skip to main content
DOE Patents title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Non-harmful insertion of data mimicking computer network attacks

Abstract

Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

Inventors:
; ; ; ; ; ;
Issue Date:
Research Org.:
Los Alamos National Lab. (LANL), Los Alamos, NM (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1632421
Patent Number(s):
10530799
Application Number:
16/168,956
Assignee:
Triad National Security, LLC (Los Alamos, NM)
Patent Classifications (CPCs):
G - PHYSICS G06 - COMPUTING G06F - ELECTRIC DIGITAL DATA PROCESSING
H - ELECTRICITY H04 - ELECTRIC COMMUNICATION TECHNIQUE H04L - TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
DOE Contract Number:  
AC52-06NA25396
Resource Type:
Patent
Resource Relation:
Patent File Date: 10/24/2018
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS AND COMPUTING

Citation Formats

Neil, Joshua, Kent, Alexander, Hash, Jr., Curtis, Fisk, Michael, Brugh, Alexander, Storlie, Curtis, and Uphoff, Benjamin. Non-harmful insertion of data mimicking computer network attacks. United States: N. p., 2020. Web.
Neil, Joshua, Kent, Alexander, Hash, Jr., Curtis, Fisk, Michael, Brugh, Alexander, Storlie, Curtis, & Uphoff, Benjamin. Non-harmful insertion of data mimicking computer network attacks. United States.
Neil, Joshua, Kent, Alexander, Hash, Jr., Curtis, Fisk, Michael, Brugh, Alexander, Storlie, Curtis, and Uphoff, Benjamin. Tue . "Non-harmful insertion of data mimicking computer network attacks". United States. https://www.osti.gov/servlets/purl/1632421.
@article{osti_1632421,
title = {Non-harmful insertion of data mimicking computer network attacks},
author = {Neil, Joshua and Kent, Alexander and Hash, Jr., Curtis and Fisk, Michael and Brugh, Alexander and Storlie, Curtis and Uphoff, Benjamin},
abstractNote = {Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2020},
month = {1}
}

Patent:

Save / Share:

Works referenced in this record:

Machine learning based botnet detection using real-time connectivity graph based traffic features
patent, June 2014


Method and system for content distribution network security
patent, March 2013


Anomaly detection
patent, March 2008


Features generation for use in computer network intrusion detection
patent, December 2003


Attack graph aggregation
patent, December 2009


Using social graphs to combat malicious attacks
patent, April 2013


Distributed network management
patent, December 2011


System and method for credit scoring using an identity network connectivity
patent, February 2013


Intrusion detection system
patent, October 2009


Malware detection using clustering with malware source information
patent, July 2017


Peer-to-peer (P2P) botnet tracking at backbone level
patent, January 2014


Probabilistic model for cyber risk forecasting
patent, June 2017


Systems And Methods For A Simulated Network Attack Generator
patent-application, December 2009


Wireless network edge guardian
patent, November 2013


System and method for exposing malicious sources using mobile IP messages
patent, February 2014