BR0318459A - sistema de detecção de intrusão e método para detectar uso não autorizado de uma rede de comunicação - Google Patents
sistema de detecção de intrusão e método para detectar uso não autorizado de uma rede de comunicaçãoInfo
- Publication number
- BR0318459A BR0318459A BRPI0318459-5A BR0318459A BR0318459A BR 0318459 A BR0318459 A BR 0318459A BR 0318459 A BR0318459 A BR 0318459A BR 0318459 A BR0318459 A BR 0318459A
- Authority
- BR
- Brazil
- Prior art keywords
- intrusion detection
- detection system
- response
- network
- communication network
- Prior art date
Links
- 238000001514 detection method Methods 0.000 title abstract 3
- 238000000034 method Methods 0.000 title 1
- 238000012544 monitoring process Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Selective Calling Equipment (AREA)
Abstract
"SISTEMA DE DETECçãO DE INTRUSãO E MéTODO PARA DETECTAR USO NãO AUTORIZADO DE UMA REDE DE COMUNICAçãO". Um sistema (6) para detecção de uso não autorizado de uma rede é provido com um motor de correspondência de padrões (16) para pesquisar assinaturas de ataque em pacotes de dados, e com um motor de análise de resposta (18) para detectar assinaturas de resposta em pacotes de dados enviados de volta a partir de um/a rede/computador atacada/o. Quando uma assinatura suspeita tiver sido detectada em um pacote, o sistema entra em um estado de alarme, iniciando um processo de monitoração dos pacotes enviados de volta a partir da rede/computador potencialmente atacada/o. Um alarme é gerado apenas no caso em que a análise dos pacotes de dados produzir também um resultado positivo. Tal sistema de detecção de intrusão é muito menos incidente a positivos falsos e a diagnósticos deficientes que um convencional sistema de detecção de intrusão por correspondência de padrões.
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/IT2003/000505 WO2005015370A1 (en) | 2003-08-11 | 2003-08-11 | Method and system for detecting unauthorised use of a communication network |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| BR0318459A true BR0318459A (pt) | 2006-09-12 |
Family
ID=34131154
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| BRPI0318459-5A BR0318459A (pt) | 2003-08-11 | 2003-08-11 | sistema de detecção de intrusão e método para detectar uso não autorizado de uma rede de comunicação |
Country Status (9)
| Country | Link |
|---|---|
| US (1) | US8006302B2 (pt) |
| EP (1) | EP1654608B1 (pt) |
| AT (1) | ATE400016T1 (pt) |
| AU (1) | AU2003279517A1 (pt) |
| BR (1) | BR0318459A (pt) |
| CA (1) | CA2533853C (pt) |
| DE (1) | DE60321972D1 (pt) |
| ES (1) | ES2309364T3 (pt) |
| WO (1) | WO2005015370A1 (pt) |
Families Citing this family (43)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8352400B2 (en) | 1991-12-23 | 2013-01-08 | Hoffberg Steven M | Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore |
| US8574074B2 (en) | 2005-09-30 | 2013-11-05 | Sony Computer Entertainment America Llc | Advertising impression determination |
| US7904187B2 (en) | 1999-02-01 | 2011-03-08 | Hoffberg Steven M | Internet appliance system and method |
| US8751310B2 (en) | 2005-09-30 | 2014-06-10 | Sony Computer Entertainment America Llc | Monitoring advertisement impressions |
| BR0318459A (pt) * | 2003-08-11 | 2006-09-12 | Telecom Italia Spa | sistema de detecção de intrusão e método para detectar uso não autorizado de uma rede de comunicação |
| US7503071B1 (en) * | 2003-10-01 | 2009-03-10 | Symantec Corporation | Network traffic identification by waveform analysis |
| EP1730917A1 (en) | 2004-03-30 | 2006-12-13 | Telecom Italia S.p.A. | Method and system for network intrusion detection, related network and computer program product |
| US7966658B2 (en) * | 2004-04-08 | 2011-06-21 | The Regents Of The University Of California | Detecting public network attacks using signatures and fast content analysis |
| US7660999B2 (en) | 2004-06-22 | 2010-02-09 | Microsoft Corporation | MIME handling security enforcement |
| US8763157B2 (en) | 2004-08-23 | 2014-06-24 | Sony Computer Entertainment America Llc | Statutory license restricted digital media playback on portable devices |
| US8010685B2 (en) * | 2004-11-09 | 2011-08-30 | Cisco Technology, Inc. | Method and apparatus for content classification |
| US7936682B2 (en) * | 2004-11-09 | 2011-05-03 | Cisco Technology, Inc. | Detecting malicious attacks using network behavior and header analysis |
| GB2422507A (en) * | 2005-01-21 | 2006-07-26 | 3Com Corp | An intrusion detection system using a plurality of finite state machines |
| US20120096548A1 (en) * | 2005-03-24 | 2012-04-19 | International Business Machines Corporation | Network attack detection |
| US8626584B2 (en) | 2005-09-30 | 2014-01-07 | Sony Computer Entertainment America Llc | Population of an advertisement reference list |
| US20070118425A1 (en) | 2005-10-25 | 2007-05-24 | Podbridge, Inc. | User device agent for asynchronous advertising in time and space shifted media network |
| US10657538B2 (en) | 2005-10-25 | 2020-05-19 | Sony Interactive Entertainment LLC | Resolution of advertising rules |
| US8676900B2 (en) | 2005-10-25 | 2014-03-18 | Sony Computer Entertainment America Llc | Asynchronous advertising placement based on metadata |
| US11004089B2 (en) | 2005-10-25 | 2021-05-11 | Sony Interactive Entertainment LLC | Associating media content files with advertisements |
| US8510596B1 (en) * | 2006-02-09 | 2013-08-13 | Virsec Systems, Inc. | System and methods for run time detection and correction of memory corruption |
| CN101438526B (zh) | 2006-05-05 | 2013-03-13 | 美国索尼电脑娱乐公司 | 广告旋转 |
| US8429746B2 (en) | 2006-05-22 | 2013-04-23 | Neuraliq, Inc. | Decoy network technology with automatic signature generation for intrusion detection and intrusion prevention systems |
| US20140373144A9 (en) | 2006-05-22 | 2014-12-18 | Alen Capalik | System and method for analyzing unauthorized intrusion into a computer network |
| US8209738B2 (en) * | 2007-05-31 | 2012-06-26 | The Board Of Trustees Of The University Of Illinois | Analysis of distributed policy rule-sets for compliance with global policy |
| US8769558B2 (en) | 2008-02-12 | 2014-07-01 | Sony Computer Entertainment America Llc | Discovery and analytics for episodic downloaded media |
| US8763090B2 (en) | 2009-08-11 | 2014-06-24 | Sony Computer Entertainment America Llc | Management of ancillary content delivery and presentation |
| US9106697B2 (en) | 2010-06-24 | 2015-08-11 | NeurallQ, Inc. | System and method for identifying unauthorized activities on a computer system using a data structure model |
| US8789189B2 (en) | 2010-06-24 | 2014-07-22 | NeurallQ, Inc. | System and method for sampling forensic data of unauthorized activities using executability states |
| US9043912B2 (en) * | 2013-03-15 | 2015-05-26 | Mehdi Mahvi | Method for thwarting application layer hypertext transport protocol flood attacks focused on consecutively similar application-specific data packets |
| KR102368170B1 (ko) | 2013-09-12 | 2022-02-25 | 버섹 시스템즈, 인코포레이션 | 멀웨어의 자동화된 런타임 검출 |
| KR101732889B1 (ko) * | 2013-11-04 | 2017-05-08 | 한국전자통신연구원 | 임베디드 시스템에서 쉘 커맨드의 안전 실행 보장 장치 및 방법 |
| US9584492B2 (en) * | 2014-06-23 | 2017-02-28 | Vmware, Inc. | Cryptographic proxy service |
| AU2015279920B2 (en) | 2014-06-24 | 2018-03-29 | Virsec Systems, Inc. | Automated root cause analysis of single or N-TIERED applications |
| US10354074B2 (en) | 2014-06-24 | 2019-07-16 | Virsec Systems, Inc. | System and methods for automated detection of input and output validation and resource management vulnerability |
| US10075467B2 (en) * | 2014-11-26 | 2018-09-11 | Verisign, Inc. | Systems, devices, and methods for improved network security |
| WO2016112219A1 (en) | 2015-01-07 | 2016-07-14 | CounterTack, Inc. | System and method for monitoring a computer system using machine interpretable code |
| RU2601148C1 (ru) * | 2015-06-30 | 2016-10-27 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ выявления аномалий при подключении устройств |
| EP3122016B1 (de) | 2015-07-22 | 2020-01-08 | Siemens Aktiengesellschaft | Automatisierungsnetzwerk und verfahren zur überwachung der sicherheit der übertragung von datenpaketen |
| KR102419574B1 (ko) | 2016-06-16 | 2022-07-11 | 버섹 시스템즈, 인코포레이션 | 컴퓨터 애플리케이션에서 메모리 손상을 교정하기 위한 시스템 및 방법 |
| AU2018298640B2 (en) * | 2017-07-12 | 2021-01-07 | Ntt, Inc. | Determination device, determination method, and determination program |
| US10592372B2 (en) * | 2017-07-18 | 2020-03-17 | Vmware, Inc. | Confidence-controlled sampling methods and systems to analyze high-frequency monitoring data and event messages of a distributed computing system |
| US10826919B2 (en) * | 2018-10-29 | 2020-11-03 | Acronis International Gmbh | Methods and cloud-based systems for protecting devices from malwares |
| US11126713B2 (en) * | 2019-04-08 | 2021-09-21 | Microsoft Technology Licensing, Llc | Detecting directory reconnaissance in a directory service |
Family Cites Families (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2536567B2 (ja) | 1987-12-17 | 1996-09-18 | 株式会社日立製作所 | 双方向推論の高速処理方式 |
| JP2994926B2 (ja) | 1993-10-29 | 1999-12-27 | 松下電器産業株式会社 | 有限状態機械作成方法とパターン照合機械作成方法とこれらを変形する方法および駆動方法 |
| US6499107B1 (en) | 1998-12-29 | 2002-12-24 | Cisco Technology, Inc. | Method and system for adaptive network security using intelligent packet analysis |
| US6477651B1 (en) | 1999-01-08 | 2002-11-05 | Cisco Technology, Inc. | Intrusion detection system and method having dynamically loaded signatures |
| US6381242B1 (en) * | 2000-08-29 | 2002-04-30 | Netrake Corporation | Content processor |
| WO2002045380A2 (en) | 2000-11-30 | 2002-06-06 | Lancope, Inc. | Flow-based detection of network intrusions |
| US7301899B2 (en) * | 2001-01-31 | 2007-11-27 | Comverse Ltd. | Prevention of bandwidth congestion in a denial of service or other internet-based attack |
| US7246376B2 (en) * | 2001-05-03 | 2007-07-17 | Nortel Networks Limited | Method and apparatus for security management in a networked environment |
| US7234168B2 (en) | 2001-06-13 | 2007-06-19 | Mcafee, Inc. | Hierarchy-based method and apparatus for detecting attacks on a computer system |
| US20030101353A1 (en) * | 2001-10-31 | 2003-05-29 | Tarquini Richard Paul | Method, computer-readable medium, and node for detecting exploits based on an inbound signature of the exploit and an outbound signature in response thereto |
| US7257630B2 (en) * | 2002-01-15 | 2007-08-14 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
| DE60210408T2 (de) | 2002-01-18 | 2006-10-19 | Stonesoft Corp. | Ueberwachung des Datenflusses zur Verbesserung des Netzwerksicherheitsschutzes |
| US7174566B2 (en) * | 2002-02-01 | 2007-02-06 | Intel Corporation | Integrated network intrusion detection |
| DE60334368D1 (de) * | 2002-03-29 | 2010-11-11 | Cisco Tech Inc | Verfahren und system zur verringerung der falschalarmrate von netzwerk-eindringdetektionssystemen |
| US7437760B2 (en) * | 2002-10-10 | 2008-10-14 | International Business Machines Corporation | Antiviral network system |
| KR100456634B1 (ko) * | 2002-10-31 | 2004-11-10 | 한국전자통신연구원 | 정책기반 침입 탐지 및 대응을 위한 경보 전달 장치 및 방법 |
| US6898632B2 (en) * | 2003-03-31 | 2005-05-24 | Finisar Corporation | Network security tap for use with intrusion detection system |
| US7681235B2 (en) * | 2003-05-19 | 2010-03-16 | Radware Ltd. | Dynamic network protection |
| US8220052B2 (en) * | 2003-06-10 | 2012-07-10 | International Business Machines Corporation | Application based intrusion detection |
| BR0318459A (pt) * | 2003-08-11 | 2006-09-12 | Telecom Italia Spa | sistema de detecção de intrusão e método para detectar uso não autorizado de uma rede de comunicação |
| EP1730917A1 (en) * | 2004-03-30 | 2006-12-13 | Telecom Italia S.p.A. | Method and system for network intrusion detection, related network and computer program product |
| US7624448B2 (en) * | 2006-03-04 | 2009-11-24 | 21St Century Technologies, Inc. | Intelligent intrusion detection system utilizing enhanced graph-matching of network activity with context data |
| WO2007110093A1 (en) * | 2006-03-27 | 2007-10-04 | Telecom Italia S.P.A. | A method and system for identifying malicious messages in mobile communication networks, related network and computer program product therefor |
-
2003
- 2003-08-11 BR BRPI0318459-5A patent/BR0318459A/pt not_active IP Right Cessation
- 2003-08-11 CA CA2533853A patent/CA2533853C/en not_active Expired - Lifetime
- 2003-08-11 AT AT03772624T patent/ATE400016T1/de not_active IP Right Cessation
- 2003-08-11 AU AU2003279517A patent/AU2003279517A1/en not_active Abandoned
- 2003-08-11 ES ES03772624T patent/ES2309364T3/es not_active Expired - Lifetime
- 2003-08-11 DE DE60321972T patent/DE60321972D1/de not_active Expired - Lifetime
- 2003-08-11 US US10/567,752 patent/US8006302B2/en active Active
- 2003-08-11 WO PCT/IT2003/000505 patent/WO2005015370A1/en not_active Ceased
- 2003-08-11 EP EP03772624A patent/EP1654608B1/en not_active Expired - Lifetime
Also Published As
| Publication number | Publication date |
|---|---|
| EP1654608A1 (en) | 2006-05-10 |
| EP1654608B1 (en) | 2008-07-02 |
| AU2003279517A1 (en) | 2005-02-25 |
| WO2005015370A1 (en) | 2005-02-17 |
| DE60321972D1 (de) | 2008-08-14 |
| CA2533853C (en) | 2013-01-08 |
| US20060242703A1 (en) | 2006-10-26 |
| ATE400016T1 (de) | 2008-07-15 |
| CA2533853A1 (en) | 2005-02-17 |
| US8006302B2 (en) | 2011-08-23 |
| ES2309364T3 (es) | 2008-12-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| BR0318459A (pt) | sistema de detecção de intrusão e método para detectar uso não autorizado de uma rede de comunicação | |
| Hubballi et al. | False alarm minimization techniques in signature-based intrusion detection systems: A survey | |
| EP1995929B1 (en) | Distributed system for the detection of eThreats | |
| Venugopal et al. | Efficient signature based malware detection on mobile devices | |
| CN113079150B (zh) | 一种电力终端设备入侵检测方法 | |
| ATE483310T1 (de) | Verfahren und system zur verringerung der falschalarmrate von netzwerk- eindringdetektionssystemen | |
| CN105208037A (zh) | 一种基于轻量级入侵检测的DoS/DDoS攻击检测和过滤方法 | |
| Yan et al. | Early detection of cyber security threats using structured behavior modeling | |
| Tarness et al. | Introducing dynamic entropy layer profiling: A novel approach for ransomware detection through behavioral feature analysis | |
| Kaur et al. | Efficient hybrid technique for detecting zero-day polymorphic worms | |
| Nalavade et al. | Mining association rules to evade network intrusion in network audit data | |
| CN107493258A (zh) | 一种基于网络安全的入侵检测系统 | |
| KR20130093841A (ko) | 관계형 공격 패턴을 이용하는 침입 차단 시스템 및 방법 | |
| CN116827655A (zh) | 流量检测加速方法和系统、电子设备及存储介质 | |
| Nuralievich et al. | Method of detection and elimination of tracks of attacks in the information system | |
| CN106878338B (zh) | 远动设备网关防火墙一体机系统 | |
| Kaur et al. | Automatic evaluation and signature generation technique for thwarting zero-day attacks | |
| Zhang et al. | Analysis of payload based application level network anomaly detection | |
| Maslan et al. | DDoS detection on network protocol using cosine similarity and N-Gram+ Method | |
| Ochieng et al. | A tour of the computer worm detection space | |
| CN107623677A (zh) | 数据安全性的确定方法和装置 | |
| Bing et al. | Data mining approaches for signatures search in network intrusion detection | |
| Kijewski | Automated extraction of threat signatures from network flows | |
| Yin et al. | Network Attack Characteristics of Automatic Data Extraction Technology | |
| Ping et al. | Alert correlation through results tracing back to reasons |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| B08F | Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette] |
Free format text: REFERENTE A 12A ANUIDADE. |
|
| B08K | Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette] |
Free format text: EM VIRTUDE DO ARQUIVAMENTO PUBLICADO NA RPI 2318 DE 09-06-2015 E CONSIDERANDO AUSENCIA DE MANIFESTACAO DENTRO DOS PRAZOS LEGAIS, INFORMO QUE CABE SER MANTIDO O ARQUIVAMENTO DO PEDIDO DE PATENTE, CONFORME O DISPOSTO NO ARTIGO 12, DA RESOLUCAO 113/2013. |