DOE Patents title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Non-harmful insertion of data mimicking computer network attacks

Abstract

Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

Inventors:
; ; ; ; ; ;
Issue Date:
Research Org.:
Los Alamos National Lab. (LANL), Los Alamos, NM (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1632421
Patent Number(s):
10530799
Application Number:
16/168,956
Assignee:
Triad National Security, LLC (Los Alamos, NM)
Patent Classifications (CPCs):
G - PHYSICS G06 - COMPUTING G06F - ELECTRIC DIGITAL DATA PROCESSING
H - ELECTRICITY H04 - ELECTRIC COMMUNICATION TECHNIQUE H04L - TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
DOE Contract Number:  
AC52-06NA25396
Resource Type:
Patent
Resource Relation:
Patent File Date: 10/24/2018
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS AND COMPUTING

Citation Formats

Neil, Joshua, Kent, Alexander, Hash, Jr., Curtis, Fisk, Michael, Brugh, Alexander, Storlie, Curtis, and Uphoff, Benjamin. Non-harmful insertion of data mimicking computer network attacks. United States: N. p., 2020. Web.
Neil, Joshua, Kent, Alexander, Hash, Jr., Curtis, Fisk, Michael, Brugh, Alexander, Storlie, Curtis, & Uphoff, Benjamin. Non-harmful insertion of data mimicking computer network attacks. United States.
Neil, Joshua, Kent, Alexander, Hash, Jr., Curtis, Fisk, Michael, Brugh, Alexander, Storlie, Curtis, and Uphoff, Benjamin. Tue . "Non-harmful insertion of data mimicking computer network attacks". United States. https://www.osti.gov/servlets/purl/1632421.
@article{osti_1632421,
title = {Non-harmful insertion of data mimicking computer network attacks},
author = {Neil, Joshua and Kent, Alexander and Hash, Jr., Curtis and Fisk, Michael and Brugh, Alexander and Storlie, Curtis and Uphoff, Benjamin},
abstractNote = {Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2020},
month = {1}
}

Works referenced in this record:

Method and system for content distribution network security
patent, March 2013


Anomaly detection
patent, March 2008


Systems and methods for testing and evaluating an intrusion detection system
patent-application, November 2006


Apparatuses And Methods For Detecting Anomalous Event In Network
patent-application, June 2011


Predicting Attacks Based On Probabilistic Game-Theory
patent-application, November 2013


Features generation for use in computer network intrusion detection
patent, December 2003


Detect and qualify relationships between people and find the best path through the resulting social network
patent-application, June 2004


Intrusion Event Correlation System
patent-application, July 2010


Attack graph aggregation
patent, December 2009


Traffic Control System And Management Server
patent-application, April 2008


Using social graphs to combat malicious attacks
patent, April 2013


Distributed network management
patent, December 2011


Network security monitoring system
patent-application, July 2004


Method For Detecting Anomaly Action Within A Computer Network
patent-application, June 2014


Method and system for analyzing multidimensional data
patent-application, March 2006


Tactical And Strategic Attack Detection And Prediction
patent-application, September 2007


Methods and Systems for Determining Entropy Metrics for Networks
patent-application, January 2009


Method And Apparatus For Machine To Machine Network Security Monitoring In A Communications Network
patent-application, May 2013


Method of Detecting Anomalous Behaviour in a Computer Network
patent-application, October 2007


Database user behavior monitor system and method
patent-application, September 2005


Intrusion detection system
patent, October 2009


Proactive on-line diagnostics in a manageable network
patent-application, February 2002


Flow-based detection of network intrusions
patent-application, June 2003


System and Method for Assessing Whether a Communication Contains an Attack
patent-application, February 2014


Malware detection using clustering with malware source information
patent, July 2017


Probabilistic model for cyber risk forecasting
patent, June 2017


Systems And Methods For A Simulated Network Attack Generator
patent-application, December 2009


Device and Method for Detecting and Diagnosing Correlated Network Anomalies
patent-application, June 2011


Wireless network edge guardian
patent, November 2013


Method and apparatus for verifying the integrity and security of computer networks and implementing counter measures
patent-application, November 2002


Applying Antimalware Logic without Revealing the Antimalware Logic to Adversaries
patent-application, December 2012


Adaptive behavioral intrusion detection systems and methods
patent-application, February 2005


Method And Apparatus For Network Anomaly Detection
patent-application, November 2010


Systems and Methods for Virtualized Malware Detection
patent-application, May 2013


Generating A Multiple-Prerequisite Attack Graph
September 2011