WO2016204839A3 - System and method to detect attacks on mobile wireless networks based on network controllability analysis - Google Patents
System and method to detect attacks on mobile wireless networks based on network controllability analysis Download PDFInfo
- Publication number
- WO2016204839A3 WO2016204839A3 PCT/US2016/023308 US2016023308W WO2016204839A3 WO 2016204839 A3 WO2016204839 A3 WO 2016204839A3 US 2016023308 W US2016023308 W US 2016023308W WO 2016204839 A3 WO2016204839 A3 WO 2016204839A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- wireless networks
- mobile wireless
- network
- networks based
- detect attacks
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
Abstract
Described is a system for detecting attacks of misinformation on communication networks. Network controllability metrics on a graphical representation of a communication network are computed. Changes in the network controllability metrics are detected, and attack of misinformation on the communication network are detected based on the detected changes in the network controllability metrics.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP16812078.0A EP3272075A4 (en) | 2015-03-18 | 2016-03-18 | System and method to detect attacks on mobile wireless networks based on network controllability analysis |
CN201680010741.5A CN107251519B (en) | 2015-03-18 | 2016-03-18 | Systems, methods, and media for detecting attacks of fake information on a communication network |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562135142P | 2015-03-18 | 2015-03-18 | |
US201562135136P | 2015-03-18 | 2015-03-18 | |
US62/135,136 | 2015-03-18 | ||
US62/135,142 | 2015-03-18 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2016204839A2 WO2016204839A2 (en) | 2016-12-22 |
WO2016204839A3 true WO2016204839A3 (en) | 2017-01-26 |
Family
ID=57546242
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2016/023307 WO2016204838A2 (en) | 2015-03-18 | 2016-03-18 | System and method to detect attacks on mobile wireless networks based on motif analysis |
PCT/US2016/023308 WO2016204839A2 (en) | 2015-03-18 | 2016-03-18 | System and method to detect attacks on mobile wireless networks based on network controllability analysis |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2016/023307 WO2016204838A2 (en) | 2015-03-18 | 2016-03-18 | System and method to detect attacks on mobile wireless networks based on motif analysis |
Country Status (3)
Country | Link |
---|---|
EP (2) | EP3272075A4 (en) |
CN (2) | CN107409124B (en) |
WO (2) | WO2016204838A2 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10897471B2 (en) | 2018-01-30 | 2021-01-19 | Hewlett Packard Enterprise Development Lp | Indicating malicious entities based on multicast communication patterns |
CN110706743A (en) * | 2019-10-14 | 2020-01-17 | 福建师范大学 | Protein interaction network motif detection method for balanced sampling and graph retrieval |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060010493A1 (en) * | 2003-04-01 | 2006-01-12 | Lockheed Martin Corporation | Attack impact prediction system |
US20070019543A1 (en) * | 2005-07-06 | 2007-01-25 | Fortinet, Inc. | Systems and methods for detecting and preventing flooding attacks in a network environment |
US20080301295A1 (en) * | 2006-01-31 | 2008-12-04 | International Business Machines Corporation | System and method for usage-based misinformation detection and response |
US20090183260A1 (en) * | 2004-05-04 | 2009-07-16 | Symantec Corporation | Detecting network evasion and misinformation |
US20130091573A1 (en) * | 2002-12-24 | 2013-04-11 | Frederick S.M. Herz | System and method for a distributed application of a network security system (sdi-scam) |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060230450A1 (en) * | 2005-03-31 | 2006-10-12 | Tian Bu | Methods and devices for defending a 3G wireless network against a signaling attack |
KR100767589B1 (en) * | 2006-07-20 | 2007-10-17 | 성균관대학교산학협력단 | Fuzzy logic anomaly detection scheme for directed diffusion based sensor networks |
US8655939B2 (en) * | 2007-01-05 | 2014-02-18 | Digital Doors, Inc. | Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor |
CN101309180B (en) * | 2008-06-21 | 2010-12-08 | 华中科技大学 | Security network invasion detection system suitable for virtual machine environment |
US8850578B2 (en) * | 2008-08-06 | 2014-09-30 | International Business Machines Corporation | Network intrusion detection |
US8312542B2 (en) * | 2008-10-29 | 2012-11-13 | Lockheed Martin Corporation | Network intrusion detection using MDL compress for deep packet inspection |
US8245301B2 (en) * | 2009-09-15 | 2012-08-14 | Lockheed Martin Corporation | Network intrusion detection visualization |
US8245302B2 (en) * | 2009-09-15 | 2012-08-14 | Lockheed Martin Corporation | Network attack visualization and response through intelligent icons |
CN101800989B (en) * | 2010-01-19 | 2013-07-10 | 重庆邮电大学 | Anti-replay-attack system for industrial wireless network |
US8683591B2 (en) * | 2010-11-18 | 2014-03-25 | Nant Holdings Ip, Llc | Vector-based anomaly detection |
US8869309B2 (en) * | 2011-04-14 | 2014-10-21 | Lockheed Martin Corporation | Dynamically reconfigurable 2D topology communication and verification scheme |
US8560681B2 (en) * | 2011-05-10 | 2013-10-15 | Telefonica, S.A. | Method of characterizing a social network communication using motifs |
CN102869006B (en) * | 2012-09-13 | 2016-02-17 | 柳州职业技术学院 | Wireless sensor network hierarchical invasion Fault Diagnostic Expert System and method thereof |
WO2014118362A1 (en) * | 2013-02-01 | 2014-08-07 | Siemens Aktiengesellschaft | Method and apparatus for monitoring security intrusion of a distributed computer system |
CN104144063B (en) * | 2013-05-08 | 2018-08-10 | 朱烨 | Web portal security monitoring and alarming system based on log analysis and firewall security matrix |
CN104348811B (en) * | 2013-08-05 | 2018-01-26 | 深圳市腾讯计算机系统有限公司 | Detecting method of distributed denial of service attacking and device |
CN103957525B (en) * | 2014-05-12 | 2018-02-27 | 江苏大学 | Malicious node detection method based on sub-clustering trust evaluation in car networking |
-
2016
- 2016-03-18 EP EP16812078.0A patent/EP3272075A4/en active Pending
- 2016-03-18 EP EP16812077.2A patent/EP3272102A4/en active Pending
- 2016-03-18 CN CN201680010942.5A patent/CN107409124B/en active Active
- 2016-03-18 WO PCT/US2016/023307 patent/WO2016204838A2/en active Application Filing
- 2016-03-18 CN CN201680010741.5A patent/CN107251519B/en active Active
- 2016-03-18 WO PCT/US2016/023308 patent/WO2016204839A2/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130091573A1 (en) * | 2002-12-24 | 2013-04-11 | Frederick S.M. Herz | System and method for a distributed application of a network security system (sdi-scam) |
US20060010493A1 (en) * | 2003-04-01 | 2006-01-12 | Lockheed Martin Corporation | Attack impact prediction system |
US20090183260A1 (en) * | 2004-05-04 | 2009-07-16 | Symantec Corporation | Detecting network evasion and misinformation |
US20070019543A1 (en) * | 2005-07-06 | 2007-01-25 | Fortinet, Inc. | Systems and methods for detecting and preventing flooding attacks in a network environment |
US20080301295A1 (en) * | 2006-01-31 | 2008-12-04 | International Business Machines Corporation | System and method for usage-based misinformation detection and response |
Non-Patent Citations (1)
Title |
---|
See also references of EP3272075A4 * |
Also Published As
Publication number | Publication date |
---|---|
CN107409124B (en) | 2020-09-15 |
WO2016204839A2 (en) | 2016-12-22 |
EP3272102A2 (en) | 2018-01-24 |
EP3272102A4 (en) | 2018-11-14 |
CN107409124A (en) | 2017-11-28 |
WO2016204838A2 (en) | 2016-12-22 |
EP3272075A4 (en) | 2018-12-05 |
CN107251519B (en) | 2020-06-12 |
WO2016204838A3 (en) | 2017-01-26 |
WO2016204838A9 (en) | 2017-06-15 |
CN107251519A (en) | 2017-10-13 |
EP3272075A2 (en) | 2018-01-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3403308A4 (en) | Network monitoring, detection, and analysis system | |
WO2016197004A3 (en) | Enhancing performance of multi-path communications | |
EP3361673A4 (en) | Security device, attack detection method, and program | |
EP3276990A4 (en) | Method for monitoring ue reachability in wireless communication system, and apparatus therefor | |
EP3242441A4 (en) | Bit-forwarding ingress router, bit-forwarding router, and operation, administration and maintenance detection method | |
EP3364595A4 (en) | Key configuration method and key management center, and network element | |
WO2014107468A3 (en) | Mobile device speaker control | |
WO2013184211A3 (en) | Anomaly detection to identify coordinated group attacks in computer networks | |
WO2013009992A3 (en) | Network-assisted peer discovery with network coding | |
WO2013036014A3 (en) | Apparatus and method for setting channel in wireless network | |
MX2015003870A (en) | Control channel detection method and user equipment. | |
EP3193540A4 (en) | Wireless communication method, processor and wireless terminal | |
EP3203781A4 (en) | Network selection method and apparatus based on communications terminal, and terminal | |
EP3373520A4 (en) | Status detection method and wireless network node | |
WO2015140634A3 (en) | Method and apparatus for enhancing phr in dual connectivity | |
EP2819022A4 (en) | Initiator apparatus, target apparatus, communication system, timeout detection method, and timeout detection program | |
EP2863595A4 (en) | Topology grading method and apparatus, and flooding processing method and apparatus | |
GB201403005D0 (en) | Networks elements, wireless communication system and methods therefor | |
EP3609139A4 (en) | Method for determining reference for unauthorized communication detection, system for determining reference for unauthorized communication detection, and program | |
EP3720054A4 (en) | Abnormal communication detection device, abnormal communication detection method, and program | |
EP3767245A4 (en) | Attack detection device, attack detection method, and attack detection program | |
EP3352505A4 (en) | Network indication processing device, method and communication system | |
EP3229527A4 (en) | Wireless communication device, wireless communication node and channel detection method | |
EP3618480A4 (en) | Integrity detection method, terminal and network device | |
GB201521137D0 (en) | Honeybot: Mobile Honeypot detection and isolation techniques for adhoc malicious communications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16812078 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2016812078 Country of ref document: EP |