Abstract
The MSE cyber sensor offers a novel approach for scalable network monitoring using heterogeneous computing. Packet data is collected, analyzed, and stored by a stand alone cyber sensor. Machine learning algorithms are run to discover patterns in the communication without the need for deep packet inspection. Tuning of the detection algorithms happens automatically, without need for an engineer to manually create detection rules.
- Developers:
- Release Date:
- 2022-06-28
- Project Type:
- Closed Source
- Software Type:
- Scientific
- Sponsoring Org.:
-
USDOE Office of Nuclear Energy (NE)Primary Award/Contract Number:AC07-05ID14517
- Code ID:
- 99314
- Research Org.:
- Idaho National Laboratory (INL), Idaho Falls, ID (United States)
- Country of Origin:
- United States
- Keywords:
- autoencoder threat detection; partial packet inspection
Citation Formats
Russell, Pierce L., Bell, John C., Reen, Dylan W., Lizarazo, Daniel M., Wickramasinghe, Chathurika, and Manic, Milos.
Master State Threat Identifier (masti).
Computer Software.
USDOE Office of Nuclear Energy (NE).
28 Jun. 2022.
Web.
doi:10.11578/dc.20230314.10.
Russell, Pierce L., Bell, John C., Reen, Dylan W., Lizarazo, Daniel M., Wickramasinghe, Chathurika, & Manic, Milos.
(2022, June 28).
Master State Threat Identifier (masti).
[Computer software].
https://doi.org/10.11578/dc.20230314.10.
Russell, Pierce L., Bell, John C., Reen, Dylan W., Lizarazo, Daniel M., Wickramasinghe, Chathurika, and Manic, Milos.
"Master State Threat Identifier (masti)." Computer software.
June 28, 2022.
https://doi.org/10.11578/dc.20230314.10.
@misc{
doecode_99314,
title = {Master State Threat Identifier (masti)},
author = {Russell, Pierce L. and Bell, John C. and Reen, Dylan W. and Lizarazo, Daniel M. and Wickramasinghe, Chathurika and Manic, Milos},
abstractNote = {The MSE cyber sensor offers a novel approach for scalable network monitoring using heterogeneous computing. Packet data is collected, analyzed, and stored by a stand alone cyber sensor. Machine learning algorithms are run to discover patterns in the communication without the need for deep packet inspection. Tuning of the detection algorithms happens automatically, without need for an engineer to manually create detection rules.},
doi = {10.11578/dc.20230314.10},
url = {https://doi.org/10.11578/dc.20230314.10},
howpublished = {[Computer Software] \url{https://doi.org/10.11578/dc.20230314.10}},
year = {2022},
month = {jun}
}