skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Non-harmful insertion of data mimicking computer network attacks

Patent ·
OSTI ID:1492804

Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

Research Organization:
Los Alamos National Laboratory (LANL), Los Alamos, NM (United States)
Sponsoring Organization:
USDOE
DOE Contract Number:
AC52-06NA25396
Assignee:
Los Alamos National Security, LLC (Los Alamos, NM)
Patent Number(s):
10,122,741
Application Number:
15/165,036
OSTI ID:
1492804
Resource Relation:
Patent File Date: 2016 May 26
Country of Publication:
United States
Language:
English

References (57)

Tactical And Strategic Attack Detection And Prediction patent-application September 2007
Detecting Anomalies Using End-to-End Path Measurements conference April 2008
Adaptive behavioral intrusion detection systems and methods patent May 2013
Attack graph aggregation patent December 2009
Features generation for use in computer network intrusion detection patent December 2003
Systems and Methods for Virtualized Malware Detection patent-application May 2013
Method For Detecting Anomaly Action Within A Computer Network patent-application June 2014
Database user behavior monitor system and method patent-application September 2005
Intrusion Event Correlation System patent-application July 2010
Anomaly detection patent March 2008
Alert correlation in a cooperative intrusion detection framework conference January 2002
Probabilistic Alert Correlation book January 2001
Two-tier data-driven intrusion detection for automatic generation control in smart grid conference December 2014
System and Method for Assessing Whether a Communication Contains an Attack patent-application February 2014
Generating A Multiple-Prerequisite Attack Graph September 2011
Data Partitioning and Critical Section Reduction for Bayesian Network Structure Learning patent-application November 2008
Detect and qualify relationships between people and find the best path through the resulting social network patent-application June 2004
Adaptive ROC-based ensembles of HMMs applied to anomaly detection journal January 2012
Method for Testing the Security Posture of a System patent-application February 2011
Flow-based detection of network intrusions patent-application June 2003
Applying Antimalware Logic without Revealing the Antimalware Logic to Adversaries patent-application December 2012
Using social graphs to combat malicious attacks patent April 2013
Proactive on-line diagnostics in a manageable network patent-application February 2002
Source Detection Device For Detecting A Source Of Sending A Virus And/Or A Dns Attack Linked To An Application, Method Thereof, And Program Thereof patent-application December 2009
A survey of coordinated attacks and collaborative intrusion detection journal February 2010
Method and system for content distribution network security patent March 2013
Method And Apparatus For Network Anomaly Detection patent-application November 2010
Methods and Systems for Determining Entropy Metrics for Networks patent-application January 2009
Method of Detecting Anomalous Behaviour in a Computer Network patent-application October 2007
Method and system for analyzing multidimensional data patent-application March 2006
Botnets: A survey journal February 2013
Distributed network management patent December 2011
Wireless network edge guardian patent November 2013
Intrusion detection system patent October 2009
System and method for credit scoring using an identity network connectivity patent February 2013
Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis conference January 2011
The link-prediction problem for social networks
  • Liben-Nowell, David; Kleinberg, Jon
  • Journal of the American Society for Information Science and Technology, Vol. 58, Issue 7, p. 1019-1031 https://doi.org/10.1002/asi.20591
journal January 2007
Scan Statistics for the Online Detection of Locally Anomalous Subgraphs journal August 2013
Anomaly detection: A survey journal July 2009
Device and Method for Detecting and Diagnosing Correlated Network Anomalies patent-application June 2011
System and method for exposing malicious sources using mobile IP messages patent February 2014
Apparatuses And Methods For Detecting Anomalous Event In Network patent-application June 2011
Method And Apparatus For Machine To Machine Network Security Monitoring In A Communications Network patent-application May 2013
Adaptive behavioral intrusion detection systems and methods patent-application February 2005
Intelligent intrusion detection system utilizing enhanced graph-matching of network activity with context data patent November 2009
Exploiting dynamicity in graph-based traffic analysis: techniques and applications
  • Iliofotou, Marios; Faloutsos, Michalis; Mitzenmacher, Michael
  • CoNEXT '09 Proceedings of the 5th international conference on Emerging networking experiments and technologies, p. 241-252 https://doi.org/10.1145/1658939.1658967
conference January 2009
Traffic Control System And Management Server patent-application April 2008
Systems and methods for testing and evaluating an intrusion detection system patent-application November 2006
Intelligent intrusion detection system utilizing enhanced graph-matching of network activity with context data patent-application September 2007
Method and apparatus for verifying the integrity and security of computer networks and implementing counter measures patent-application November 2002
Bayesian anomaly detection methods for social networks journal August 2010
Predicting Attacks Based On Probabilistic Game-Theory patent-application November 2013
Peer-to-peer (P2P) botnet tracking at backbone level patent January 2014
Systems And Methods For A Simulated Network Attack Generator patent-application December 2009
Identifying botnets by capturing group activities in DNS traffic journal January 2012
Network security monitoring system patent-application July 2004
Machine learning based botnet detection using real-time connectivity graph based traffic features patent June 2014

Similar Records

Non-harmful insertion of data mimicking computer network attacks
Patent · Tue Jun 21 00:00:00 EDT 2016 · OSTI ID:1492804

Non-harmful insertion of data mimicking computer network attacks
Patent · Tue Jan 07 00:00:00 EST 2020 · OSTI ID:1492804

A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks
Journal Article · Fri Mar 11 00:00:00 EST 2016 · Journal of Network and Computer Applications · OSTI ID:1492804

Related Subjects