Non-harmful insertion of data mimicking computer network attacks
Abstract
Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.
- Inventors:
- Issue Date:
- Research Org.:
- Los Alamos National Laboratory (LANL), Los Alamos, NM (United States)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 1492804
- Patent Number(s):
- 10122741
- Application Number:
- 15/165,036
- Assignee:
- Los Alamos National Security, LLC (Los Alamos, NM)
- Patent Classifications (CPCs):
-
G - PHYSICS G06 - COMPUTING G06F - ELECTRIC DIGITAL DATA PROCESSING
G - PHYSICS G06 - COMPUTING G06N - COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- DOE Contract Number:
- AC52-06NA25396
- Resource Type:
- Patent
- Resource Relation:
- Patent File Date: 2016 May 26
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 97 MATHEMATICS AND COMPUTING
Citation Formats
Neil, Joshua, Kent, Alexander, Hash, Jr., Curtis, Fisk, Michael, Brugh, Alexander, Storlie, Curtis, and Uphoff, Benjamin. Non-harmful insertion of data mimicking computer network attacks. United States: N. p., 2018.
Web.
Neil, Joshua, Kent, Alexander, Hash, Jr., Curtis, Fisk, Michael, Brugh, Alexander, Storlie, Curtis, & Uphoff, Benjamin. Non-harmful insertion of data mimicking computer network attacks. United States.
Neil, Joshua, Kent, Alexander, Hash, Jr., Curtis, Fisk, Michael, Brugh, Alexander, Storlie, Curtis, and Uphoff, Benjamin. Tue .
"Non-harmful insertion of data mimicking computer network attacks". United States. https://www.osti.gov/servlets/purl/1492804.
@article{osti_1492804,
title = {Non-harmful insertion of data mimicking computer network attacks},
author = {Neil, Joshua and Kent, Alexander and Hash, Jr., Curtis and Fisk, Michael and Brugh, Alexander and Storlie, Curtis and Uphoff, Benjamin},
abstractNote = {Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2018},
month = {11}
}
Works referenced in this record:
Tactical And Strategic Attack Detection And Prediction
patent-application, September 2007
- Gilbert, Logan; Morgan, Robert J.; Keen, Arthur A.
- US Patent Application 11/688540; 20070226796
Detecting Anomalies Using End-to-End Path Measurements
conference, April 2008
- Naidu, K. V. M.; Panigrahi, D.; Rastogi, R.
- IEEE INFOCOM 2008 - The 27th Conference on Computer Communications
Adaptive behavioral intrusion detection systems and methods
patent, May 2013
- Stute, Michael Roy
- US Patent Document 8,448,247
Attack graph aggregation
patent, December 2009
- Noel, Steven E.; Jajodia, Sushil
- US Patent Document 7,627,900
Features generation for use in computer network intrusion detection
patent, December 2003
- Diep, Thanh A.; Botros, Sherif; Izenson, Martin D.
- US Patent Document 6,671,811
Systems and Methods for Virtualized Malware Detection
patent-application, May 2013
- Golshan, Ali; Binder, James S.
- US Patent Application 13/288917; 20130117849
Method For Detecting Anomaly Action Within A Computer Network
patent-application, June 2014
- Engel, Giora; Mumcouglu, Michael
- US Patent Application 14/234165; 20140165207
Database user behavior monitor system and method
patent-application, September 2005
- Sakamoto, Akio; Chou, Chung-Kuang; Tang, Wani G.
- US Patent Application 10/796932; 20050203881
Intrusion Event Correlation System
patent-application, July 2010
- Noel, Steven E.; Robertson, Eric B.; Jajodia, Sushil
- US Patent Application 12/758135; 20100192226
Anomaly detection
patent, March 2008
- Ide, Tsuyoshi; Yoda, Kunikazu; Kashima, Hisashi
- US Patent Document 7,346,803
Alert correlation in a cooperative intrusion detection framework
conference, January 2002
- Cuppens, F.; Miege, A.
- Proceedings 2002 IEEE Symposium on Security and Privacy
Probabilistic Alert Correlation
book, January 2001
- Valdes, Alfonso; Skinner, Keith; Goos, Gerhard
- Recent Advances in Intrusion Detection, p. 54-68
Two-tier data-driven intrusion detection for automatic generation control in smart grid
conference, December 2014
- Ali, Muhammad Qasim; Yousefian, Reza; Al-Shaer, Ehab
- 2014 IEEE Conference on Communications and Network Security, p. 292-300
System and Method for Assessing Whether a Communication Contains an Attack
patent-application, February 2014
- Ramsey, Jon R.; Varma, Jyotish S.; Thomas, Ashley
- US Patent Application 14/046161; 20140041028
Generating A Multiple-Prerequisite Attack Graph
September 2011
- Lippmann, Richard P.; Ingols, Kyle W.; Piwowarski, Keith J.
- US Patent Application 13/104454; 20110231937
Data Partitioning and Critical Section Reduction for Bayesian Network Structure Learning
patent-application, November 2008
- Lai, Chunrong; Hu, Wei
- US Patent Application 11/665947; 20080281771
Detect and qualify relationships between people and find the best path through the resulting social network
patent-application, June 2004
- Dom, Byron E.; Ruvolo, Joann; Tewari, Geetika
- US Patent Application 10/323568; 20040122803
Adaptive ROC-based ensembles of HMMs applied to anomaly detection
journal, January 2012
- Khreich, Wael; Granger, Eric; Miri, Ali
- Pattern Recognition, Vol. 45, Issue 1, p. 208-230
Method for Testing the Security Posture of a System
patent-application, February 2011
- Greenwald, Lloyd G.
- US Patent Application 12/462148; 20110030059
Flow-based detection of network intrusions
patent-application, June 2003
- Copeland, John A. III
- US Patent Application 10/000396; 20030105976
Applying Antimalware Logic without Revealing the Antimalware Logic to Adversaries
patent-application, December 2012
- Kumar, Ajith; Fraser, Timothy Jon; Marinescu, Adrian M.
- US Patent Application 13/156726; 20120317644
Using social graphs to combat malicious attacks
patent, April 2013
- Xie, Yinglian; Yu, Fang; Abadi, Martin
- US Patent Document 8,434,150
Proactive on-line diagnostics in a manageable network
patent-application, February 2002
- Chirashnya, Igor; Shalev, Leah; Shoikhet, Kirill
- US Patent Application 09/893006; 20020019870
Source Detection Device For Detecting A Source Of Sending A Virus And/Or A Dns Attack Linked To An Application, Method Thereof, And Program Thereof
patent-application, December 2009
- Terasaki, Hiroshi; Tamai, Masayoshi; Kawatsu, Sonomi
- US Patent Application 12/521026; 20090319659
A survey of coordinated attacks and collaborative intrusion detection
journal, February 2010
- Zhou, Chenfeng Vincent; Leckie, Christopher; Karunasekera, Shanika
- Computers & Security, Vol. 29, Issue 1, p. 124-140
Method and system for content distribution network security
patent, March 2013
- Macwan, Sanjay; Chawla, Deepak; de los Reyes, Gustavo
- US Patent Document 8,397,298
Method And Apparatus For Network Anomaly Detection
patent-application, November 2010
- Barford, Paul R.; Kline, Jeffery Thomas; Nam, Sangnam
- US Patent Application 12/516766; 20100290346
Methods and Systems for Determining Entropy Metrics for Networks
patent-application, January 2009
- Johnson, Joseph E.
- US Patent Application 12/158424; 20090024549
Method of Detecting Anomalous Behaviour in a Computer Network
patent-application, October 2007
- Belakhdar, Omar; Bados, Pedro; Flatings, Boi
- US Patent Application 11/578866; 20070240207
Method and system for analyzing multidimensional data
patent-application, March 2006
- Ashiri, Amir
- US Patent Application 11/199383; 20060053136
Botnets: A survey
journal, February 2013
- Silva, Sérgio S. C.; Silva, Rodrigo M. P.; Pinto, Raquel C. G.
- Computer Networks, Vol. 57, Issue 2, p. 378-403
Distributed network management
patent, December 2011
- Mortier, Richard; Barham, Paul; Isaacs, Rebecca
- US Patent Document 8,077,718
Wireless network edge guardian
patent, November 2013
- Koller, Gary Duane; Peden, Mark Douglas; Reeves, Raymond Emilio
- US Patent Document 8,588,764
System and method for credit scoring using an identity network connectivity
patent, February 2013
- Xiong, Shanji; Xie, Jianjun; Lin, Yinghua
- US Patent Document 8,386,377
Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis
conference, January 2011
- Du, Haitao; Yang, Shanchieh Jay; Salerno, John
- Social Computing, Behavioral-Cultural Modeling and Prediction, p. 129-136
The link-prediction problem for social networks
journal, January 2007
- Liben-Nowell, David; Kleinberg, Jon
- Journal of the American Society for Information Science and Technology, Vol. 58, Issue 7, p. 1019-1031
Scan Statistics for the Online Detection of Locally Anomalous Subgraphs
journal, August 2013
- Neil, Joshua; Hash, Curtis; Brugh, Alexander
- Technometrics, Vol. 55, Issue 4, p. 403-414
Anomaly detection: A survey
journal, July 2009
- Chandola, Varun; Banerjee, Arindam; Kumar, Vipin
- ACM Computing Surveys, Vol. 41, Issue 3, p. 1-58
Device and Method for Detecting and Diagnosing Correlated Network Anomalies
patent-application, June 2011
- Wang, Jia; Lall, Ashwin; Mahimkar, Ajay
- US Patent Application 12/646388; 20110154119
System and method for exposing malicious sources using mobile IP messages
patent, February 2014
- Choyi, Vinod Kumar; Abdel-Aziz, Bassem
- US Patent Document 8,650,630
Apparatuses And Methods For Detecting Anomalous Event In Network
patent-application, June 2011
- Choi, Hyoung-Kee; Han, Chan-Kyu
- US Patent Application 12/685736; 20110141915
Method And Apparatus For Machine To Machine Network Security Monitoring In A Communications Network
patent-application, May 2013
- Sheleheda, Daniel; Bowen, Donald J.; Cama, Cynthia
- US Patent Application 13/301529; 20130127618
Adaptive behavioral intrusion detection systems and methods
patent-application, February 2005
- Stute, Michael
- US Patent Application 10/504731; 20050044406
Intelligent intrusion detection system utilizing enhanced graph-matching of network activity with context data
patent, November 2009
- Coffman, Thayne R.
- US Patent Document 7,624,448
Exploiting dynamicity in graph-based traffic analysis: techniques and applications
conference, January 2009
- Iliofotou, Marios; Faloutsos, Michalis; Mitzenmacher, Michael
- CoNEXT '09 Proceedings of the 5th international conference on Emerging networking experiments and technologies, p. 241-252
Traffic Control System And Management Server
patent-application, April 2008
- Shimojo, Toshio; Watanabe, Yoshinori
- US Patent Application 11/866586; 20080089233
Systems and methods for testing and evaluating an intrusion detection system
patent-application, November 2006
- Rubin, Shai A.; Jha, Somesh; Miller, Barton P.
- US Patent Application 11/294585; 20060253906
Intelligent intrusion detection system utilizing enhanced graph-matching of network activity with context data
patent-application, September 2007
- Coffman, Thayne Richard
- US Patent Application 11/367943; 20070209074
Method and apparatus for verifying the integrity and security of computer networks and implementing counter measures
patent-application, November 2002
- Hrabik, Michael; Guilfoyle, Jeffrey; Mac Beaver, Edward
- US Patent Application 10/196472; 20020178383
Bayesian anomaly detection methods for social networks
journal, August 2010
- Heard, Nicholas A.; Weston, David J.; Platanioti, Kiriaki
- The Annals of Applied Statistics, Vol. 4, Issue 2, p. 645-662
Predicting Attacks Based On Probabilistic Game-Theory
patent-application, November 2013
- Christodorescu, Mihai; Korzhyk, Dmytro; Sailer, Reiner
- US Patent Application 13/478290; 20130318615
Peer-to-peer (P2P) botnet tracking at backbone level
patent, January 2014
- Coskun, Baris; Baliga, Arati
- US Patent Document 8,627,473
Systems And Methods For A Simulated Network Attack Generator
patent-application, December 2009
- White, Christopher Dyson; Ratcliffe, III, Chester Randolph; Espinosa, John Christian
- US Patent Application 12/487633; 20090320137
Identifying botnets by capturing group activities in DNS traffic
journal, January 2012
- Choi, Hyunsang; Lee, Heejo
- Computer Networks, Vol. 56, Issue 1, p. 20-33
Network security monitoring system
patent-application, July 2004
- Bhattacharya, Partha; Lawrence, Jan Christian
- US Patent Application 10/443946; 20040133672
Machine learning based botnet detection using real-time connectivity graph based traffic features
patent, June 2014
- Ranjan, Supranamaya; Robinson, Joshua; Chen, Feng-Ming
- US Patent Document 8,762,298