PL2975801T3 - Sposób rozpoznawania ataku w sieci komputerowej - Google Patents

Sposób rozpoznawania ataku w sieci komputerowej

Info

Publication number
PL2975801T3
PL2975801T3 PL14177647T PL14177647T PL2975801T3 PL 2975801 T3 PL2975801 T3 PL 2975801T3 PL 14177647 T PL14177647 T PL 14177647T PL 14177647 T PL14177647 T PL 14177647T PL 2975801 T3 PL2975801 T3 PL 2975801T3
Authority
PL
Poland
Prior art keywords
attack
detecting
computer network
network
computer
Prior art date
Application number
PL14177647T
Other languages
English (en)
Inventor
Mathias Kloth
Michael Westphalen
Original Assignee
Deutsche Telekom Ag
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Deutsche Telekom Ag filed Critical Deutsche Telekom Ag
Publication of PL2975801T3 publication Critical patent/PL2975801T3/pl

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0604Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0681Configuration of triggering conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
PL14177647T 2014-07-18 2014-07-18 Sposób rozpoznawania ataku w sieci komputerowej PL2975801T3 (pl)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP14177647.6A EP2975801B1 (de) 2014-07-18 2014-07-18 Verfahren zum Erkennen eines Angriffs in einem Computernetzwerk

Publications (1)

Publication Number Publication Date
PL2975801T3 true PL2975801T3 (pl) 2017-07-31

Family

ID=51212712

Family Applications (1)

Application Number Title Priority Date Filing Date
PL14177647T PL2975801T3 (pl) 2014-07-18 2014-07-18 Sposób rozpoznawania ataku w sieci komputerowej

Country Status (7)

Country Link
US (1) US9900327B2 (pl)
EP (1) EP2975801B1 (pl)
JP (1) JP6442051B2 (pl)
CN (1) CN106537872B (pl)
CA (1) CA2954552C (pl)
PL (1) PL2975801T3 (pl)
WO (1) WO2016008778A1 (pl)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102018212657A1 (de) * 2018-07-30 2020-01-30 Robert Bosch Gmbh Verfahren und Vorrichtung zum Erkennen von Unregelmäßigkeiten in einem Rechnernetz
JP7056752B2 (ja) * 2018-10-11 2022-04-19 日本電信電話株式会社 分析装置、分析システム、分析方法及びプログラム
FR3095313A1 (fr) * 2019-04-18 2020-10-23 Orange Procédé et dispositif de traitement d’un message d’alerte notifiant une anomalie détectée dans un trafic émis via un réseau
CN112104480B (zh) * 2020-08-05 2022-10-21 福建天泉教育科技有限公司 提高告警质量的方法及其系统
US11792213B2 (en) 2021-05-18 2023-10-17 Bank Of America Corporation Temporal-based anomaly detection for network security
US11799879B2 (en) 2021-05-18 2023-10-24 Bank Of America Corporation Real-time anomaly detection for network security
US11588835B2 (en) 2021-05-18 2023-02-21 Bank Of America Corporation Dynamic network security monitoring system
CN114024831B (zh) * 2021-11-08 2024-01-26 中国工商银行股份有限公司 一种异常事件预警方法、装置和系统
CN114567482A (zh) * 2022-02-28 2022-05-31 天翼安全科技有限公司 一种告警分类方法、装置、电子设备及存储介质
CN115118463A (zh) * 2022-06-10 2022-09-27 深信服科技股份有限公司 一种失陷主机检测方法、装置、电子设备及存储介质
CN114978778B (zh) * 2022-08-01 2022-10-28 北京六方云信息技术有限公司 基于因果推断的多步攻击检测方法、装置及设备

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0334039A (ja) * 1989-06-30 1991-02-14 Nec Corp ネットワーク管理における障害メッセージ管理方式
WO1999050750A1 (fr) * 1998-04-01 1999-10-07 Hitachi, Ltd. Procede et dispositif de production de messages et support d'enregistrement servant a stocker un programme de production de messages
JP2000148276A (ja) * 1998-11-05 2000-05-26 Fujitsu Ltd セキュリティ監視装置,セキュリティ監視方法およびセキュリティ監視用プログラム記録媒体
JP2001356939A (ja) * 2000-06-13 2001-12-26 Tokyo Electric Power Co Inc:The ログ情報解析装置、方法および記録媒体
US7475405B2 (en) * 2000-09-06 2009-01-06 International Business Machines Corporation Method and system for detecting unusual events and application thereof in computer intrusion detection
JP4619254B2 (ja) * 2005-09-30 2011-01-26 富士通株式会社 Idsのイベント解析及び警告システム
CN1848765A (zh) * 2006-03-10 2006-10-18 四川大学 基于免疫的网络入侵危险性评估方法
US8205244B2 (en) * 2007-02-27 2012-06-19 Airdefense, Inc. Systems and methods for generating, managing, and displaying alarms for wireless network monitoring
US8504504B2 (en) * 2008-09-26 2013-08-06 Oracle America, Inc. System and method for distributed denial of service identification and prevention
CN101399672B (zh) * 2008-10-17 2011-03-02 章毅 一种多神经网络融合的入侵检测方法
JP5264470B2 (ja) * 2008-12-26 2013-08-14 三菱電機株式会社 攻撃判定装置及びプログラム
JP5066544B2 (ja) * 2009-03-31 2012-11-07 株式会社富士通ソーシアルサイエンスラボラトリ インシデント監視装置,方法,プログラム
KR101061375B1 (ko) * 2009-11-02 2011-09-02 한국인터넷진흥원 Uri 타입 기반 디도스 공격 탐지 및 대응 장치
CN101741847B (zh) * 2009-12-22 2012-11-07 北京锐安科技有限公司 一种ddos攻击检测方法
FI20096394A0 (fi) * 2009-12-23 2009-12-23 Valtion Teknillinen Tunkeutumisen havaitseminen viestintäverkoissa
EP2734928A4 (en) * 2011-07-22 2015-06-24 Empirix Inc NETWORK MONITORING SYSTEMS AND METHODS AND TESTING THROUGH DIMENSION VALUES BASED PERFORMANCE INDICATORS
US9503463B2 (en) * 2012-05-14 2016-11-22 Zimperium, Inc. Detection of threats to networks, based on geographic location
CN103856455A (zh) * 2012-12-04 2014-06-11 中山大学深圳研究院 一种保护计算机网络避免数据洪水攻击的方法及系统

Also Published As

Publication number Publication date
CA2954552C (en) 2019-08-20
JP6442051B2 (ja) 2018-12-19
CN106537872A (zh) 2017-03-22
WO2016008778A1 (de) 2016-01-21
CN106537872B (zh) 2020-11-24
CA2954552A1 (en) 2016-01-21
US20160021128A1 (en) 2016-01-21
US9900327B2 (en) 2018-02-20
EP2975801A1 (de) 2016-01-20
JP2017528853A (ja) 2017-09-28
EP2975801B1 (de) 2016-06-29

Similar Documents

Publication Publication Date Title
HK1203285A2 (en) A method for managing a virtual currency and an improved virtual currency system
PL2975801T3 (pl) Sposób rozpoznawania ataku w sieci komputerowej
RS62495B1 (sr) Postupak za ispitivanje sigurnosnog dokumenta
IL250635B (en) Detection of anomalous activity in a computer network
GB201408100D0 (en) Detection method
SG10201500175VA (en) System and Method for Conducting a Tournament in a Gaming Network
EP3113527A4 (en) Method and apparatus for detecting man-in-the-middle attack
GB201402644D0 (en) Methylation detection method
SI3398449T1 (sl) Postopek smoltifikacije pri salmonidah
EP3192878A4 (en) Method for detecting mycoplasma
HK1221836A1 (zh) 遊戲方法和系統
SG10201405714SA (en) Method, system and computer program for fault detection in a machine
PT2943001T (pt) Método e sistema para deteção de erro na rede
SG10201403766QA (en) A Method For Conducting A Transaction
GB2592172B (en) Method and apparatus for installing an object in a recess
GB201419330D0 (en) Detection method
SG11201606638YA (en) System and method for detecting a handshake
SG10201406350UA (en) An event detection method
GB201617296D0 (en) A gaming system and an associated method
HK1199981A1 (en) Operation request processing method
GB201416459D0 (en) Detection method
HK1198351A2 (zh) 用於提取部件的系統和方法
GB201402174D0 (en) Detection method
HK1245485A1 (zh) 用於監控對象的系統和方法
TWI563381B (en) Method for testing a computer system