skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Non-harmful insertion of data mimicking computer network attacks

Patent ·
OSTI ID:1257984

Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

Research Organization:
Los Alamos National Laboratory (LANL), Los Alamos, NM (United States)
Sponsoring Organization:
USDOE
DOE Contract Number:
AC52-06NA25396
Assignee:
Los Alamos National Security, LLC (Los Alamos, NM)
Patent Number(s):
9,374,380
Application Number:
13/826,736
OSTI ID:
1257984
Resource Relation:
Patent File Date: 2013 Mar 14
Country of Publication:
United States
Language:
English

References (42)

The link-prediction problem for social networks
  • Liben-Nowell, David; Kleinberg, Jon
  • Journal of the American Society for Information Science and Technology, Vol. 58, Issue 7, p. 1019-1031 https://doi.org/10.1002/asi.20591
journal January 2007
A survey of coordinated attacks and collaborative intrusion detection journal February 2010
Alert correlation in a cooperative intrusion detection framework conference January 2002
Identifying botnets by capturing group activities in DNS traffic journal January 2012
Probabilistic Alert Correlation book January 2001
Scan Statistics for the Online Detection of Locally Anomalous Subgraphs journal August 2013
Two-tier data-driven intrusion detection for automatic generation control in smart grid conference December 2014
Features generation for use in computer network intrusion detection patent December 2003
Anomaly detection patent March 2008
Intrusion detection system patent October 2009
Attack graph aggregation patent December 2009
System and method for credit scoring using an identity network connectivity patent February 2013
Method and system for content distribution network security patent March 2013
Adaptive behavioral intrusion detection systems and methods patent May 2013
Wireless network edge guardian patent November 2013
Peer-to-peer (P2P) botnet tracking at backbone level patent January 2014
System and method for exposing malicious sources using mobile IP messages patent February 2014
Proactive on-line diagnostics in a manageable network patent-application February 2002
Method and apparatus for verifying the integrity and security of computer networks and implementing counter measures patent-application November 2002
Flow-based detection of network intrusions patent-application June 2003
Detect and qualify relationships between people and find the best path through the resulting social network patent-application June 2004
Network security monitoring system patent-application July 2004
Adaptive behavioral intrusion detection systems and methods patent-application February 2005
Database user behavior monitor system and method patent-application September 2005
Method and system for analyzing multidimensional data patent-application March 2006
Systems and methods for testing and evaluating an intrusion detection system patent-application November 2006
Intelligent intrusion detection system utilizing enhanced graph-matching of network activity with context data patent-application September 2007
Tactical And Strategic Attack Detection And Prediction patent-application September 2007
Method of Detecting Anomalous Behaviour in a Computer Network patent-application October 2007
Data Partitioning and Critical Section Reduction for Bayesian Network Structure Learning patent-application November 2008
Methods and Systems for Determining Entropy Metrics for Networks patent-application January 2009
Systems And Methods For A Simulated Network Attack Generator patent-application December 2009
Intrusion Event Correlation System patent-application July 2010
Apparatuses And Methods For Detecting Anomalous Event In Network patent-application June 2011
Device and Method for Detecting and Diagnosing Correlated Network Anomalies patent-application June 2011
Generating A Multiple-Prerequisite Attack Graph September 2011
Applying Antimalware Logic without Revealing the Antimalware Logic to Adversaries patent-application December 2012
Systems and Methods for Virtualized Malware Detection patent-application May 2013
Method And Apparatus For Machine To Machine Network Security Monitoring In A Communications Network patent-application May 2013
Predicting Attacks Based On Probabilistic Game-Theory patent-application November 2013
System and Method for Assessing Whether a Communication Contains an Attack patent-application February 2014
Method For Detecting Anomaly Action Within A Computer Network patent-application June 2014

Similar Records

Non-harmful insertion of data mimicking computer network attacks
Patent · Tue Nov 06 00:00:00 EST 2018 · OSTI ID:1257984

Non-harmful insertion of data mimicking computer network attacks
Patent · Tue Jan 07 00:00:00 EST 2020 · OSTI ID:1257984

A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks
Journal Article · Fri Mar 11 00:00:00 EST 2016 · Journal of Network and Computer Applications · OSTI ID:1257984

Related Subjects