DE602006017668D1 - Erkennung von netzwerkangriffen - Google Patents

Erkennung von netzwerkangriffen

Info

Publication number
DE602006017668D1
DE602006017668D1 DE602006017668T DE602006017668T DE602006017668D1 DE 602006017668 D1 DE602006017668 D1 DE 602006017668D1 DE 602006017668 T DE602006017668 T DE 602006017668T DE 602006017668 T DE602006017668 T DE 602006017668T DE 602006017668 D1 DE602006017668 D1 DE 602006017668D1
Authority
DE
Germany
Prior art keywords
router
detection
user system
originating user
network attacks
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE602006017668T
Other languages
German (de)
English (en)
Inventor
Ruediger Rissmann
Yann Duponchel
Diego M Zamboni
James F Riordan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of DE602006017668D1 publication Critical patent/DE602006017668D1/de
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)
DE602006017668T 2005-03-24 2006-02-21 Erkennung von netzwerkangriffen Expired - Lifetime DE602006017668D1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP05006462 2005-03-24
PCT/IB2006/050554 WO2006100613A1 (en) 2005-03-24 2006-02-21 Network attack detection

Publications (1)

Publication Number Publication Date
DE602006017668D1 true DE602006017668D1 (de) 2010-12-02

Family

ID=36716621

Family Applications (1)

Application Number Title Priority Date Filing Date
DE602006017668T Expired - Lifetime DE602006017668D1 (de) 2005-03-24 2006-02-21 Erkennung von netzwerkangriffen

Country Status (9)

Country Link
US (1) US20120096548A1 (https=)
EP (1) EP1866725B1 (https=)
JP (1) JP4753264B2 (https=)
KR (1) KR101090815B1 (https=)
CN (1) CN100561492C (https=)
AT (1) ATE485552T1 (https=)
CA (1) CA2600517A1 (https=)
DE (1) DE602006017668D1 (https=)
WO (1) WO2006100613A1 (https=)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5476578B2 (ja) * 2009-01-06 2014-04-23 独立行政法人情報通信研究機構 ネットワーク監視システム及びその方法
CN101719906B (zh) * 2009-11-10 2012-05-30 电子科技大学 一种基于蠕虫传播行为的蠕虫检测方法
US10432587B2 (en) 2012-02-21 2019-10-01 Aventail Llc VPN deep packet inspection
WO2023233582A1 (ja) * 2022-06-01 2023-12-07 日本電信電話株式会社 攻撃検知装置、攻撃検知システム、攻撃検知方法および攻撃検知プログラム

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3618245B2 (ja) * 1999-03-09 2005-02-09 株式会社日立製作所 ネットワーク監視システム
ATE322790T1 (de) 2002-01-18 2006-04-15 Stonesoft Corp Ueberwachung des datenflusses zur verbesserung des netzwerksicherheitsschutzes
WO2004008700A2 (en) * 2002-07-12 2004-01-22 The Penn State Research Foundation Real-time packet traceback and associated packet marking strategies
JP3794491B2 (ja) * 2002-08-20 2006-07-05 日本電気株式会社 攻撃防御システムおよび攻撃防御方法
JP2004241831A (ja) * 2003-02-03 2004-08-26 Rbec Corp ネットワーク管理システム
CN1450758A (zh) * 2003-05-16 2003-10-22 上海金诺网络安全技术发展股份有限公司 高性能网络入侵检测系统和检测方法
AU2003280126A1 (en) 2003-05-30 2005-01-21 International Business Machines Corporation Detecting network attacks
JP3828523B2 (ja) * 2003-07-16 2006-10-04 株式会社東芝 不正アクセス防御装置及びプログラム
JP2005051588A (ja) * 2003-07-30 2005-02-24 Matsushita Electric Ind Co Ltd 自動フィルタリング方法、および機器
AU2003279517A1 (en) 2003-08-11 2005-02-25 Telecom Italia S.P.A. Method and system for detecting unauthorised use of a communication network
US7992204B2 (en) * 2004-05-02 2011-08-02 Markmonitor, Inc. Enhanced responses to online fraud
CN1322712C (zh) * 2004-05-28 2007-06-20 南京邮电学院 一种实现诱骗网络数据流重定向的方法
US7748040B2 (en) * 2004-07-12 2010-06-29 Architecture Technology Corporation Attack correlation using marked information
JP4680931B2 (ja) * 2004-10-19 2011-05-11 富士通株式会社 不正アクセスプログラム監視処理方法、不正アクセスプログラム監視プログラムおよび不正アクセスプログラム監視装置
JP4421462B2 (ja) * 2004-12-06 2010-02-24 三菱電機株式会社 不正侵入検知システムおよび管理装置

Also Published As

Publication number Publication date
EP1866725B1 (en) 2010-10-20
KR101090815B1 (ko) 2011-12-08
CA2600517A1 (en) 2006-09-28
WO2006100613A1 (en) 2006-09-28
KR20070114155A (ko) 2007-11-29
JP4753264B2 (ja) 2011-08-24
EP1866725A1 (en) 2007-12-19
ATE485552T1 (de) 2010-11-15
US20120096548A1 (en) 2012-04-19
JP2008535304A (ja) 2008-08-28
CN100561492C (zh) 2009-11-18
CN101147153A (zh) 2008-03-19

Similar Documents

Publication Publication Date Title
WO2006091944A3 (en) Location-based enhancements for wireless intrusion detection
DE602006012479D1 (de) System und verfahren zur erkennung von eindringungen in ein computernetzwerk
DE602004021043D1 (de) Verfahren und system zur erkennung von attacken in drahtlosen datenkommunikationsnetzen
ATE533257T1 (de) Nachrichtenverwaltung und unterdrückung in einem überwachungssystem
IL194416A (en) Mobile network security method and system.
WO2008012792A3 (en) A method and system for detection of nat devices in a network
DE60138470D1 (de) Überwachung der netzwerkaktivität
BR0317286A (pt) Sistema de gerenciamento de conteúdo
WO2007050244A3 (en) Method and system for detecting and responding to attacking networks
WO2006019701A3 (en) Inline intrusion detection using a single physical port
MX2009000009A (es) Metodo y sistema para discriminacion de ruta de red.
WO2004088477A3 (en) Apparatus and method for network vulnerability detection and compliance assessment
ATE538573T1 (de) Verfahren, systeme und einrichtungen zum herstellen einer registrationslosen datenkommunikationsverbindung zwischen elektronischen geräten
ATE523023T1 (de) Verfahren, kommunikationssystem und vorrichtung für arp paketverarbeitung
ATE369691T1 (de) Intelligente integrierte netzwerksicherheitseinrichtung
WO2007022364A3 (en) Change audit method, apparatus and system
DE60336573D1 (de) Intelligenter netzwerkadressenübersetzer und verfahren zur netzwerkadressenübersetzung
WO2007026263A3 (en) Routing configuration validation apparatus and methods
WO2010014999A8 (en) Systems. methods, and computer readable media for triggerless mobile location-based routing/screening
WO2010045646A3 (en) Methods, systems, and computer readable media for detection of an unautorized service message in a network
DE602005001046D1 (de) Erkennung von unerwünschten Nachrichten (SPAM) auf Basis des Nachrichteninhalts
ATE556513T1 (de) Verfahren zur erkennung von transportlecks in hybridschaltungsnetzwerken
ATE535110T1 (de) Multimode-mobilgerät, anrufstatistiken-server, entsprechende verfahren und system zum sammeln von anrufstatistiken für das multimode-mobilgerät
ATE456227T1 (de) Verfahren und vorrichtung zum nachweis von weiterleitungsschleifen
ATE530004T1 (de) Mechanismus zur erkennung von bridge-port-mac- adressen in ethernet-netzwerken

Legal Events

Date Code Title Description
8320 Willingness to grant licences declared (paragraph 23)