BR0318459A - sistema de detecção de intrusão e método para detectar uso não autorizado de uma rede de comunicação - Google Patents

sistema de detecção de intrusão e método para detectar uso não autorizado de uma rede de comunicação

Info

Publication number
BR0318459A
BR0318459A BRPI0318459-5A BR0318459A BR0318459A BR 0318459 A BR0318459 A BR 0318459A BR 0318459 A BR0318459 A BR 0318459A BR 0318459 A BR0318459 A BR 0318459A
Authority
BR
Brazil
Prior art keywords
intrusion detection
detection system
response
network
communication network
Prior art date
Application number
BRPI0318459-5A
Other languages
English (en)
Inventor
Paolo Abeni
Original Assignee
Telecom Italia Spa
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telecom Italia Spa filed Critical Telecom Italia Spa
Publication of BR0318459A publication Critical patent/BR0318459A/pt

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Selective Calling Equipment (AREA)

Abstract

"SISTEMA DE DETECçãO DE INTRUSãO E MéTODO PARA DETECTAR USO NãO AUTORIZADO DE UMA REDE DE COMUNICAçãO". Um sistema (6) para detecção de uso não autorizado de uma rede é provido com um motor de correspondência de padrões (16) para pesquisar assinaturas de ataque em pacotes de dados, e com um motor de análise de resposta (18) para detectar assinaturas de resposta em pacotes de dados enviados de volta a partir de um/a rede/computador atacada/o. Quando uma assinatura suspeita tiver sido detectada em um pacote, o sistema entra em um estado de alarme, iniciando um processo de monitoração dos pacotes enviados de volta a partir da rede/computador potencialmente atacada/o. Um alarme é gerado apenas no caso em que a análise dos pacotes de dados produzir também um resultado positivo. Tal sistema de detecção de intrusão é muito menos incidente a positivos falsos e a diagnósticos deficientes que um convencional sistema de detecção de intrusão por correspondência de padrões.
BRPI0318459-5A 2003-08-11 2003-08-11 sistema de detecção de intrusão e método para detectar uso não autorizado de uma rede de comunicação BR0318459A (pt)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IT2003/000505 WO2005015370A1 (en) 2003-08-11 2003-08-11 Method and system for detecting unauthorised use of a communication network

Publications (1)

Publication Number Publication Date
BR0318459A true BR0318459A (pt) 2006-09-12

Family

ID=34131154

Family Applications (1)

Application Number Title Priority Date Filing Date
BRPI0318459-5A BR0318459A (pt) 2003-08-11 2003-08-11 sistema de detecção de intrusão e método para detectar uso não autorizado de uma rede de comunicação

Country Status (9)

Country Link
US (1) US8006302B2 (pt)
EP (1) EP1654608B1 (pt)
AT (1) ATE400016T1 (pt)
AU (1) AU2003279517A1 (pt)
BR (1) BR0318459A (pt)
CA (1) CA2533853C (pt)
DE (1) DE60321972D1 (pt)
ES (1) ES2309364T3 (pt)
WO (1) WO2005015370A1 (pt)

Families Citing this family (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8352400B2 (en) 1991-12-23 2013-01-08 Hoffberg Steven M Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore
US8574074B2 (en) 2005-09-30 2013-11-05 Sony Computer Entertainment America Llc Advertising impression determination
US7904187B2 (en) 1999-02-01 2011-03-08 Hoffberg Steven M Internet appliance system and method
US8751310B2 (en) 2005-09-30 2014-06-10 Sony Computer Entertainment America Llc Monitoring advertisement impressions
BR0318459A (pt) * 2003-08-11 2006-09-12 Telecom Italia Spa sistema de detecção de intrusão e método para detectar uso não autorizado de uma rede de comunicação
US7503071B1 (en) * 2003-10-01 2009-03-10 Symantec Corporation Network traffic identification by waveform analysis
EP1730917A1 (en) 2004-03-30 2006-12-13 Telecom Italia S.p.A. Method and system for network intrusion detection, related network and computer program product
US7966658B2 (en) * 2004-04-08 2011-06-21 The Regents Of The University Of California Detecting public network attacks using signatures and fast content analysis
US7660999B2 (en) 2004-06-22 2010-02-09 Microsoft Corporation MIME handling security enforcement
US8763157B2 (en) 2004-08-23 2014-06-24 Sony Computer Entertainment America Llc Statutory license restricted digital media playback on portable devices
US8010685B2 (en) * 2004-11-09 2011-08-30 Cisco Technology, Inc. Method and apparatus for content classification
US7936682B2 (en) * 2004-11-09 2011-05-03 Cisco Technology, Inc. Detecting malicious attacks using network behavior and header analysis
GB2422507A (en) * 2005-01-21 2006-07-26 3Com Corp An intrusion detection system using a plurality of finite state machines
US20120096548A1 (en) * 2005-03-24 2012-04-19 International Business Machines Corporation Network attack detection
US8626584B2 (en) 2005-09-30 2014-01-07 Sony Computer Entertainment America Llc Population of an advertisement reference list
US20070118425A1 (en) 2005-10-25 2007-05-24 Podbridge, Inc. User device agent for asynchronous advertising in time and space shifted media network
US10657538B2 (en) 2005-10-25 2020-05-19 Sony Interactive Entertainment LLC Resolution of advertising rules
US8676900B2 (en) 2005-10-25 2014-03-18 Sony Computer Entertainment America Llc Asynchronous advertising placement based on metadata
US11004089B2 (en) 2005-10-25 2021-05-11 Sony Interactive Entertainment LLC Associating media content files with advertisements
US8510596B1 (en) * 2006-02-09 2013-08-13 Virsec Systems, Inc. System and methods for run time detection and correction of memory corruption
CN101438526B (zh) 2006-05-05 2013-03-13 美国索尼电脑娱乐公司 广告旋转
US8429746B2 (en) 2006-05-22 2013-04-23 Neuraliq, Inc. Decoy network technology with automatic signature generation for intrusion detection and intrusion prevention systems
US20140373144A9 (en) 2006-05-22 2014-12-18 Alen Capalik System and method for analyzing unauthorized intrusion into a computer network
US8209738B2 (en) * 2007-05-31 2012-06-26 The Board Of Trustees Of The University Of Illinois Analysis of distributed policy rule-sets for compliance with global policy
US8769558B2 (en) 2008-02-12 2014-07-01 Sony Computer Entertainment America Llc Discovery and analytics for episodic downloaded media
US8763090B2 (en) 2009-08-11 2014-06-24 Sony Computer Entertainment America Llc Management of ancillary content delivery and presentation
US9106697B2 (en) 2010-06-24 2015-08-11 NeurallQ, Inc. System and method for identifying unauthorized activities on a computer system using a data structure model
US8789189B2 (en) 2010-06-24 2014-07-22 NeurallQ, Inc. System and method for sampling forensic data of unauthorized activities using executability states
US9043912B2 (en) * 2013-03-15 2015-05-26 Mehdi Mahvi Method for thwarting application layer hypertext transport protocol flood attacks focused on consecutively similar application-specific data packets
KR102368170B1 (ko) 2013-09-12 2022-02-25 버섹 시스템즈, 인코포레이션 멀웨어의 자동화된 런타임 검출
KR101732889B1 (ko) * 2013-11-04 2017-05-08 한국전자통신연구원 임베디드 시스템에서 쉘 커맨드의 안전 실행 보장 장치 및 방법
US9584492B2 (en) * 2014-06-23 2017-02-28 Vmware, Inc. Cryptographic proxy service
AU2015279920B2 (en) 2014-06-24 2018-03-29 Virsec Systems, Inc. Automated root cause analysis of single or N-TIERED applications
US10354074B2 (en) 2014-06-24 2019-07-16 Virsec Systems, Inc. System and methods for automated detection of input and output validation and resource management vulnerability
US10075467B2 (en) * 2014-11-26 2018-09-11 Verisign, Inc. Systems, devices, and methods for improved network security
WO2016112219A1 (en) 2015-01-07 2016-07-14 CounterTack, Inc. System and method for monitoring a computer system using machine interpretable code
RU2601148C1 (ru) * 2015-06-30 2016-10-27 Закрытое акционерное общество "Лаборатория Касперского" Система и способ выявления аномалий при подключении устройств
EP3122016B1 (de) 2015-07-22 2020-01-08 Siemens Aktiengesellschaft Automatisierungsnetzwerk und verfahren zur überwachung der sicherheit der übertragung von datenpaketen
KR102419574B1 (ko) 2016-06-16 2022-07-11 버섹 시스템즈, 인코포레이션 컴퓨터 애플리케이션에서 메모리 손상을 교정하기 위한 시스템 및 방법
AU2018298640B2 (en) * 2017-07-12 2021-01-07 Ntt, Inc. Determination device, determination method, and determination program
US10592372B2 (en) * 2017-07-18 2020-03-17 Vmware, Inc. Confidence-controlled sampling methods and systems to analyze high-frequency monitoring data and event messages of a distributed computing system
US10826919B2 (en) * 2018-10-29 2020-11-03 Acronis International Gmbh Methods and cloud-based systems for protecting devices from malwares
US11126713B2 (en) * 2019-04-08 2021-09-21 Microsoft Technology Licensing, Llc Detecting directory reconnaissance in a directory service

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2536567B2 (ja) 1987-12-17 1996-09-18 株式会社日立製作所 双方向推論の高速処理方式
JP2994926B2 (ja) 1993-10-29 1999-12-27 松下電器産業株式会社 有限状態機械作成方法とパターン照合機械作成方法とこれらを変形する方法および駆動方法
US6499107B1 (en) 1998-12-29 2002-12-24 Cisco Technology, Inc. Method and system for adaptive network security using intelligent packet analysis
US6477651B1 (en) 1999-01-08 2002-11-05 Cisco Technology, Inc. Intrusion detection system and method having dynamically loaded signatures
US6381242B1 (en) * 2000-08-29 2002-04-30 Netrake Corporation Content processor
WO2002045380A2 (en) 2000-11-30 2002-06-06 Lancope, Inc. Flow-based detection of network intrusions
US7301899B2 (en) * 2001-01-31 2007-11-27 Comverse Ltd. Prevention of bandwidth congestion in a denial of service or other internet-based attack
US7246376B2 (en) * 2001-05-03 2007-07-17 Nortel Networks Limited Method and apparatus for security management in a networked environment
US7234168B2 (en) 2001-06-13 2007-06-19 Mcafee, Inc. Hierarchy-based method and apparatus for detecting attacks on a computer system
US20030101353A1 (en) * 2001-10-31 2003-05-29 Tarquini Richard Paul Method, computer-readable medium, and node for detecting exploits based on an inbound signature of the exploit and an outbound signature in response thereto
US7257630B2 (en) * 2002-01-15 2007-08-14 Mcafee, Inc. System and method for network vulnerability detection and reporting
DE60210408T2 (de) 2002-01-18 2006-10-19 Stonesoft Corp. Ueberwachung des Datenflusses zur Verbesserung des Netzwerksicherheitsschutzes
US7174566B2 (en) * 2002-02-01 2007-02-06 Intel Corporation Integrated network intrusion detection
DE60334368D1 (de) * 2002-03-29 2010-11-11 Cisco Tech Inc Verfahren und system zur verringerung der falschalarmrate von netzwerk-eindringdetektionssystemen
US7437760B2 (en) * 2002-10-10 2008-10-14 International Business Machines Corporation Antiviral network system
KR100456634B1 (ko) * 2002-10-31 2004-11-10 한국전자통신연구원 정책기반 침입 탐지 및 대응을 위한 경보 전달 장치 및 방법
US6898632B2 (en) * 2003-03-31 2005-05-24 Finisar Corporation Network security tap for use with intrusion detection system
US7681235B2 (en) * 2003-05-19 2010-03-16 Radware Ltd. Dynamic network protection
US8220052B2 (en) * 2003-06-10 2012-07-10 International Business Machines Corporation Application based intrusion detection
BR0318459A (pt) * 2003-08-11 2006-09-12 Telecom Italia Spa sistema de detecção de intrusão e método para detectar uso não autorizado de uma rede de comunicação
EP1730917A1 (en) * 2004-03-30 2006-12-13 Telecom Italia S.p.A. Method and system for network intrusion detection, related network and computer program product
US7624448B2 (en) * 2006-03-04 2009-11-24 21St Century Technologies, Inc. Intelligent intrusion detection system utilizing enhanced graph-matching of network activity with context data
WO2007110093A1 (en) * 2006-03-27 2007-10-04 Telecom Italia S.P.A. A method and system for identifying malicious messages in mobile communication networks, related network and computer program product therefor

Also Published As

Publication number Publication date
EP1654608A1 (en) 2006-05-10
EP1654608B1 (en) 2008-07-02
AU2003279517A1 (en) 2005-02-25
WO2005015370A1 (en) 2005-02-17
DE60321972D1 (de) 2008-08-14
CA2533853C (en) 2013-01-08
US20060242703A1 (en) 2006-10-26
ATE400016T1 (de) 2008-07-15
CA2533853A1 (en) 2005-02-17
US8006302B2 (en) 2011-08-23
ES2309364T3 (es) 2008-12-16

Similar Documents

Publication Publication Date Title
BR0318459A (pt) sistema de detecção de intrusão e método para detectar uso não autorizado de uma rede de comunicação
Hubballi et al. False alarm minimization techniques in signature-based intrusion detection systems: A survey
EP1995929B1 (en) Distributed system for the detection of eThreats
Venugopal et al. Efficient signature based malware detection on mobile devices
CN113079150B (zh) 一种电力终端设备入侵检测方法
ATE483310T1 (de) Verfahren und system zur verringerung der falschalarmrate von netzwerk- eindringdetektionssystemen
CN105208037A (zh) 一种基于轻量级入侵检测的DoS/DDoS攻击检测和过滤方法
Yan et al. Early detection of cyber security threats using structured behavior modeling
Tarness et al. Introducing dynamic entropy layer profiling: A novel approach for ransomware detection through behavioral feature analysis
Kaur et al. Efficient hybrid technique for detecting zero-day polymorphic worms
Nalavade et al. Mining association rules to evade network intrusion in network audit data
CN107493258A (zh) 一种基于网络安全的入侵检测系统
KR20130093841A (ko) 관계형 공격 패턴을 이용하는 침입 차단 시스템 및 방법
CN116827655A (zh) 流量检测加速方法和系统、电子设备及存储介质
Nuralievich et al. Method of detection and elimination of tracks of attacks in the information system
CN106878338B (zh) 远动设备网关防火墙一体机系统
Kaur et al. Automatic evaluation and signature generation technique for thwarting zero-day attacks
Zhang et al. Analysis of payload based application level network anomaly detection
Maslan et al. DDoS detection on network protocol using cosine similarity and N-Gram+ Method
Ochieng et al. A tour of the computer worm detection space
CN107623677A (zh) 数据安全性的确定方法和装置
Bing et al. Data mining approaches for signatures search in network intrusion detection
Kijewski Automated extraction of threat signatures from network flows
Yin et al. Network Attack Characteristics of Automatic Data Extraction Technology
Ping et al. Alert correlation through results tracing back to reasons

Legal Events

Date Code Title Description
B08F Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette]

Free format text: REFERENTE A 12A ANUIDADE.

B08K Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette]

Free format text: EM VIRTUDE DO ARQUIVAMENTO PUBLICADO NA RPI 2318 DE 09-06-2015 E CONSIDERANDO AUSENCIA DE MANIFESTACAO DENTRO DOS PRAZOS LEGAIS, INFORMO QUE CABE SER MANTIDO O ARQUIVAMENTO DO PEDIDO DE PATENTE, CONFORME O DISPOSTO NO ARTIGO 12, DA RESOLUCAO 113/2013.