrastructures: A data-driven bayesian network approach | |
CN116781430B (zh) | 用于燃气管网的网络信息安全系统及其方法 | |
US20220224724A1 (en) | Artificial intelligence based analyst as an evaluator | |
Wilkens et al. | Multi-stage attack detection via kill chain state machines | |
Abdullayev et al. | SQL Injection Attack: Quick View | |
Goel et al. | Anomaly based intrusion detection model using supervised machine learning techniques | |
Pandey et al. | A lifecycle based approach for malware analysis | |
CN113660222A (zh) | 基于强制访问控制的态势感知防御方法及系统 | |
Pastrana et al. | Randomized anagram revisited | |
Rowe et al. | Challenges in monitoring cyberarms compliance | |
Barabas et al. | Behavioral signature generation using shadow honeypot | |
Liu et al. | An entropy-based method for attack detection in large scale network | |
Quader et al. | Persistent threat pattern discovery | |
Alshammari et al. | Deception for cyber adversaries: status, challenges, and perspectives | |
Barbu et al. | Intruder monitoring system for local networks using Python | |
Alalloush et al. | API Malware Analysis: Exploring Detection And Forensics Strategies For Secure Software Development | |
Schaffhauser et al. | Efficient detection and recovery of malicious PowerShell scripts embedded into digital images | |
Zhai et al. | Network intrusion early warning model based on DS evidence theory | |
CN112637217B (zh) | 基于诱饵生成的云计算系统的主动防御方法及装置 | |
Mejia-Ricart | Data-Driven Adversarial Behavior Models for Cybersecurity |