Invention Grant
US07752665B1 Detecting probes and scans over high-bandwidth, long-term, incomplete network traffic information using limited memory
有权
使用有限的内存检测探测和扫描高带宽,长期,不完整的网络流量信息
- Patent Title: Detecting probes and scans over high-bandwidth, long-term, incomplete network traffic information using limited memory
- Patent Title (中): 使用有限的内存检测探测和扫描高带宽,长期,不完整的网络流量信息
-
Application No.: US10620156Application Date: 2003-07-14
-
Publication No.: US07752665B1Publication Date: 2010-07-06
- Inventor: Seth Jerome Robertson , Salvatore J. Stolfo
- Applicant: Seth Jerome Robertson , Salvatore J. Stolfo
- Applicant Address: US VA Hemdon
- Assignee: TCS Commercial, Inc.
- Current Assignee: TCS Commercial, Inc.
- Current Assignee Address: US VA Hemdon
- Agency: Woodcock Washburn LLP
- Main IPC: G06F11/30
- IPC: G06F11/30 ; G08B23/00 ; G06F12/14

Abstract:
A method for detecting surveillance activity in a computer communication network comprising automatic detection of malicious probes and scans and adaptive learning. Automatic scan/probe detection in turn comprises modeling network connections, detecting connections that are likely probes originating from malicious sources, and detecting scanning activity by grouping source addresses that are logically close to one another and by recognizing certain combinations of probes. The method is implemented in a scan/probe detector, preferably in combination with a commercial or open-source intrusion detection system and an anomaly detector. Once generated, the model monitors online activity to detect malicious behavior without any requirement for a priori knowledge of system behavior. This is referred to as “behavior-based” or “mining-based detection.” The three main components may be used separately or in combination with each other. The alerts produced by each may be presented to an analyst, used for generating reports (such as trend analysis), or correlated with alerts from other detectors. Through correlation, the invention prioritizes alerts, reduces the number of alerts presented to an analyst, and determines the most important alerts.
Information query