Патент США № | 7639714 |
---|---|
Автор(ы) | Stolfo и др. |
Дата выдачи | 29 декабря 2009 г. |
A method, apparatus and medium are provided for detecting anomalous payloads transmitted through a network. The system receives payloads within the network and determines a length for data contained in each payload. A statistical distribution is generated for data contained in each payload received within the network, and compared to a selected model distribution representative of normal payloads transmitted through the network. The model payload can be selected such that it has a predetermined length range that encompasses the length for data contained in the received payload. Anomalous payloads are then identified based on differences detected between the statistical distribution of received payloads and the model distribution. The system can also provide for automatic training and incremental updating of models.
Авторы: | Salvatore J. Stolfo (Ridgewood, NJ), Ke Wang (Mountain View, CA) |
---|---|
Заявитель: | The Trustees of Columbia University in the City of New York (New York, NY) |
ID семейства патентов | 34594920 |
Номер заявки: | 10/986,447 |
Дата регистрации: | 12 ноября 2004 г. |
Document Identifier | Publication Date | |
---|---|---|
US 20050281291 A1 | Dec 22, 2005 | |
Application Number | Filing Date | Patent Number | Issue Date | ||
---|---|---|---|---|---|
60518742 | Nov 12, 2003 | ||||
60613637 | Sep 28, 2004 | ||||
Класс патентной классификации США: | 370/474; 726/13 |
Класс совместной патентной классификации: | G06F 21/554 (20130101); G06F 21/563 (20130101); H04L 63/029 (20130101); H04L 43/00 (20130101); H04L 63/145 (20130101); H04L 63/0245 (20130101); G06F 21/564 (20130101); G06F 21/562 (20130101); H04L 63/0263 (20130101); G06F 21/55 (20130101); G06F 21/56 (20130101); H04L 43/0876 (20130101); H04L 63/1425 (20130101); H04L 63/0218 (20130101); G06F 21/552 (20130101) |
Класс международной патентной классификации (МПК): | H04J 3/24 (20060101); G06F 9/00 (20060101) |
Область поиска: | ;370/229-231,235,250,252-253,389,392,401,476,470-472,474 ;713/176,188-189 ;726/1,3,11,13,14,22-25 ;709/223-225 |
5452442 | September 1995 | Kephart |
5761191 | June 1998 | VanDervort et al. |
5835888 | November 1998 | Kanevsky et al. |
6157905 | December 2000 | Powell |
6253337 | June 2001 | Maloney et al. |
6347374 | February 2002 | Drake et al. |
6587432 | July 2003 | Putzolu et al. |
6651099 | November 2003 | Dietz et al. |
6732149 | May 2004 | Kephart |
6785815 | August 2004 | Serret-Avila et al. |
6907430 | June 2005 | Chong et al. |
7023861 | April 2006 | Makinson et al. |
7031311 | April 2006 | MeLampy et al. |
7043759 | May 2006 | Kaashoek et al. |
7054930 | May 2006 | Cheriton |
7086089 | August 2006 | Hrastar et al. |
7181768 | February 2007 | Ghosh et al. |
7188173 | March 2007 | Anderson et al. |
7225468 | May 2007 | Waisman et al. |
7313100 | December 2007 | Turner et al. |
7331060 | February 2008 | Ricciulli |
7362707 | April 2008 | MeLampy et al. |
2002/0129140 | September 2002 | Peled et al. |
2002/0194490 | December 2002 | Halperin et al. |
2003/0014662 | January 2003 | Gupta et al. |
2004/0003284 | January 2004 | Campbell et al. |
2004/0024736 | February 2004 | Sakamoto et al. |
2004/0025044 | February 2004 | Day |
2004/0054498 | March 2004 | Shipp |
2004/0093513 | May 2004 | Cantrell et al. |
2004/0107361 | June 2004 | Redan et al. |
2004/0111632 | June 2004 | Halperin |
2005/0044208 | February 2005 | Jones et al. |
2005/0044406 | February 2005 | Stute |
2005/0265331 | December 2005 | Stolfo |
2006/0015630 | January 2006 | Stolfo et al. |
Fu et al., "On Countermeasures To Measures To Traffic Analysis Attacks", Jun. 2003, ISBN:0-7803-7808-3, pp. 188-195. cited by examiner . Park et al., "Anomaly Detection Scheme Using Data Mining in Mobile Environment", Jan. 1, 2003, ISBN 978-3-540-40121-2, pp. 978. cited by examiner . Stolfo et al. "Data Mining-Based Intrusion Detectors: An Overview of the Columbia IDS Project", Sep. 9, 2001, ISSN 0163-5808, pp. 5-14. cited by examiner . Armstrong, D. et al. "Controller-Based Autonomic Defense System." Proc. of DISCEX. (2003). cited by other . Damashek, M. "Gauging similarity with n-grams: language-independent categorization of text." Science, 267(5199):843-848. (1995). cited by other . Forrest, S. et al. "A Sense of self for Unix Processes." Proc. of IEEE Symposium on Computer Security and Privacy. (1996). cited by other . Ghosh, A. K. et al. "A study in using neural networks for anomaly and misuse detection." Proc. 8th USENIX Security Symposium. (1999). cited by other . Heberlein, L. T.; Mukherjee, B.; Levitt, K. N.: Internet Security Monitor: An Intrusion Detection System for Large-Scale Networks, in Proc. of the 15th National Computer Security Conference, Baltimore, MD, Oct. 1992, 262-271. cited by other . Heberlein, Todd. "Worm Detection and Prevention: Concept, approach and experience." Net Squared Inc. Report. (Aug. 14, 2002). cited by other . Javitz, H. S. and A. Valdes. "The NIDES statistical component: Description and justification." Technical report, SRI International, Computer Science Laboratory. (1994). cited by other . Knuth, D. E. "The Art of Computer Programming, vol. 1 Fundamental Algorithms." Addison-Wesley, 2nd edition. (1973). cited by other . Krugel, C. et al. "Service Specific Anomaly Detection for Network Instrusion Detection." In Symposium on Applied Computing (SAC); Spain. (Mar. 2002). cited by other . Lee, W. and S. Stolfo. "A Framework for Constructing Features and Models for Instrusion Detection Systems." ACM Transactions on Information and System Security, 3(4): 227-261. (Nov. 2000). cited by other . Lippmann, R. et al. "The 1999 DARPA Off-Line Intrusion Detection Evaluation." Computer Networks, 34(4):579-595. (2000). cited by other . Mahoney, M. "Network Traffic Anomaly Detection Based on Packet Bytes." Proc. ACM-SAC. (Feb. 3, 2003). cited by other . Mahoney, M. and P. K. Chan. "An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection." RAID, pp. 220-237. (2003). cited by other . Mahoney, M. and P. K. Chan. "Learning Models of Network Traffic for Detecting Novel Attacks." Florida Tech. Technical report, http://cs.fit.edu/tr/ (2002). cited by other . Mahoney, M. and P. K. Chan. "Learning Nonstationary Models of Normal Network Traffic for Detecting Novel Attacks." Proc. SIGKDD, pp. 376-385. (2002). cited by other . Paxson, V. "Bro: A system for detecting network intruders in real-time." USENIX Security Symposium. San Antonio, Texas. (1998). cited by other . Porras, P. and P. Neumann, "EMERALD: Event Monitoring Enabled Responses to Anomalous Live Disturbances." National Information Systems Security Conference. (1997). cited by other . Roesch, M. "Snort: Lightweight intrusion detection for networks." USENIX LISA Conference. (1999). cited by other . Schultz, M. G. et al. "MEF: Malicious Email Filter--A UNIX Mail Filter that Detects Malicious Windows Executables." USENIX Annual Technical Conference--FREENIX Track, Boston, MA. (Jun. 2001). cited by other . Sekar, R. et al. "Specification Based Anomaly Detection: A New Approach for Detecting Network Intrusions." Proc ACM CCS. (2002). cited by other . Staniford, S. et al. "Practical Automated Detection of Stealthy Portscans." Silicone Defense. (2000). cited by other . Staniford-Chen, Stuart and L. Todd Heberlein. "Holding Intruders Accountable on the Internet." Department of Computer Science, University of California at Davis (1994). cited by other . Taylor, C. and J. Alves-Foss. "NATE--Network Analysis of Anomalous Traffic Events, A Low-Cost approach." New Security Paradigms Workshop. (2001). cited by other . Vigna, G. and Kemmerer. "NetSTAT: A Network-based intrusion detection system." Journal of Computer Security, 7:37-71. (1999). cited by other . International Search Report and the Written Opinion of the International Searching Authority, International Patent Application No. PCT/US04/37653, Mar. 21, 2006. cited by other . International Search Report and the Written Opinion of the International Searching Authority, International Patent Application No. PCT/US04/37654, Mar. 20, 2006. cited by other . International Search Report and the Written Opinion of the International Searching Authority, International Patent Application No. PCT/US04/37650, Mar. 30, 2006. cited by other. |