FR3104776B1 - Procédé de détermination d’une réaction en réponse à une anomalie dans un réseau informatique - Google Patents
Procédé de détermination d’une réaction en réponse à une anomalie dans un réseau informatique Download PDFInfo
- Publication number
- FR3104776B1 FR3104776B1 FR1914571A FR1914571A FR3104776B1 FR 3104776 B1 FR3104776 B1 FR 3104776B1 FR 1914571 A FR1914571 A FR 1914571A FR 1914571 A FR1914571 A FR 1914571A FR 3104776 B1 FR3104776 B1 FR 3104776B1
- Authority
- FR
- France
- Prior art keywords
- anomaly
- reaction
- determining
- response
- computer network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000006243 chemical reaction Methods 0.000 title abstract 3
- 238000000034 method Methods 0.000 title abstract 2
- 238000001514 detection method Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/06—Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
L’invention porte sur un procédé et un système de détermination d’une réaction à appliquer à un réseau suite à la détection d’une attaque ou plus généralement d’une anomalie. L’invention comporte une phase d’apprentissage lors de laquelle on associe des réactions à appliquer au réseau pour contrer les effets de différentes familles d’attaques, puis une phase opérationnelle on applique les règles apprises lors de la phase d’apprentissage. Figure 1
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1914571A FR3104776B1 (fr) | 2019-12-17 | 2019-12-17 | Procédé de détermination d’une réaction en réponse à une anomalie dans un réseau informatique |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1914571A FR3104776B1 (fr) | 2019-12-17 | 2019-12-17 | Procédé de détermination d’une réaction en réponse à une anomalie dans un réseau informatique |
FR1914571 | 2019-12-17 |
Publications (2)
Publication Number | Publication Date |
---|---|
FR3104776A1 FR3104776A1 (fr) | 2021-06-18 |
FR3104776B1 true FR3104776B1 (fr) | 2023-07-07 |
Family
ID=70456868
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FR1914571A Active FR3104776B1 (fr) | 2019-12-17 | 2019-12-17 | Procédé de détermination d’une réaction en réponse à une anomalie dans un réseau informatique |
Country Status (1)
Country | Link |
---|---|
FR (1) | FR3104776B1 (fr) |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7941854B2 (en) | 2002-12-05 | 2011-05-10 | International Business Machines Corporation | Method and system for responding to a computer intrusion |
US7228564B2 (en) | 2003-07-24 | 2007-06-05 | Hewlett-Packard Development Company, L.P. | Method for configuring a network intrusion detection system |
US10091218B2 (en) * | 2012-01-23 | 2018-10-02 | Hrl Laboratories, Llc | System and method to detect attacks on mobile wireless networks based on network controllability analysis |
US9930057B2 (en) * | 2015-10-05 | 2018-03-27 | Cisco Technology, Inc. | Dynamic deep packet inspection for anomaly detection |
EP3528459B1 (fr) * | 2018-02-20 | 2020-11-04 | Darktrace Limited | Dispositif de cybersécurité pour un réseau technologique opérationnel |
-
2019
- 2019-12-17 FR FR1914571A patent/FR3104776B1/fr active Active
Also Published As
Publication number | Publication date |
---|---|
FR3104776A1 (fr) | 2021-06-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Han et al. | Malware analysis using visualized images and entropy graphs | |
Richter et al. | Minimizing the workup of blood culture contaminants: implementation and evaluation of a laboratory-based algorithm | |
US8230497B2 (en) | Method of identifying software vulnerabilities on a computer system | |
Dillner | Primary human papillomavirus testing in organized cervical screening | |
Lin et al. | Analysis of test suite reduction with enhanced tie-breaking techniques | |
Tenover et al. | Comparison of typing results obtained for methicillin-resistant Staphylococcus aureus isolates with the DiversiLab system and pulsed-field gel electrophoresis | |
US8370945B2 (en) | Identifying security breaches caused by web-enabled software applications | |
Mysara et al. | CATCh, an ensemble classifier for chimera detection in 16S rRNA sequencing studies | |
AU2009287433A1 (en) | System and method for detection of malware | |
KR20160028724A (ko) | 악성코드 특징 정보 기반의 유사 악성코드 검색 장치 및 방법 | |
US20110131656A1 (en) | Identifying security vulnerability in computer software | |
US20100329573A1 (en) | Display test device, display test method, and storage medium | |
JP5556655B2 (ja) | 解析支援プログラム,解析支援装置および解析支援方法 | |
US20160212157A1 (en) | System and method for analyzing large-scale malicious code | |
KR100870140B1 (ko) | 악성 코드가 숨겨진 파일 탐지 장치 및 방법 | |
US9298926B2 (en) | Remediation of security vulnerabilities in computer software | |
Kostulas et al. | Safety of thrombolysis in stroke mimics: an observational cohort study from an urban teaching hospital in Sweden | |
JP2019046207A (ja) | プラントのセキュリティ対処支援システム | |
Abdalhamid et al. | Cost effectiveness of sample pooling to test for SARS-CoV-2 | |
FR3104776B1 (fr) | Procédé de détermination d’une réaction en réponse à une anomalie dans un réseau informatique | |
Wyllie et al. | Control of artifactual variation in reported intersample relatedness during clinical use of a Mycobacterium tuberculosis sequencing pipeline | |
CN106293667A (zh) | 一种应用程序修改检测方法及装置 | |
CN105786677A (zh) | 异常连接检测装置及方法 | |
CN107239689A (zh) | 一种基于众包的验证信息的识别方法及系统 | |
KR20110032731A (ko) | 윈도우즈 커널 변조 탐지방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PLFP | Fee payment |
Year of fee payment: 2 |
|
PLSC | Publication of the preliminary search report |
Effective date: 20210618 |
|
PLFP | Fee payment |
Year of fee payment: 3 |
|
PLFP | Fee payment |
Year of fee payment: 4 |
|
PLFP | Fee payment |
Year of fee payment: 5 |