Global to push GA events into
skip to main content

Title: Non-harmful insertion of data mimicking computer network attacks

Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.
Inventors:
; ;
Issue Date:
OSTI Identifier:
1257984
Assignee:
Los Alamos National Security, LLC (Los Alamos, NM) LANL
Patent Number(s):
9,374,380
Application Number:
13/826,736
Contract Number:
AC52-06NA25396
Resource Relation:
Patent File Date: 2013 Mar 14
Research Org:
Los Alamos National Lab. (LANL), Los Alamos, NM (United States)
Sponsoring Org:
USDOE
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS AND COMPUTING

Other works cited in this record:

The link-prediction problem for social networks
journal, January 2007
  • Liben-Nowell, David; Kleinberg, Jon
  • Journal of the American Society for Information Science and Technology, Vol. 58, Issue 7, p. 1019-1031
  • DOI: 10.1002/asi.20591

A survey of coordinated attacks and collaborative intrusion detection
journal, February 2010
  • Zhou, Chenfeng Vincent; Leckie, Christopher; Karunasekera, Shanika
  • Computers & Security, Vol. 29, Issue 1, p. 124-140
  • DOI: 10.1016/j.cose.2009.06.008

Identifying botnets by capturing group activities in DNS traffic
journal, January 2012

Probabilistic Alert Correlation
book, January 2001
  • Valdes, Alfonso; Skinner, Keith; Goos, Gerhard
  • Recent Advances in Intrusion Detection, p. 54-68
  • DOI: 10.1007/3-540-45474-8_4

Features generation for use in computer network intrusion detection
patent, December 2003

Anomaly detection
patent, March 2008

Intrusion detection system
patent, October 2009

Attack graph aggregation
patent, December 2009

System and method for credit scoring using an identity network connectivity
patent, February 2013

Method and system for content distribution network security
patent, March 2013

Adaptive behavioral intrusion detection systems and methods
patent, May 2013

Wireless network edge guardian
patent, November 2013

Peer-to-peer (P2P) botnet tracking at backbone level
patent, January 2014

System and method for exposing malicious sources using mobile IP messages
patent, February 2014

Similar records in DOepatents and OSTI.GOV collections: