US20050234920A1 - System, computer-usable medium and method for monitoring network activity - Google Patents
System, computer-usable medium and method for monitoring network activity Download PDFInfo
- Publication number
- US20050234920A1 US20050234920A1 US11/021,942 US2194204A US2005234920A1 US 20050234920 A1 US20050234920 A1 US 20050234920A1 US 2194204 A US2194204 A US 2194204A US 2005234920 A1 US2005234920 A1 US 2005234920A1
- Authority
- US
- United States
- Prior art keywords
- network
- statistical
- recited
- computer
- configuration parameters
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000000694 effects Effects 0.000 title claims abstract description 90
- 238000000034 method Methods 0.000 title claims description 56
- 238000012544 monitoring process Methods 0.000 title description 15
- 238000004458 analytical method Methods 0.000 claims abstract description 91
- 230000002159 abnormal effect Effects 0.000 claims abstract description 57
- 238000013179 statistical model Methods 0.000 claims description 17
- 238000003860 storage Methods 0.000 claims description 11
- 238000013500 data storage Methods 0.000 claims description 9
- 230000005540 biological transmission Effects 0.000 claims description 5
- 238000012545 processing Methods 0.000 claims description 4
- 238000007405 data analysis Methods 0.000 description 14
- 238000013480 data collection Methods 0.000 description 13
- 238000009826 distribution Methods 0.000 description 12
- 230000006399 behavior Effects 0.000 description 9
- 238000001514 detection method Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 239000000523 sample Substances 0.000 description 6
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 239000002243 precursor Substances 0.000 description 4
- 230000004931 aggregating effect Effects 0.000 description 3
- 238000004590 computer program Methods 0.000 description 3
- 230000001186 cumulative effect Effects 0.000 description 3
- 238000011835 investigation Methods 0.000 description 3
- 238000011897 real-time detection Methods 0.000 description 3
- 238000005096 rolling process Methods 0.000 description 3
- 238000005070 sampling Methods 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 230000002411 adverse Effects 0.000 description 2
- 238000007796 conventional method Methods 0.000 description 2
- 230000000875 corresponding effect Effects 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000011010 flushing procedure Methods 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000002829 reductive effect Effects 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 2
- 235000006719 Cassia obtusifolia Nutrition 0.000 description 1
- 235000014552 Cassia tora Nutrition 0.000 description 1
- 244000201986 Cassia tora Species 0.000 description 1
- 238000012356 Product development Methods 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- -1 compress Substances 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 230000000670 limiting effect Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000002245 particle Substances 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000010223 real-time analysis Methods 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 230000002459 sustained effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/142—Network analysis or design using statistical or mathematical methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/02—Capturing of monitoring data
- H04L43/026—Capturing of monitoring data using flow identification
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Definitions
- Computer security is a significant issue, especially for computer systems connected to a network, such as a local area network (LAN) or a wide area network (WAN).
- LAN local area network
- WAN wide area network
- the Internet is one example of a WAN that may pose a significant security risk.
- computers connected to the Internet have a need for reliable security measures to detect or prevent security breaches.
- a network system attack (also referred to herein as an intrusion) is an unauthorized or malicious use of a computer or computer network and may involve hundreds to thousands of unprotected network nodes in a coordinated attack on one or more selected targets.
- a system couples to a network and monitors activity on the network.
- the system comprises one or more capture modules.
- Each capture module comprises a collection module, a statistical module, and an analysis module.
- the collection module collects a stream of flow records from an observation point within the network, wherein the stream of flow records are collected in accordance with a first set of configuration parameters.
- the statistical module generates a statistical result from the stream of flow records as each flow record is collected, wherein the statistical result is generated in accordance with a second set of configuration parameters.
- the analysis module analyzes the statistical result to monitor network activity associated with the observation point, wherein the statistical result is analyzed in accordance with a third set of configuration parameters.
- the first, second and third sets of configuration parameters can generally be modified at any time, after abnormal activity is detected by the analysis module, to alter a magnification level by which a subset of the network activity is subsequently monitored.
- Related methods and computer-usable media are also disclosed.
- FIG. 1A is a block diagram illustrating an exemplary network usage analysis system including one or more capture modules in accordance with the present invention
- FIG. 1B is a block diagram illustrating one embodiment of a summary packet or “flow record” containing exemplary network usage data about one or more traffic packets;
- FIG. 1C is a block diagram illustrating an embodiment in which a single capture module is included within the network usage analysis system of FIG. 1A ;
- FIG. 1D is a block diagram illustrating an embodiment in which multiple capture modules are included within the network usage analysis system of FIG. 1A ;
- FIG. 2 is a block diagram illustrating one embodiment of a network
- FIG. 3 is a flow-chart diagram illustrating one embodiment of a method for detecting abnormal activity within a network
- FIG. 4A is a graph displaying exemplary statistical results that may be obtained by employing the method of FIG. 3 ;
- FIG. 4B is a graph displaying additional exemplary statistical results that may be obtained by employing the method of FIG. 3 ;
- FIGS. 4C-4D are graphs displaying exemplary analysis results that may be obtained by employing the method of FIG. 3 ;
- FIG. 5 is a graph displaying exemplary statistical results that may be used for detecting flood attacks
- FIG. 6 is a graph displaying exemplary statistical results that may be used for detecting address spoofing.
- FIGS. 7A-7E are graphs displaying exemplary statistical results that may be used for detecting subscriber bandwidth abuse.
- network is defined to include the Internet and other network systems, including public and private networks that may or may not use the TCP/IP protocol suite for data transport. Examples include the Internet, Intranets, extranets, telephony networks, and other wire-line and wireless networks.
- Internet is specifically used throughout this application, the term Internet is merely one example of a “network.”
- network usage data and “flow record” are used throughout this application for referencing the metadata included within each summary record of network traffic packets, the term “network usage data” may be considered a more general term for referencing one or more “flow records.”
- Network usage analysis systems provide important information about usage on the network.
- network usage analysis systems are used to provide vital business information, such as information for subscriber billing, product development, and pricing schemas tailored for various classes of subscribers.
- Network usage analysis systems can also be used to identify (or predict) abnormal network activity, such as activity caused by network congestion and network security breaches.
- network utilization and performance may be monitored to track the “user experience,” forecast future network capacity, or identify network usage behavior indicative of network abuse, attack, fraud and theft.
- Network usage data reporting systems are network devices, which not only participate in the transfer of network traffic between parties, but also have certain accounting capabilities for collecting, correlating, and aggregating network usage data (i.e., information about the network traffic) as it occurs (i.e., in “real-time”).
- network usage data reporting systems may include substantially any network device capable of monitoring network traffic and collecting network usage data about that traffic.
- Exemplary network devices include routers, switches and gateways, and in some cases, may include application servers, systems, and network probes.
- Network traffic is made up of data that is transferred between two points in a network in a stream of “packets.” These packets (or “traffic packets”) may include a subset of the data to be transferred between parties.
- traffic packets or “traffic packets”
- network usage data is collected from the traffic packets, and then correlated and/or aggregated to create a summary record (or “flow record”).
- flow record provides summary information about multiple traffic packets.
- the information within each flow record is usually determined by the particular network device responsible for generating the record, but often includes a source address and/or port #, a destination address and/or port #, a start time, an end time, and one or more traffic packet statistics (e.g., a packet or byte count), among other types of information.
- the flow records may be temporarily stored within the network usage data reporting system.
- network usage data from traffic packets sharing a common flow record field entry may be grouped as each packet is received by a network usage data reporting system. Any one of the flow record fields, or a combination thereof, may be used for grouping the data from the incoming traffic packets. For example, traffic packets may be grouped for sharing a common source address/port # and/or a common destination address/port #. The network usage data within each group of traffic packets may then be summarized into a small record, which is temporarily stored within the reporting system as the “flow record.”
- a flow record may include an entry for each unique source address received by the reporting system, where each entry specifies the number of bytes in each traffic packet sent from the unique source address.
- the flow records may be transferred (or retrieved) from the temporary data storage location at regular and frequent intervals as a “stream” of flow records (or a “network usage data stream”). Depending on the amount of storage space available, the transfer intervals may be substantially instantaneous or may range from mere seconds to several minutes.
- the flow records are exported to a specified destination (e.g., a network usage analysis system) at a predetermined sampling rate (e.g., on the order of 10 4 flow records per second) or when the number of flow records within the temporary storage location reaches a predetermined maximum—which ever occurs first.
- a network intrusion detection system is provided herein as one example of a network usage analysis system that does not store the network usage data stream within a database system. For this reason, the network IDS provided herein may be used for real-time analysis of high momentum data streams.
- a “high momentum data stream” refers to any volatile data that is presented at a significantly high rate (usually measured in units of “transactions per second”).
- a “significantly high rate” may refer to a range extending, for example, between about one thousand transactions/second and several hundred thousand transactions/second, or greater. Even faster rates may be possible in the future.
- volatile data may include: satellite or transponder data (such as weather data, satellite imaging data, data from space probes, etc.), seismic data (from earthquakes, oil exploration, etc.), and particle traces from high-energy physics experiments, among others.
- the system may analyze high momentum data streams without sampling, compressing, and/or aggregating the data stream, all of which would otherwise result in data loss.
- the network IDS described herein may be capable of analyzing “volatile data,” i.e., data that may be lost if it is not analyzed immediately, or before any attempts are made to sample, compress, aggregate and/or store the raw network usage data stream generated by the reporting system.
- the network intrusion detection system may be capable of detecting certain types of network security issues that may otherwise be undetectable.
- network security issues can be divided into three categories comprising: network attacks, abuse, and fraud/theft.
- a malicious user may use a network attack tool to perpetrate an attack on a single destination address (or port) by sending a large amount of traffic to the targeted address from a single source, or in some cases, from multiple sources.
- Such an attack is often referred to as a “flood attack” or a “denial of service” (DoS) attack.
- DoS denial of service
- Attacks of this type tend to create congestion, deny service, infect systems and/or destroy resources (such as data and files) on the system targeted by the attack. For this reason, flood attacks are generally easy to detect once they have occurred (e.g., a server brought down by the attack may cause thousands of customers to complain).
- flood attack originated may be useful, it is often too late by the time the attack is detected, since many transmitters of the flood traffic are unwitting users that have Trojans infecting their systems. Thus, it is often more beneficial to monitor network activity for “attack precursors,” or events that provide early indication of a possible upcoming attack.
- Scanning is one example of an attack precursor, and generally includes address scans and port scans.
- Address scans are typically hostile traffic used to probe multiple destination addresses in order to discover an open or accessible machine.
- port scans usually probe multiple ports on a single machine in order to discover an open or accessible port or application on that machine.
- Scan traffic cannot usually be detected using sampled or overly aggregated data, due to the small fraction of normal traffic volume typically consumed.
- the network intrusion detection system described herein is able to detect scan traffic, and thus, utilize an effective tool for early indication of upcoming attacks.
- Most Internet Service Providers have end-user-agreements that forbid the use of subscriber-run servers, due to the excessive bandwidth consumed by the traffic sent to and from those servers.
- each user that subscribes to a Service Provider's network may be allocated a certain amount of network bandwidth.
- an abusive user e.g., a subscriber running a forbidden server
- a light user makes it difficult to not only forecast future need, but also to implement fixed-price, all-you-can-use pricing plans without exceeding current network capacity.
- the network IDS described may successfully detect subscriber bandwidth abuse by avoiding the storage of high momentum data streams, such as Internet usage data.
- the network IDS may initially aggregate the raw data stream in a manner that enables network traffic volume to be tracked per server port. If abnormal network activity is detected (or at least suspected) on a particular server port, the aggregation process may be updated to include subscriber identifying information (e.g., a subscriber ID number, source address or port), which may help to identify the particular subscriber(s) responsible for the abusive traffic sent to the busy server port.
- subscriber identifying information e.g., a subscriber ID number, source address or port
- the network intrusion detection system is able to provide real-time monitoring of high momentum network usage data streams (also referred to herein as “flow record streams”), as well as real-time detection of suspicious or abnormal network activity (i.e., as it occurs).
- the network IDS may provide a mechanism for obtaining additional information about the abnormal network activity that was not previously collected or analyzed by the system. Such a mechanism would enable real-time investigations into the abnormal activity, such as detecting a type or source of the attack or abuse (i.e., an event or entity responsible for the excessive traffic).
- the network IDS may also allow sufficient time (if only a matter of seconds) for launching attack countermeasures by providing a reliable means for detecting attack precursors (such as scan operations).
- FIG. 1A illustrates one embodiment of a network usage analysis system 100 capable of monitoring and analyzing high momentum network usage data streams in accordance with the present invention.
- network usage analysis system 100 includes several main components, each of which is a software program.
- the main software program components of network usage analysis system 100 may run on one or more computer systems.
- each of the main software program components runs on its own computer system.
- network usage analysis system 100 includes data analysis system 130 and data storage system 140 .
- Data analysis system 130 receives network usage data 170 from data collection system 120 , which in turn, receives the network usage data from network 110 .
- network 110 includes the Internet 115 .
- network usage data 170 is a real-time, high momentum stream of network usage data records (otherwise referred to herein as “transactions” or “flow records”).
- network usage data 170 is a real-time stream of flow records generated by a network usage data reporting system (not shown) positioned on network 110 .
- Data analysis system 130 receives the streaming network usage data 170 (in the form of flow records) from data collection system 120 via communication link 160 .
- data collection system 120 may be included within a network usage data reporting system of network 110 .
- data collection system 120 (and all other system components downstream therefrom) may be coupled to a network usage data reporting system at a location outside of network 110 .
- network usage analysis system 100 may be implemented at a location physically apart from, though functionally coupled to, network 110 . By locating system 100 outside of network 110 , network activity can be monitored across all of network 110 without adversely affecting network performance (e.g., without consuming memory or CPU resources on network servers, or otherwise hampering network traffic flow). As such, network usage analysis system 100 may be considered a network-based intrusion detection system, in some embodiments.
- data collection system 120 may be a part of data analysis system 130 , in another embodiment.
- One data collection system suitable for use with the present invention is commercially available under the trade name INTERNET USAGE MANAGER, from Hewlett-Packard, U.S.A.
- Other data collection and reporting systems suitable for use with the network usage analysis system in accordance with the present invention will become apparent to those skilled in the art after reading the present application.
- data analysis system 130 may utilize one or more capture modules 135 for monitoring network activity within network 110 .
- more than one capture module may be defined to characterize a particular flow record stream in a variety of different ways. Such a case will be described in reference to FIG. 1D .
- data analysis system 130 utilizes capture module(s) 135 to collect pertinent portions of flow record stream 170 and to generate a statistical result therefrom.
- the statistical result may be generated (and possibly stored) as disclosed in U.S. patent application Ser. No. 09/919,149 filed Jul. 31, 2001, entitled “Network Usage Analysis System Having Dynamic Statistical Data Distribution System and Method” and incorporated herein by reference.
- the statistical result may also be updated in real-time using a rolling time interval, as described in U.S. patent application Ser. No. 09/919,527 filed Jul. 31, 2001, entitled “Network Usage Analysis System and Method For Updating Statistical Models” and incorporated herein by reference.
- Other methods for generating, storing and/or updating the statistical result are possible and within the scope of the invention.
- capture module(s) 135 may also be used to analyze the statistical result, regardless of whether the statistical result is stored or not.
- data analysis system 130 is responsive to user interface 150 for interactive analysis of flow record stream 170 using capture module(s) 135 .
- user interface 150 may include substantially any input/output device known in the art, such as a keyboard, a mouse, a touch pad, a display screen, etc.
- a graphical display of the statistical results may be output to a display screen at user interface 150 .
- user interface 150 may comprise a separate computer system, which is coupled by a wired or wireless transmission medium to data analysis system 130 .
- data analysis system 130 comprises a computer software program, which is executable on one or more computers or servers for monitoring network activity in accordance with the present invention.
- the computer software program including capture module(s) 135 , may also be stored in data storage system 140 .
- data storage system 140 is shown in FIG. 1A as external to data analysis system 130 , data storage system 140 may be included within data analysis system 130 , in an alternative embodiment.
- Data storage system 140 may comprise substantially any volatile memory (e.g., random access memory (RAM)) and/or any non-volatile memory (e.g., a hard disk drive or other persistent storage device) known in the art.
- RAM random access memory
- non-volatile memory e.g., a hard disk drive or other persistent storage device
- FIG. 1C illustrates the embodiment in which only one capture module 135 is included within data analysis system 130 .
- capture module 135 includes a collection module 132 for collecting a stream of flow records associated with an observation point within a network.
- An “observation point” is broadly defined herein as a point of interest in the network.
- FIG. 2 illustrates one embodiment of a network 200 which may include a network core 210 and a number of sub-networks (e.g., sub-networks 220 and 230 ).
- network core 210 may represent the internal network of an Internet Service Provider (ISP), and sub-networks 220 and 230 may represent the ISP customers.
- ISP Internet Service Provider
- Each of the sub-networks may be coupled to the network core through a network device called an “edge router” (denoted B i ).
- the network core may be further coupled to an external network 240 through one or more network devices called “border routers” (denoted C i ).
- the external network may be a wide area network (WAN), such as the Internet, and may include several more sub-networks therein. Although three sub-networks 242 , 244 , and 246 are illustrated, substantially any number of sub-networks may be included within external network 240 .
- This type of network is generally referred to as a “hierarchical network,” and may contain one or more levels of sub-networks.
- the network may comprise a “flat network” in which there is substantially no distinction between the network core and sub-networks.
- an observation point may include a network device, such those denoted in FIG. 2 as boundary devices ( ⁇ ) and internal devices ( ⁇ ).
- an observation point may include a network device, which is arranged on a boundary of the network (e.g., edge routers B i or border routers C i and D i ) or a network device arranged within the network (e.g., internal routers E i , and other internal devices denoted with the symbol, ⁇ ).
- an observation point may include a link, such as a path between two boundary network devices, a path between a boundary network device and an internal network device, or a path between two internal network devices.
- collection module 132 may collect the stream of flow records in accordance with a first set of configuration parameters.
- the first set of configuration parameters may designate a subset of data to be collected from each flow record in the stream, and a time interval over which to collect the subset of data.
- the first set of configuration parameters can be modified at any time to obtain additional data from a subsequent flow record stream, if abnormal network activity is indicated in at least a portion of the current flow record stream.
- the first set of configuration parameters designates one or more types of network usage data to be collected from flow record stream 170 .
- one or more “fields” or “categories” of network usage data may be collected as the “subset of data.”
- the flow record fields may contain summarized information about multiple traffic packets.
- This metadata i.e., data about data
- the flow record fields may contain other metadata, such as the packet protocol used to transfer the data (e.g., TCP or UDP), a packet protocol flag indicator, an input interface index, an output interface index, and a type of service, among other types of information.
- the volume of network usage data collected can be greatly reduced by selecting only a few types of network usage data (or flow record fields) from each flow record in the stream.
- the first set of configuration parameters may also designate a time interval over which to collect the subset of data.
- the time interval may be selected from a range of programmable time values extending between about one second and about 30 days (or more). In other cases, the range of programmable time values may be on the order of minutes to days.
- the time interval may specify the length of time over which one or more statistical models are applied to the selected subset of data for generating statistical results therefrom.
- the first set of configuration parameters may further designate a time interval type (e.g., fixed or rolling time intervals) for statistically analyzing the subset of data collected during the time interval. In brief, a fixed time interval would generate a statistical result of the collected subset of data around the end of the time interval; whereas a rolling time interval would generate and continuously update the statistical result over the duration of the time interval.
- collection module 132 may supply the first set of configuration parameters to data collection system 120 to specify the length of time over which data collection system 120 is to collect a particular subset of data from a network usage data reporting system. In an alternative embodiment, however, collection module 132 may retain the first set of configuration parameters without supplying them to data collection system 120 .
- data collection system 120 may receive a real-time stream of flow records (containing, e.g., individual flow records or flow records that have been grouped and summarized), which are “flushed” from a temporary data storage location (usually RAM) within the network usage data reporting system at regular and frequent intervals.
- flushing intervals are generally dependent on characteristics of the particular reporting system supplying the streams; therefore, the flushing intervals may be substantially instantaneous, or may range from mere seconds to several days (depending, e.g., on the amount of temporary storage space available within the particular reporting system).
- the time interval designated by the first set of configuration parameters may then be used by collection module 132 for collecting the specified subset of data from the stream of flow records received by data collection system 120 .
- Capture module 135 also includes a statistical module 134 for generating a statistical result of the subsets of data collected from the flow record stream.
- statistical module 134 may use the time interval specified by the first set of configuration parameters to generate the statistical result.
- statistical module 134 may generate the statistical result at the end of the time interval, or alternatively, during the time interval as each subset of data is collected from the stream of flow records.
- the actual generation of the statistical result may be conducted in accordance with a second set of configuration parameters.
- the second set of configuration parameters designates a type of statistical model to be used for generating the statistical result, in addition to one or more properties associated with the designated type of statistical model.
- the second set of configuration parameters can be modified at any time after system initialization to generate a statistical result on a subsequent flow record stream, if abnormal network activity is indicated in at least a portion of the current record event stream.
- the second set of configuration parameters designates a particular type of statistical model to be used for characterizing the subset of data collected from the flow record stream.
- the type of statistical model may be selected from a group comprising a histogram (i.e., a distribution), the top N occurrences of a variable (i.e., a TopN distribution) and a time series of occurrences of the variable (i.e., a time series plot).
- Other statistical model types may be included depending on the network usage related problem to be solved. Exemplary statistical model types that may be used to solve a particular network usage related problem (such as, e.g., the detection of scan traffic or subscriber abuse) will be described in more detail below.
- the second set of configuration parameters designates one or more statistical model properties, such as whether the statistical result is to be generated as a linear or log distribution, in addition to the number and/or width of bins to be created for the distribution.
- the statistical result may be generated dynamically by creating the bins in real-time and on an “as-needed-basis” (or “on-the-fly”) based on the values of the incoming data stream.
- the resultant distribution may then be output to user interface 150 for current analysis and/or stored in memory for future analysis.
- capture module 135 may also include an analysis module 136 for analyzing the statistical result generated by statistical module 134 .
- the analysis result and/or the statistical result may be used for monitoring, the network activity associated with the observation point.
- analysis module 136 may analyze the statistical result upon completion of the time interval specified by the first set of configuration parameters. In other cases, however, analysis module 136 may be configured for analyzing statistical results that have been stored in memory.
- analysis of the statistical result may be conducted in accordance with a third set of configuration parameters.
- the third set of configuration parameters may designate a type of analysis model to be used for analyzing the statistical result, in addition to one or more properties associated with the designated type of analysis model.
- the third set of configuration parameters can be modified at any time after system initialization to reanalyze a previous statistical result (or analyze a statistical result of a subsequent flow record stream), if abnormal network activity is indicated in at least a portion of the current flow record stream.
- the third set of configuration parameters designates a particular type of analysis model to be used for monitoring network activity.
- the type of analysis model may be selected from a group comprising the statistical result, a normalized version of the statistical result, a probability density function of the statistical result, and a cumulative density function of the statistical result.
- Other types of analysis models may be included depending on the network usage related problem to be solved. Exemplary types of analysis models that may be used to solve a particular network usage related problem (such as, e.g., the detection of scan traffic or subscriber abuse) will be described in more detail below.
- the third set of configuration parameters may designate one or more analysis model properties, such as a threshold value, a slope value or a shape, each of which may be associated with either “normal” or “abnormal” network activity.
- the analysis results may indicate an occurrence of abnormal network activity upon exceeding a particular threshold or slope value.
- abnormal network activity may be indicated if a shape of the current analysis results deviates significantly from a shape of analysis results known for characterizing so-called “normal” network activity.
- the analysis results may be output to user interface 150 for current observation and/or stored in memory for future observation.
- the statistical result may be analyzed “automatically” by additional computer program instructions, or “manually” by a user of the network usage analysis system.
- the statistical result may be graphically (or otherwise) displayed on a display screen at user interface 150 .
- the user and/or the computer program instructions
- the analysis results may be automatically generated by the additional computer instructions and graphically (or otherwise) displayed on the display screen in lieu of the statistical results. In this manner, the analysis results may be used for monitoring network activity and detecting abnormal network activity therefrom.
- the displayed (statistical and/or analysis) results may also be used for performing interactive analysis of the network usage data via user interface 150 .
- user interface 150 may accept user commands for modifying any of the first, second or third sets of configuration parameters.
- the first, second and third sets of configuration parameters can be modified at any time after system initialization to collect, generate and/or analyze a subsequent stream of flow records in a different manner.
- one or more of the configuration parameters may be modified after abnormal activity is initially detected, so that a subset of the network activity corresponding to the abnormal activity can be subsequently collected, generated and/or analyzed in much greater detail.
- the present system is able to dynamically modify the configuration parameters without the need to shut down or temporarily suspend system operations.
- Such dynamic modification may alter a magnification level by which the subset of network activity is subsequently monitored.
- the magnification level may be altered, in some cases, to determine whether the observation point is responsible for the detected abnormal network activity (i.e., whether the observation point is a “source” of the abnormal network activity).
- FIG. 1D illustrates an embodiment in which multiple capture modules 135 are included within data analysis system 130 .
- capture modules 135 may be arranged in a hierarchy or tree structure, such that an output of a higher level capture module (e.g., capture module 135 a ) may be input to a lower level capture module (e.g., capture module 135 b or 135 c ) at the end of a specified time interval (which may, or may not, correspond to the time interval specified by the first set of configuration parameters).
- FIG. 1D illustrates a binary tree structure merely for the purpose of simplicity; alternative structures and configurations may be applicable.
- each of the capture modules shown in FIG. 1D includes a collection module 132 , a statistical module 134 and an analysis module 136 , as described above in reference to FIG. 1 C .
- one or more of the capture modules of FIG. 1D may be independently configured for characterizing a current flow record stream in a slightly different manner. For example, a higher level capture module may generate a distribution of the traffic volume per destination server port number ( FIG. 7A ), whereas a lower level capture module may generate a distribution of the traffic volume per subscriber on a particular server port number ( FIG. 7C ).
- Such independent configuration may enable multiple “views” to be obtained from a single stream of flow records associated with a particular observation point.
- one or more capture modules of FIG. 1D may be dynamically reconfigured for characterizing a subsequent flow record stream (or possibly, a current flow record stream) in a slightly different manner.
- a higher level capture module may be reconfigured for collecting additional data from a subsequent flow record stream, if abnormal network activity is indicated from results obtained by a lower level capture module on a current (or previous) flow record stream.
- a higher level capture module e.g., capture module 135 a
- a higher level capture module is initially configured for collecting the destination server port number and packet volume from each flow record in the stream.
- results from a lower level capture module (e.g., capture module 135 f ) indicate abnormal activity on one or more destination server port numbers
- the higher level capture module may be reconfigured to also collect, e.g., the subscriber ID numbers.
- the lower level capture module may also need to be reconfigured to accept the newly collected subscriber ID numbers. Therefore, the collection of additional data is generally achieved by selecting a different set of configuration parameters for collection module(s) 132 within one or more levels of capture modules 135 .
- a higher level capture module may be reconfigured for generating a new statistical result of a subsequent flow record stream, if abnormal network activity is indicated from results obtained by a lower level capture module on a current (or previous) flow record stream.
- new statistical results may be generated by performing the reconfiguration process in reverse.
- a lower level capture module may be dynamically reconfigured for generating a new statistical result, if the statistical results from a higher level capture module provide indication of abnormal network activity. Therefore, the generation of new statistical results is generally achieved by selecting a different set of configuration parameters for the statistical module(s) 134 within one or more levels of capture modules 135 .
- a higher level capture module may be reconfigured for analyzing a subsequent statistical result in a different manner, if abnormal network activity is indicated from results obtained by a lower level capture module on a current (or previous) flow record stream.
- new analysis results may be generated by performing the reconfiguration process in reverse.
- a lower level capture module may be dynamically reconfigured for analyzing a current statistical result, if the analysis results from a higher level capture module provide indication of abnormal network activity. Therefore, the generation of new analysis results is generally achieved by selecting a different set of configuration parameters for the analysis module(s) 136 within one or more levels of capture modules 135 .
- multiple capture modules 135 may be used for generating a plurality of statistical and/or analysis results.
- the results may be sent to a display device for current observation or analysis, to a storage device for future observation or analysis, or to a lower level capture module for further processing.
- method 300 may be used for isolating a source of the abnormal activity.
- method 300 is performed by network usage analysis system 100 , as described above in FIGS. 1 and 2 .
- method 300 is implemented as computer-executable program instructions, which may be stored within a data storage device, transferred over a transmission medium, and executed by a processing device, of system 100 .
- an observation point may comprise a network device arranged within the network (i.e., an “internal network device”), a network device arranged on boundary of the network (i.e., a “boundary network device”), or a link arranged between two network devices.
- an observation point may further comprise a computer system or server arranged within, or merely coupled to, the network.
- the stream of flow records are collected from one or more boundary network devices (e.g., edge or border routers).
- the present method may avoid collecting duplicate flow record streams by “metering at the edges” of the network (i.e., by collecting flow record streams where traffic originates or terminates), thereby reducing the over-all volume of data collected.
- metering at the edges enables the flow record streams to be obtained from any number of observation points (e.g., from one to thousands of points) located substantially anywhere within the network.
- multiple flow record streams may be simultaneously obtained from any number of observation points at substantially any time of day (i.e., regardless of network usage), without adversely affecting network performance.
- the stream of flow records may be collected by data collection system 120 (or alternatively, by collection module 132 ) during a first time interval.
- the collection system or module may be configured for collecting only the portions of the flow records that are relevant to a particular statistical module 134 .
- the only portions (i.e., “subset of data”) collected during the first time interval may be a source identifier (e.g., a source address) and/or a destination identifier (e.g., a destination port).
- a source identifier e.g., a source address
- a destination identifier e.g., a destination port
- one or more statistical results are generated by grouping the flow records (or collected portions thereof in accordance with a set of configuration parameters.
- the flow records (or collected portions thereof) may also be grouped by observation point if network activity is to be monitored at more than one observation point.
- the set of configuration parameters may specify the subset of data to be collected from each flow record in the stream and the first time interval (over which to collect the subset of data).
- the set of configuration parameters may also designate a type of statistical model to be used for generating the statistical results, as well as one or more properties associated with the designated type of statistical model.
- FIG. 4A illustrates an exemplary statistical result ( 400 ) in which only the top N internal servers are displayed, based on the number of unique destination ports (or, unique ports local to each server) addressed during the first time interval.
- statistical result 400 may be used for monitoring the network traffic sent to each of the top N servers during the first time interval.
- statistical result 400 could be used for detecting abnormal network activity that may occur during the first time interval.
- an automated scan for open ports i.e., a port scan
- servers “mail1” and “web3” may be suspected, due to the abnormally high volume of traffic sent to servers “mail1” and “web3” during the first time interval.
- the source address and the destination port may be collected from each flow record during the first time interval.
- a distribution may be chosen to characterize the number of unique source addresses, which are sending traffic to a relatively large number of unique destination ports during the first time interval.
- FIG. 4B illustrates an exemplary statistical result ( 410 ) displaying the number of unique source addresses that are sending network traffic to more than 250 unique destination (or local) ports on each of the top N servers. If statistical result 410 is used for monitoring network activity, one may suspect that up to six sources may be sending scanning traffic to servers “mail1” and “web3.”
- the statistical results are analyzed for monitoring network activity associated with the one or more observation points (e.g., the Top N servers).
- the statistical results may be analyzed, in some cases, by noting characteristics of the statistical results that appear to be suspicious or abnormal (recall, the high traffic volume sent to servers “mail1” and “web3”). In other cases, however, the statistical results may be manipulated to produce so-called “analysis results,” which may then be used for monitoring network activity associated with one or more of the observation points.
- analysis results may be generated by applying a density function to the statistical results (e.g., a probability or cumulative density function as shown in FIGS. 4C and 4D , respectively). In such an example, network activity can be monitored by comparing the analysis results to a predefined, though possibly reconfigurable, benchmark value.
- abnormal network activity may be detected from the analysis results if the amount of network activity sent to (or from) an observation point exceeds a predefined threshold value.
- the threshold value may be selected “automatically” by additional computer program instructions, or “manually” by a user of the network usage analysis system, and may be subsequently changed or updated, as desired.
- the present invention eliminates any guesswork used in conventional methods (which may select a fixed threshold value based on personal experience, rule-of-thumb, etc.) by designating the threshold value as a percentage of the total network activity sent to (or from) the observation point. In this manner, the threshold value may be chosen regardless of distribution shape; thus, no assumptions have to be made concerning whether the variable of interest (e.g., network activity) is normally distributed, or distributed by any other mathematically derived means.
- abnormal network activity may be detected if a characteristic of the analysis results deviates significantly from a characteristic known for its association with “normal” network activity.
- network activity may be monitored by observing a shape (i.e., an envelope) of the analysis results.
- abnormal network activity may be detected if the observed shape deviates significantly (e.g., more than 5-20% deviation) from a predetermined shape known for its association with “normal” network activity.
- network activity may be monitored by calculating an area under the envelope, or by measuring a slope of the analysis results at a location of interest. As such, abnormal network activity may be detected if the calculated area or the measured slope deviates significantly from predetermined area and slope values known for their association with “normal” network activity. It is noted that methods other than those described above may also be used for detecting abnormal activity.
- normal network activity and “abnormal network activity” are used in a relative sense. Any particular values or characteristics of network activity, which may be distinguished as either “normal” or “abnormal,” are generally dependent on the network activity being monitored, as well as other factors, such as the time of day such monitoring occurs. However, one of ordinary skill in the art would be able to determine appropriate values or characteristics, which correspond to “normal” or “abnormal” network activity as it relates to a particular application, in light of the disclosure provided herein and without undue experimentation.
- network activity can be monitored to establish normative behaviors for different times of the day, different days of the week, etc.
- the normative behaviors may then be used to determine a benchmark value (e.g., a threshold, slope, or shape), or possibly several benchmark values corresponding to different times, days, etc.
- a benchmark value e.g., a threshold, slope, or shape
- subsequent network activity can be monitored without the need for storing the previously established normative behavior (i.e., previous statistical or analysis results) for comparison purposes.
- the present method significantly reduces storage and processor requirements placed on the present system.
- the statistical or analysis results may also be stored, if desired.
- FIG. 4C illustrates an embodiment in which analysis result 420 is produced by applying a probability density function to the data initially collected for generating statistical result 410 .
- analysis result 420 illustrates the number of subscribers (i.e., designated by unique source addresses), which are contributing traffic to each of the unique destination ports on a particular server (e.g., server “mail1”) during the first time interval.
- a port scan may be suspected if a spike of activity is observed, e.g., around the 99 th percentile of the total number of destination ports.
- FIG. 4D illustrates an embodiment in which analysis result 430 is produced by applying a cumulative density function to the data initially collected for generating statistical result 410 .
- analysis result 430 illustrates the percentage of subscribers (i.e., designated by unique source addresses), which are contributing traffic to less than a particular number of unique destination ports on a particular server (e.g., server “mail1”) during the first time interval.
- abnormal activity may be detected, for example, if the percentage of subscribers contributing traffic to less than 10 unique destination ports decreases from about 95% to about 80%. In other words, the percentage of subscribers contributing traffic to more than 10 unique destination ports has increased from about 5% to about 20%.
- a high momentum data stream e.g., a flow record stream
- the present method provides an inventive technique for dynamically exploring certain deviations from those norms without requiring the data stream to be stored. Though this technique may be somewhat ineffective for discovering once-in-a-lifetime events, it is ideal for detecting and exploring patterns in a stream. Fortunately, many types of network activity can be characterized as patternistic behavior.
- Examples of such network activity include several types of attack (e.g., flood attacks), abuse (e.g., subscriber-run servers), and theft (e.g., address spoofing), in addition to activity unrelated to network security (e.g., network congestion). Due to the repetitive nature of patterns, the technique enables suspect or abnormal network activity to be further explored at some point in the future. Since exploration occurs as we move forward in time, not backward, the technique is referred to herein as “Drill Forward.”
- Drill Forward refers to the process of obtaining additional information (e.g., higher granularity data) about a particular observation point (e.g., a particular network node, host server, or subscriber) from a real-time stream of flow records AFTER analysis of data previously collected from the stream causes one to become suspicious of the observation point.
- additional information e.g., higher granularity data
- the Drill Forward technique enables real-time investigation into abnormal network activity by allowing real-time modification of capture module configuration parameters.
- the Drill Forward technique has been described in the context of network security, the technique may be applied to investigate any other area of network usage.
- the set of configuration parameters can be modified in box 350 to alter a magnification level by which a subset of the network activity is subsequently monitored. This subset is generally associated with the abnormal activity detected in box 340 . If no abnormal activity is detected, however, the magnification level can be maintained (or adjusted, as desired) while the process of collecting, generating, analyzing and detecting is repeated (in box 310 ) for a subsequent stream of flow records.
- the “magnification level” may be altered to characterize a subsequent stream of flow records (i.e., flow records obtained during a subsequent time interval) in a slightly different manner.
- statistical result 410 may have been generated after modifying the set of configuration parameters to collect additional data (e.g., to collect the source address) from a subsequent stream of flow records, in addition to the destination port collected to generate statistical result 400 .
- the subsequent stream of flow records may be collected, and thus, a subsequent plurality of statistical results may be generated, in greater detail than they were previously collected and generated.
- the type of abnormal network activity may be determined by altering the magnification level.
- the “magnification level” may be altered to focus on a particular subset of the flow record stream where the abnormal network activity occurred. For example, abnormal activity may be detected (or at least suspected) from analysis result 430 . To obtain a better view of the abnormal activity, the set of configuration parameters may be modified to focus on the subset of subscribers sending traffic to the greatest number of unique destination ports. For example, the set of configuration parameters may be modified to collect subscriber ID numbers, in addition to the flow record fields previously collected. As a result, a particular subscriber or subset of subscribers may be determined to be a source of the abnormal network activity.
- the present method enables a source of the abnormal network activity to be isolated without utilizing additional network resources, such as network probes and traces.
- the present method provides real-time detection and investigation of abnormal network activity.
- the present method may be used for detecting event precursors (e.g., port or address scans), which may provide early indication of an upcoming attack. Such early indication may enable a network technician to minimize the amount of damage inflicted by the attack, or possibly, to prevent the upcoming attack from occurring.
- the present method may be used to provide real-time detection of various types of attacks, abuse, fraud and theft by configuring the capture modules in an appropriate manner.
- FIG. 5 illustrates exemplary statistical results that may be used for detecting flood attacks.
- FIG. 5 plots the ratio of offered load to channel capacity for the Top N subscriber IDs. A ratio of greater than about 1.0 for any sustained period may indicate the occurrence of a flood attack.
- FIG. 6 illustrates exemplary statistical results that may be used for detecting an abusive process called “address spoofing,” where the sending party disguises their own IP address by changing it to some other address.
- the number of flows to a network resource may be tracked, where the source IP address has been spoofed to an address within the Internet Assigned Numbers Authority (IANA) reserved address blocks. Since no one, other than the IANA, is allowed access to these reserved address blocks, a large number of flows to an IANA address may indicate the occurrence of address spoofing.
- IANA Internet Assigned Numbers Authority
- FIGS. 7A-7E illustrate exemplary statistical results that may be used for detecting subscriber bandwidth abuse.
- FIG. 7A is a graph illustrating the Top N subscriber server ports sorted by traffic volume.
- FIG. 7B is the same information represented differently (i.e., by changing the statistical model property to a logarithmic distribution) for better viewing of the lower ranked ports.
- FIGS. 7A and 7B highlight the subscriber server ports that are creating the highest volume of traffic on the network.
- the Top N subscribers contributing to the traffic on a particular server port may be isolated, as shown in FIG. 7C , by dynamically reconfiguring one or more capture modules after the next time interval.
- the capture modules can be dynamically reconfigured once more to investigate a particular subscriber, as shown in FIGS. 7D and 7E .
- FIG. 7D shows the TopN active server ports by volume for the subscriber (S411-66-13) found to be contributing the most traffic volume in FIG. 7C .
- FIG. 7E shows the TopN active server ports by volume and direction for subscriber S411-66-13.
- the carrier medium may be a transmission medium such as a wire, cable, or wireless transmission link, or a signal traveling along such a wire, cable, or link.
- the carrier medium may also be a storage medium such as a read-only memory, a random access memory, a magnetic or optical disk, or a magnetic tape.
- a processor may be configured to execute the program instructions to perform a computer-executable method according to the above embodiments.
- the processor may take various forms, including a personal computer system, mainframe computer system, workstation, network appliance, Internet appliance, personal digital assistant (“PDA”), television system or other device.
- PDA personal digital assistant
- the term “computer system” may be broadly defined to encompass any device having a processor, which executes instructions from a memory medium.
- the program instructions may be implemented in any of various ways, including procedure-based techniques, component-based techniques, and/or object-oriented techniques, among others.
- the program instructions may be implemented using ActiveX controls, C++ objects, JavaBeans, Microsoft Foundation Classes (“MFC”), or other technologies or methodologies, as desired.
- MFC Microsoft Foundation Classes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Algebra (AREA)
- Probability & Statistics with Applications (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Physics (AREA)
- Mathematical Optimization (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Analysis (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A system couples to a network and monitors activity thereon. The system comprises one or more capture modules. Each capture module comprises a collection, statistical, and analysis modules. The collection module collects flow records from an observation point within the network, wherein the flow records are collected per a first set of configuration parameters. The statistical module generates a statistical result from the flow records as each flow record is collected, wherein the statistical result is generated per a second set of configuration parameters. The analysis module analyzes the statistical result to monitor network activity associated with the observation point, wherein the statistical result is analyzed per a third set of configuration parameters. The first, second and third sets of configuration parameters can generally be modified at any time, after abnormal activity is detected, to alter a magnification level by which a subset of the network activity is monitored.
Description
- Computer security is a significant issue, especially for computer systems connected to a network, such as a local area network (LAN) or a wide area network (WAN). The Internet is one example of a WAN that may pose a significant security risk. Thus, computers connected to the Internet have a need for reliable security measures to detect or prevent security breaches.
- By way of example of a security breach, network attack tools (such as denial-of-service “DoS” attack utilities) are becoming increasingly sophisticated and, due to evolving technologies, simple to execute. For this reason, relatively unsophisticated attackers can arrange, or be involved in, computer system compromises directed at one or more targeted facilities. A network system attack (also referred to herein as an intrusion) is an unauthorized or malicious use of a computer or computer network and may involve hundreds to thousands of unprotected network nodes in a coordinated attack on one or more selected targets.
- In accordance with at least one embodiment, a system couples to a network and monitors activity on the network. The system comprises one or more capture modules. Each capture module comprises a collection module, a statistical module, and an analysis module. The collection module collects a stream of flow records from an observation point within the network, wherein the stream of flow records are collected in accordance with a first set of configuration parameters. The statistical module generates a statistical result from the stream of flow records as each flow record is collected, wherein the statistical result is generated in accordance with a second set of configuration parameters. The analysis module analyzes the statistical result to monitor network activity associated with the observation point, wherein the statistical result is analyzed in accordance with a third set of configuration parameters. The first, second and third sets of configuration parameters can generally be modified at any time, after abnormal activity is detected by the analysis module, to alter a magnification level by which a subset of the network activity is subsequently monitored. Related methods and computer-usable media are also disclosed.
- For a detailed description of the embodiments of the invention, reference will now be made to the accompanying drawings in which:
-
FIG. 1A is a block diagram illustrating an exemplary network usage analysis system including one or more capture modules in accordance with the present invention; -
FIG. 1B is a block diagram illustrating one embodiment of a summary packet or “flow record” containing exemplary network usage data about one or more traffic packets; -
FIG. 1C is a block diagram illustrating an embodiment in which a single capture module is included within the network usage analysis system ofFIG. 1A ; -
FIG. 1D is a block diagram illustrating an embodiment in which multiple capture modules are included within the network usage analysis system ofFIG. 1A ; -
FIG. 2 is a block diagram illustrating one embodiment of a network; -
FIG. 3 is a flow-chart diagram illustrating one embodiment of a method for detecting abnormal activity within a network; -
FIG. 4A is a graph displaying exemplary statistical results that may be obtained by employing the method ofFIG. 3 ; -
FIG. 4B is a graph displaying additional exemplary statistical results that may be obtained by employing the method ofFIG. 3 ; -
FIGS. 4C-4D are graphs displaying exemplary analysis results that may be obtained by employing the method ofFIG. 3 ; -
FIG. 5 is a graph displaying exemplary statistical results that may be used for detecting flood attacks; -
FIG. 6 is a graph displaying exemplary statistical results that may be used for detecting address spoofing; and -
FIGS. 7A-7E are graphs displaying exemplary statistical results that may be used for detecting subscriber bandwidth abuse. - Certain terms are used throughout the following description and claims to refer to particular system components. As one skilled in the art will appreciate, computer companies may refer to a component by different names. This document does not intend to distinguish between components that differ in name but not function. In the following discussion and in the claims, the terms “including” and “comprising” are used in an open-ended fashion,-and thus should be interpreted to mean “including, but not limited to . . . .” Also, the term “couple” or “couples” is intended to mean either an indirect or direct connection. Thus, if a first device is coupled to a second device, that connection may be through a direct connection, or through an indirect connection via other devices and connections.
- Although the term “network” is specifically used throughout this application, the term network is defined to include the Internet and other network systems, including public and private networks that may or may not use the TCP/IP protocol suite for data transport. Examples include the Internet, Intranets, extranets, telephony networks, and other wire-line and wireless networks. Although the term “Internet” is specifically used throughout this application, the term Internet is merely one example of a “network.”
- Although the terms “network usage data” and “flow record” are used throughout this application for referencing the metadata included within each summary record of network traffic packets, the term “network usage data” may be considered a more general term for referencing one or more “flow records.”
- The following discussion is directed to various embodiments of the invention. Although one or more of these embodiments may be preferred, the embodiments disclosed should not be interpreted, or otherwise used, as limiting the scope of the disclosure, including the claims. In addition, one skilled in the art will understand that the following description has broad application, and the discussion of any embodiment is meant only to be exemplary of that embodiment, and not intended to intimate that the scope of the disclosure, including the claims, is limited to that embodiment.
- Network usage analysis systems provide important information about usage on the network. In the context of an Internet Service Provider, network usage analysis systems are used to provide vital business information, such as information for subscriber billing, product development, and pricing schemas tailored for various classes of subscribers. Network usage analysis systems can also be used to identify (or predict) abnormal network activity, such as activity caused by network congestion and network security breaches. In one example, network utilization and performance (as a function of subscriber usage behavior) may be monitored to track the “user experience,” forecast future network capacity, or identify network usage behavior indicative of network abuse, attack, fraud and theft.
- Network usage data reporting systems are network devices, which not only participate in the transfer of network traffic between parties, but also have certain accounting capabilities for collecting, correlating, and aggregating network usage data (i.e., information about the network traffic) as it occurs (i.e., in “real-time”). In general, network usage data reporting systems may include substantially any network device capable of monitoring network traffic and collecting network usage data about that traffic. Exemplary network devices include routers, switches and gateways, and in some cases, may include application servers, systems, and network probes.
- Network traffic is made up of data that is transferred between two points in a network in a stream of “packets.” These packets (or “traffic packets”) may include a subset of the data to be transferred between parties. When passed through a network usage data reporting system, network usage data is collected from the traffic packets, and then correlated and/or aggregated to create a summary record (or “flow record”). In other words, a flow record provides summary information about multiple traffic packets. The information within each flow record is usually determined by the particular network device responsible for generating the record, but often includes a source address and/or port #, a destination address and/or port #, a start time, an end time, and one or more traffic packet statistics (e.g., a packet or byte count), among other types of information. The flow records may be temporarily stored within the network usage data reporting system.
- In particular, network usage data from traffic packets sharing a common flow record field entry may be grouped as each packet is received by a network usage data reporting system. Any one of the flow record fields, or a combination thereof, may be used for grouping the data from the incoming traffic packets. For example, traffic packets may be grouped for sharing a common source address/port # and/or a common destination address/port #. The network usage data within each group of traffic packets may then be summarized into a small record, which is temporarily stored within the reporting system as the “flow record.” In one embodiment, a flow record may include an entry for each unique source address received by the reporting system, where each entry specifies the number of bytes in each traffic packet sent from the unique source address.
- The flow records may be transferred (or retrieved) from the temporary data storage location at regular and frequent intervals as a “stream” of flow records (or a “network usage data stream”). Depending on the amount of storage space available, the transfer intervals may be substantially instantaneous or may range from mere seconds to several minutes. In one embodiment, the flow records are exported to a specified destination (e.g., a network usage analysis system) at a predetermined sampling rate (e.g., on the order of 104 flow records per second) or when the number of flow records within the temporary storage location reaches a predetermined maximum—which ever occurs first.
- It is often impractical to store all of the raw data from a network usage data stream within a hard-disk database system, due to the high volume and rate at which the data is presented to the database system. In fact, some database systems are incapable of handling the high momentum data streams output from a data reporting system (e.g., single disk database systems begin to fail at data stream rates of about 1,000 transactions/second). Though some high-end database systems may be capable of handling several hundred thousand transactions/second, they are usually extremely expensive to purchase and require an expensive support infrastructure to maintain. Furthermore, even if one were able to store the raw data within these large database systems (usually referred to as “data warehouses”), the sheer volume of stored data may preclude any possibility for timely analysis.
- A network intrusion detection system (IDS) is provided herein as one example of a network usage analysis system that does not store the network usage data stream within a database system. For this reason, the network IDS provided herein may be used for real-time analysis of high momentum data streams.
- As used herein, a “high momentum data stream” refers to any volatile data that is presented at a significantly high rate (usually measured in units of “transactions per second”). A “significantly high rate” may refer to a range extending, for example, between about one thousand transactions/second and several hundred thousand transactions/second, or greater. Even faster rates may be possible in the future. Though the current discussion focuses on Internet usage data, other examples of volatile data may include: satellite or transponder data (such as weather data, satellite imaging data, data from space probes, etc.), seismic data (from earthquakes, oil exploration, etc.), and particle traces from high-energy physics experiments, among others.
- Because the disclosed network intrusion detection system does not store the data, the system may analyze high momentum data streams without sampling, compressing, and/or aggregating the data stream, all of which would otherwise result in data loss. In other words, the network IDS described herein may be capable of analyzing “volatile data,” i.e., data that may be lost if it is not analyzed immediately, or before any attempts are made to sample, compress, aggregate and/or store the raw network usage data stream generated by the reporting system.
- By avoiding the data loss that inevitably results from sampling, compressing and/or aggregating the network usage data stream, the network intrusion detection system may be capable of detecting certain types of network security issues that may otherwise be undetectable. For purposes of this discussion, network security issues can be divided into three categories comprising: network attacks, abuse, and fraud/theft.
- In one example, a malicious user may use a network attack tool to perpetrate an attack on a single destination address (or port) by sending a large amount of traffic to the targeted address from a single source, or in some cases, from multiple sources. Such an attack is often referred to as a “flood attack” or a “denial of service” (DoS) attack. Attacks of this type tend to create congestion, deny service, infect systems and/or destroy resources (such as data and files) on the system targeted by the attack. For this reason, flood attacks are generally easy to detect once they have occurred (e.g., a server brought down by the attack may cause thousands of customers to complain). Although understanding where the flood attack originated may be useful, it is often too late by the time the attack is detected, since many transmitters of the flood traffic are unwitting users that have Trojans infecting their systems. Thus, it is often more beneficial to monitor network activity for “attack precursors,” or events that provide early indication of a possible upcoming attack.
- Scanning is one example of an attack precursor, and generally includes address scans and port scans. Address scans are typically hostile traffic used to probe multiple destination addresses in order to discover an open or accessible machine. On the other hand, port scans usually probe multiple ports on a single machine in order to discover an open or accessible port or application on that machine. Scan traffic cannot usually be detected using sampled or overly aggregated data, due to the small fraction of normal traffic volume typically consumed. By avoiding data loss, the network intrusion detection system described herein is able to detect scan traffic, and thus, utilize an effective tool for early indication of upcoming attacks.
- Most Internet Service Providers have end-user-agreements that forbid the use of subscriber-run servers, due to the excessive bandwidth consumed by the traffic sent to and from those servers. In addition, each user that subscribes to a Service Provider's network may be allocated a certain amount of network bandwidth. However, the usage difference between an abusive user (e.g., a subscriber running a forbidden server) and a light user makes it difficult to not only forecast future need, but also to implement fixed-price, all-you-can-use pricing plans without exceeding current network capacity.
- In addition to attacks, the network IDS described may successfully detect subscriber bandwidth abuse by avoiding the storage of high momentum data streams, such as Internet usage data. For example, the network IDS may initially aggregate the raw data stream in a manner that enables network traffic volume to be tracked per server port. If abnormal network activity is detected (or at least suspected) on a particular server port, the aggregation process may be updated to include subscriber identifying information (e.g., a subscriber ID number, source address or port), which may help to identify the particular subscriber(s) responsible for the abusive traffic sent to the busy server port.
- As mentioned above and described in more detail below, the network intrusion detection system is able to provide real-time monitoring of high momentum network usage data streams (also referred to herein as “flow record streams”), as well as real-time detection of suspicious or abnormal network activity (i.e., as it occurs). For example, the network IDS may provide a mechanism for obtaining additional information about the abnormal network activity that was not previously collected or analyzed by the system. Such a mechanism would enable real-time investigations into the abnormal activity, such as detecting a type or source of the attack or abuse (i.e., an event or entity responsible for the excessive traffic). The network IDS may also allow sufficient time (if only a matter of seconds) for launching attack countermeasures by providing a reliable means for detecting attack precursors (such as scan operations).
- Turning to the drawings,
FIG. 1A illustrates one embodiment of a networkusage analysis system 100 capable of monitoring and analyzing high momentum network usage data streams in accordance with the present invention. In general, networkusage analysis system 100 includes several main components, each of which is a software program. The main software program components of networkusage analysis system 100 may run on one or more computer systems. In one embodiment, each of the main software program components runs on its own computer system. - One suitable network usage analysis system for use with the present invention is disclosed in U.S. patent application Ser. No. 09/548,124, filed Apr. 12, 2000, entitled “Internet Usage Analysis System and Method,” and incorporated herein by reference.
- In one embodiment, network
usage analysis system 100 includesdata analysis system 130 anddata storage system 140.Data analysis system 130 receivesnetwork usage data 170 fromdata collection system 120, which in turn, receives the network usage data fromnetwork 110. In one embodiment,network 110 includes theInternet 115. Preferably,network usage data 170 is a real-time, high momentum stream of network usage data records (otherwise referred to herein as “transactions” or “flow records”). In one embodiment,network usage data 170 is a real-time stream of flow records generated by a network usage data reporting system (not shown) positioned onnetwork 110. -
Data analysis system 130 receives the streaming network usage data 170 (in the form of flow records) fromdata collection system 120 viacommunication link 160. In one embodiment,data collection system 120 may be included within a network usage data reporting system ofnetwork 110. In another embodiment, however, data collection system 120 (and all other system components downstream therefrom) may be coupled to a network usage data reporting system at a location outside ofnetwork 110. In other words, networkusage analysis system 100 may be implemented at a location physically apart from, though functionally coupled to,network 110. By locatingsystem 100 outside ofnetwork 110, network activity can be monitored across all ofnetwork 110 without adversely affecting network performance (e.g., without consuming memory or CPU resources on network servers, or otherwise hampering network traffic flow). As such, networkusage analysis system 100 may be considered a network-based intrusion detection system, in some embodiments. - Though shown in
FIG. 1A as separate fromdata analysis system 130,data collection system 120 may be a part ofdata analysis system 130, in another embodiment. One data collection system suitable for use with the present invention is commercially available under the trade name INTERNET USAGE MANAGER, from Hewlett-Packard, U.S.A. Other data collection and reporting systems suitable for use with the network usage analysis system in accordance with the present invention will become apparent to those skilled in the art after reading the present application. - In general,
data analysis system 130 may utilize one ormore capture modules 135 for monitoring network activity withinnetwork 110. In some cases, more than one capture module may be defined to characterize a particular flow record stream in a variety of different ways. Such a case will be described in reference toFIG. 1D . - More specifically,
data analysis system 130 utilizes capture module(s) 135 to collect pertinent portions offlow record stream 170 and to generate a statistical result therefrom. In some embodiments, the statistical result may be generated (and possibly stored) as disclosed in U.S. patent application Ser. No. 09/919,149 filed Jul. 31, 2001, entitled “Network Usage Analysis System Having Dynamic Statistical Data Distribution System and Method” and incorporated herein by reference. In some embodiments, the statistical result may also be updated in real-time using a rolling time interval, as described in U.S. patent application Ser. No. 09/919,527 filed Jul. 31, 2001, entitled “Network Usage Analysis System and Method For Updating Statistical Models” and incorporated herein by reference. Other methods for generating, storing and/or updating the statistical result are possible and within the scope of the invention. In some cases, capture module(s) 135 may also be used to analyze the statistical result, regardless of whether the statistical result is stored or not. - In one embodiment,
data analysis system 130 is responsive touser interface 150 for interactive analysis offlow record stream 170 using capture module(s) 135. In some cases,user interface 150 may include substantially any input/output device known in the art, such as a keyboard, a mouse, a touch pad, a display screen, etc. In one example, a graphical display of the statistical results may be output to a display screen atuser interface 150. In other cases,user interface 150 may comprise a separate computer system, which is coupled by a wired or wireless transmission medium todata analysis system 130. - In one embodiment,
data analysis system 130 comprises a computer software program, which is executable on one or more computers or servers for monitoring network activity in accordance with the present invention. The computer software program, including capture module(s) 135, may also be stored indata storage system 140. Thoughdata storage system 140 is shown inFIG. 1A as external todata analysis system 130,data storage system 140 may be included withindata analysis system 130, in an alternative embodiment.Data storage system 140 may comprise substantially any volatile memory (e.g., random access memory (RAM)) and/or any non-volatile memory (e.g., a hard disk drive or other persistent storage device) known in the art. -
FIG. 1C illustrates the embodiment in which only onecapture module 135 is included withindata analysis system 130. In particular,capture module 135 includes acollection module 132 for collecting a stream of flow records associated with an observation point within a network. An “observation point” is broadly defined herein as a point of interest in the network. -
FIG. 2 illustrates one embodiment of anetwork 200 which may include anetwork core 210 and a number of sub-networks (e.g.,sub-networks 220 and 230). In one example,network core 210 may represent the internal network of an Internet Service Provider (ISP), andsub-networks external network 240 through one or more network devices called “border routers” (denoted Ci). In one example, the external network may be a wide area network (WAN), such as the Internet, and may include several more sub-networks therein. Although threesub-networks external network 240. This type of network is generally referred to as a “hierarchical network,” and may contain one or more levels of sub-networks. In an alternative embodiment (not shown), the network may comprise a “flat network” in which there is substantially no distinction between the network core and sub-networks. - In some embodiments, an observation point may include a network device, such those denoted in
FIG. 2 as boundary devices (□) and internal devices (∘). As such, an observation point may include a network device, which is arranged on a boundary of the network (e.g., edge routers Bi or border routers Ci and Di) or a network device arranged within the network (e.g., internal routers Ei, and other internal devices denoted with the symbol, ∘). In other cases, an observation point may include a link, such as a path between two boundary network devices, a path between a boundary network device and an internal network device, or a path between two internal network devices. - Returning to
FIG. 1C ,collection module 132 may collect the stream of flow records in accordance with a first set of configuration parameters. In general, the first set of configuration parameters may designate a subset of data to be collected from each flow record in the stream, and a time interval over which to collect the subset of data. As will be described in more detail below, the first set of configuration parameters can be modified at any time to obtain additional data from a subsequent flow record stream, if abnormal network activity is indicated in at least a portion of the current flow record stream. - More specifically, the first set of configuration parameters designates one or more types of network usage data to be collected from
flow record stream 170. In other words, one or more “fields” or “categories” of network usage data may be collected as the “subset of data.” As shown inFIG. 1B , the flow record fields may contain summarized information about multiple traffic packets. This metadata (i.e., data about data) may include, for example, a source identifier (e.g. a source address or port), a destination identifier (e.g. a destination address or port), a start time and end time, and one or more traffic packet statistics (e.g., the amount of data transferred, such as the number of packets or the number of bytes/packet). In some cases, the flow record fields may contain other metadata, such as the packet protocol used to transfer the data (e.g., TCP or UDP), a packet protocol flag indicator, an input interface index, an output interface index, and a type of service, among other types of information. In some cases, the volume of network usage data collected can be greatly reduced by selecting only a few types of network usage data (or flow record fields) from each flow record in the stream. - As noted above, the first set of configuration parameters may also designate a time interval over which to collect the subset of data. In some cases, the time interval may be selected from a range of programmable time values extending between about one second and about 30 days (or more). In other cases, the range of programmable time values may be on the order of minutes to days. Alternatively, or in addition to specifying the length of time over which to collect the subset of data, the time interval may specify the length of time over which one or more statistical models are applied to the selected subset of data for generating statistical results therefrom. As such, the first set of configuration parameters may further designate a time interval type (e.g., fixed or rolling time intervals) for statistically analyzing the subset of data collected during the time interval. In brief, a fixed time interval would generate a statistical result of the collected subset of data around the end of the time interval; whereas a rolling time interval would generate and continuously update the statistical result over the duration of the time interval.
- In one embodiment,
collection module 132 may supply the first set of configuration parameters todata collection system 120 to specify the length of time over whichdata collection system 120 is to collect a particular subset of data from a network usage data reporting system. In an alternative embodiment, however,collection module 132 may retain the first set of configuration parameters without supplying them todata collection system 120. In other words,data collection system 120 may receive a real-time stream of flow records (containing, e.g., individual flow records or flow records that have been grouped and summarized), which are “flushed” from a temporary data storage location (usually RAM) within the network usage data reporting system at regular and frequent intervals. These “flushing intervals” are generally dependent on characteristics of the particular reporting system supplying the streams; therefore, the flushing intervals may be substantially instantaneous, or may range from mere seconds to several days (depending, e.g., on the amount of temporary storage space available within the particular reporting system). The time interval designated by the first set of configuration parameters may then be used bycollection module 132 for collecting the specified subset of data from the stream of flow records received bydata collection system 120. -
Capture module 135 also includes astatistical module 134 for generating a statistical result of the subsets of data collected from the flow record stream. In some cases,statistical module 134 may use the time interval specified by the first set of configuration parameters to generate the statistical result. For example,statistical module 134 may generate the statistical result at the end of the time interval, or alternatively, during the time interval as each subset of data is collected from the stream of flow records. - However, the actual generation of the statistical result may be conducted in accordance with a second set of configuration parameters. In general, the second set of configuration parameters designates a type of statistical model to be used for generating the statistical result, in addition to one or more properties associated with the designated type of statistical model. As will be described in more detail below, the second set of configuration parameters can be modified at any time after system initialization to generate a statistical result on a subsequent flow record stream, if abnormal network activity is indicated in at least a portion of the current record event stream.
- More specifically, the second set of configuration parameters designates a particular type of statistical model to be used for characterizing the subset of data collected from the flow record stream. In one embodiment, the type of statistical model may be selected from a group comprising a histogram (i.e., a distribution), the top N occurrences of a variable (i.e., a TopN distribution) and a time series of occurrences of the variable (i.e., a time series plot). Other statistical model types may be included depending on the network usage related problem to be solved. Exemplary statistical model types that may be used to solve a particular network usage related problem (such as, e.g., the detection of scan traffic or subscriber abuse) will be described in more detail below.
- In addition to statistical model type, the second set of configuration parameters designates one or more statistical model properties, such as whether the statistical result is to be generated as a linear or log distribution, in addition to the number and/or width of bins to be created for the distribution. In some cases, the statistical result may be generated dynamically by creating the bins in real-time and on an “as-needed-basis” (or “on-the-fly”) based on the values of the incoming data stream. The resultant distribution may then be output to
user interface 150 for current analysis and/or stored in memory for future analysis. - In some embodiments,
capture module 135 may also include ananalysis module 136 for analyzing the statistical result generated bystatistical module 134. As such, the analysis result and/or the statistical result may be used for monitoring, the network activity associated with the observation point. In some cases,analysis module 136 may analyze the statistical result upon completion of the time interval specified by the first set of configuration parameters. In other cases, however,analysis module 136 may be configured for analyzing statistical results that have been stored in memory. - In any case, analysis of the statistical result may be conducted in accordance with a third set of configuration parameters. The third set of configuration parameters may designate a type of analysis model to be used for analyzing the statistical result, in addition to one or more properties associated with the designated type of analysis model. As will be described in more detail below, the third set of configuration parameters can be modified at any time after system initialization to reanalyze a previous statistical result (or analyze a statistical result of a subsequent flow record stream), if abnormal network activity is indicated in at least a portion of the current flow record stream.
- More specifically, the third set of configuration parameters designates a particular type of analysis model to be used for monitoring network activity. In one embodiment, the type of analysis model may be selected from a group comprising the statistical result, a normalized version of the statistical result, a probability density function of the statistical result, and a cumulative density function of the statistical result. Other types of analysis models may be included depending on the network usage related problem to be solved. Exemplary types of analysis models that may be used to solve a particular network usage related problem (such as, e.g., the detection of scan traffic or subscriber abuse) will be described in more detail below.
- In addition to the type of analysis model, the third set of configuration parameters may designate one or more analysis model properties, such as a threshold value, a slope value or a shape, each of which may be associated with either “normal” or “abnormal” network activity. For example, the analysis results may indicate an occurrence of abnormal network activity upon exceeding a particular threshold or slope value. Alternatively, abnormal network activity may be indicated if a shape of the current analysis results deviates significantly from a shape of analysis results known for characterizing so-called “normal” network activity. In any case, the analysis results may be output to
user interface 150 for current observation and/or stored in memory for future observation. - In one embodiment, the statistical result may be analyzed “automatically” by additional computer program instructions, or “manually” by a user of the network usage analysis system. For example, the statistical result may be graphically (or otherwise) displayed on a display screen at
user interface 150. As such, the user (and/or the computer program instructions) may use the statistical result for 1) monitoring and/or detecting various network usage “characteristics” or “behaviors,” or 2) selecting an analysis model for further analysis of the displayed statistical results. Alternatively, the analysis results may be automatically generated by the additional computer instructions and graphically (or otherwise) displayed on the display screen in lieu of the statistical results. In this manner, the analysis results may be used for monitoring network activity and detecting abnormal network activity therefrom. - The displayed (statistical and/or analysis) results may also be used for performing interactive analysis of the network usage data via
user interface 150. In other words,user interface 150 may accept user commands for modifying any of the first, second or third sets of configuration parameters. As noted above, the first, second and third sets of configuration parameters can be modified at any time after system initialization to collect, generate and/or analyze a subsequent stream of flow records in a different manner. For example, one or more of the configuration parameters may be modified after abnormal activity is initially detected, so that a subset of the network activity corresponding to the abnormal activity can be subsequently collected, generated and/or analyzed in much greater detail. - Unlike other systems, the present system is able to dynamically modify the configuration parameters without the need to shut down or temporarily suspend system operations. Such dynamic modification may alter a magnification level by which the subset of network activity is subsequently monitored. As will be described in more detail below, the magnification level may be altered, in some cases, to determine whether the observation point is responsible for the detected abnormal network activity (i.e., whether the observation point is a “source” of the abnormal network activity).
-
FIG. 1D illustrates an embodiment in whichmultiple capture modules 135 are included withindata analysis system 130. In some cases, capturemodules 135 may be arranged in a hierarchy or tree structure, such that an output of a higher level capture module (e.g.,capture module 135 a) may be input to a lower level capture module (e.g.,capture module FIG. 1D illustrates a binary tree structure merely for the purpose of simplicity; alternative structures and configurations may be applicable. - In general, each of the capture modules shown in
FIG. 1D includes acollection module 132, astatistical module 134 and ananalysis module 136, as described above in reference toFIG. 1 C . However, one or more of the capture modules ofFIG. 1D may be independently configured for characterizing a current flow record stream in a slightly different manner. For example, a higher level capture module may generate a distribution of the traffic volume per destination server port number (FIG. 7A ), whereas a lower level capture module may generate a distribution of the traffic volume per subscriber on a particular server port number (FIG. 7C ). Such independent configuration may enable multiple “views” to be obtained from a single stream of flow records associated with a particular observation point. - In addition to independent configuration, one or more capture modules of
FIG. 1D may be dynamically reconfigured for characterizing a subsequent flow record stream (or possibly, a current flow record stream) in a slightly different manner. In some cases, a higher level capture module may be reconfigured for collecting additional data from a subsequent flow record stream, if abnormal network activity is indicated from results obtained by a lower level capture module on a current (or previous) flow record stream. For example, assume that a higher level capture module (e.g.,capture module 135 a) is initially configured for collecting the destination server port number and packet volume from each flow record in the stream. However, if results from a lower level capture module (e.g.,capture module 135 f) indicate abnormal activity on one or more destination server port numbers, the higher level capture module may be reconfigured to also collect, e.g., the subscriber ID numbers. The lower level capture module may also need to be reconfigured to accept the newly collected subscriber ID numbers. Therefore, the collection of additional data is generally achieved by selecting a different set of configuration parameters for collection module(s) 132 within one or more levels ofcapture modules 135. - In some cases, a higher level capture module may be reconfigured for generating a new statistical result of a subsequent flow record stream, if abnormal network activity is indicated from results obtained by a lower level capture module on a current (or previous) flow record stream. In some cases, new statistical results may be generated by performing the reconfiguration process in reverse. For example, a lower level capture module may be dynamically reconfigured for generating a new statistical result, if the statistical results from a higher level capture module provide indication of abnormal network activity. Therefore, the generation of new statistical results is generally achieved by selecting a different set of configuration parameters for the statistical module(s) 134 within one or more levels of
capture modules 135. - In some cases, a higher level capture module may be reconfigured for analyzing a subsequent statistical result in a different manner, if abnormal network activity is indicated from results obtained by a lower level capture module on a current (or previous) flow record stream. In some cases, new analysis results may be generated by performing the reconfiguration process in reverse. For example, a lower level capture module may be dynamically reconfigured for analyzing a current statistical result, if the analysis results from a higher level capture module provide indication of abnormal network activity. Therefore, the generation of new analysis results is generally achieved by selecting a different set of configuration parameters for the analysis module(s) 136 within one or more levels of
capture modules 135. - In this manner,
multiple capture modules 135 may be used for generating a plurality of statistical and/or analysis results. At any level of the tree structure, the results may be sent to a display device for current observation or analysis, to a storage device for future observation or analysis, or to a lower level capture module for further processing. - A computer-
executable method 300 for detecting abnormal network activity will now be described in reference toFIGS. 3 and 4 . In some embodiments,method 300 may be used for isolating a source of the abnormal activity. In general,method 300 is performed by networkusage analysis system 100, as described above inFIGS. 1 and 2 . As such,method 300 is implemented as computer-executable program instructions, which may be stored within a data storage device, transferred over a transmission medium, and executed by a processing device, ofsystem 100. - As shown in
FIG. 3 , the method may begin inbox 310 by collecting a stream of flow records associated with one or more observation points within a network. As noted above, an observation point may comprise a network device arranged within the network (i.e., an “internal network device”), a network device arranged on boundary of the network (i.e., a “boundary network device”), or a link arranged between two network devices. In some cases, an observation point may further comprise a computer system or server arranged within, or merely coupled to, the network. - In a specific embodiment, the stream of flow records are collected from one or more boundary network devices (e.g., edge or border routers). In other words, the present method may avoid collecting duplicate flow record streams by “metering at the edges” of the network (i.e., by collecting flow record streams where traffic originates or terminates), thereby reducing the over-all volume of data collected. However, such an embodiment should not be interpreted to limit the location of observation points to the network boundary. Instead, metering at the edges enables the flow record streams to be obtained from any number of observation points (e.g., from one to thousands of points) located substantially anywhere within the network. In addition, multiple flow record streams may be simultaneously obtained from any number of observation points at substantially any time of day (i.e., regardless of network usage), without adversely affecting network performance.
- As noted above, the stream of flow records may be collected by data collection system 120 (or alternatively, by collection module 132) during a first time interval. In one embodiment, the collection system or module may be configured for collecting only the portions of the flow records that are relevant to a particular
statistical module 134. In one example, the only portions (i.e., “subset of data”) collected during the first time interval may be a source identifier (e.g., a source address) and/or a destination identifier (e.g., a destination port). As a result, the over-all volume of data collected may be greatly reduced by collecting only a subset of data from each flow record in the stream. In an alternative embodiment, however, the entire flow record (and possibly portions of the traffic packet data) may be collected for future analysis. - In
box 320, one or more statistical results are generated by grouping the flow records (or collected portions thereof in accordance with a set of configuration parameters. The flow records (or collected portions thereof) may also be grouped by observation point if network activity is to be monitored at more than one observation point. The set of configuration parameters may specify the subset of data to be collected from each flow record in the stream and the first time interval (over which to collect the subset of data). In addition, the set of configuration parameters may also designate a type of statistical model to be used for generating the statistical results, as well as one or more properties associated with the designated type of statistical model. - For example, in one embodiment, only the destination port may be collected from each flow record during the first time interval. In such an embodiment, a distribution may be chosen to characterize the number of unique destination ports addressed (per server) during the first time interval.
FIG. 4A illustrates an exemplary statistical result (400) in which only the top N internal servers are displayed, based on the number of unique destination ports (or, unique ports local to each server) addressed during the first time interval. In some cases,statistical result 400 may be used for monitoring the network traffic sent to each of the top N servers during the first time interval. As a result,statistical result 400 could be used for detecting abnormal network activity that may occur during the first time interval. In the embodiment ofFIG. 4A , for example, an automated scan for open ports (i.e., a port scan) on servers “mail1” and “web3” may be suspected, due to the abnormally high volume of traffic sent to servers “mail1” and “web3” during the first time interval. - In another embodiment, the source address and the destination port may be collected from each flow record during the first time interval. A distribution may be chosen to characterize the number of unique source addresses, which are sending traffic to a relatively large number of unique destination ports during the first time interval.
FIG. 4B illustrates an exemplary statistical result (410) displaying the number of unique source addresses that are sending network traffic to more than 250 unique destination (or local) ports on each of the top N servers. Ifstatistical result 410 is used for monitoring network activity, one may suspect that up to six sources may be sending scanning traffic to servers “mail1” and “web3.” - In
box 330, the statistical results are analyzed for monitoring network activity associated with the one or more observation points (e.g., the Top N servers). As mentioned above, the statistical results may be analyzed, in some cases, by noting characteristics of the statistical results that appear to be suspicious or abnormal (recall, the high traffic volume sent to servers “mail1” and “web3”). In other cases, however, the statistical results may be manipulated to produce so-called “analysis results,” which may then be used for monitoring network activity associated with one or more of the observation points. In one example, analysis results may be generated by applying a density function to the statistical results (e.g., a probability or cumulative density function as shown inFIGS. 4C and 4D , respectively). In such an example, network activity can be monitored by comparing the analysis results to a predefined, though possibly reconfigurable, benchmark value. - In some cases, abnormal network activity may be detected from the analysis results if the amount of network activity sent to (or from) an observation point exceeds a predefined threshold value. The threshold value may be selected “automatically” by additional computer program instructions, or “manually” by a user of the network usage analysis system, and may be subsequently changed or updated, as desired. The present invention eliminates any guesswork used in conventional methods (which may select a fixed threshold value based on personal experience, rule-of-thumb, etc.) by designating the threshold value as a percentage of the total network activity sent to (or from) the observation point. In this manner, the threshold value may be chosen regardless of distribution shape; thus, no assumptions have to be made concerning whether the variable of interest (e.g., network activity) is normally distributed, or distributed by any other mathematically derived means.
- In other cases, abnormal network activity may be detected if a characteristic of the analysis results deviates significantly from a characteristic known for its association with “normal” network activity. In one example, network activity may be monitored by observing a shape (i.e., an envelope) of the analysis results. In such an example, abnormal network activity may be detected if the observed shape deviates significantly (e.g., more than 5-20% deviation) from a predetermined shape known for its association with “normal” network activity. In another example, network activity may be monitored by calculating an area under the envelope, or by measuring a slope of the analysis results at a location of interest. As such, abnormal network activity may be detected if the calculated area or the measured slope deviates significantly from predetermined area and slope values known for their association with “normal” network activity. It is noted that methods other than those described above may also be used for detecting abnormal activity.
- Note that the terms “normal network activity” and “abnormal network activity” are used in a relative sense. Any particular values or characteristics of network activity, which may be distinguished as either “normal” or “abnormal,” are generally dependent on the network activity being monitored, as well as other factors, such as the time of day such monitoring occurs. However, one of ordinary skill in the art would be able to determine appropriate values or characteristics, which correspond to “normal” or “abnormal” network activity as it relates to a particular application, in light of the disclosure provided herein and without undue experimentation.
- For example, network activity can be monitored to establish normative behaviors for different times of the day, different days of the week, etc. The normative behaviors may then be used to determine a benchmark value (e.g., a threshold, slope, or shape), or possibly several benchmark values corresponding to different times, days, etc. By storing the benchmark value(s) in memory, subsequent network activity can be monitored without the need for storing the previously established normative behavior (i.e., previous statistical or analysis results) for comparison purposes. By storing the benchmark value(s), in lieu of the statistical or analysis results, the present method significantly reduces storage and processor requirements placed on the present system. However, the statistical or analysis results may also be stored, if desired.
-
FIG. 4C illustrates an embodiment in which analysis result 420 is produced by applying a probability density function to the data initially collected for generatingstatistical result 410. As such,analysis result 420 illustrates the number of subscribers (i.e., designated by unique source addresses), which are contributing traffic to each of the unique destination ports on a particular server (e.g., server “mail1”) during the first time interval. In the embodiment ofFIG. 4C , a port scan may be suspected if a spike of activity is observed, e.g., around the 99th percentile of the total number of destination ports. -
FIG. 4D illustrates an embodiment in which analysis result 430 is produced by applying a cumulative density function to the data initially collected for generatingstatistical result 410. As such,analysis result 430 illustrates the percentage of subscribers (i.e., designated by unique source addresses), which are contributing traffic to less than a particular number of unique destination ports on a particular server (e.g., server “mail1”) during the first time interval. In the embodiment ofFIG. 4D , abnormal activity may be detected, for example, if the percentage of subscribers contributing traffic to less than 10 unique destination ports decreases from about 95% to about 80%. In other words, the percentage of subscribers contributing traffic to more than 10 unique destination ports has increased from about 5% to about 20%. - It may not be feasible to record all dimensions of a high momentum data stream (e.g., a flow record stream), due to the high volume and speed at which the data stream would be presented to a storage system, as well as the high cost of such massive storage. Therefore, after establishing normative behaviors or characteristics of the high momentum data stream, the present method provides an inventive technique for dynamically exploring certain deviations from those norms without requiring the data stream to be stored. Though this technique may be somewhat ineffective for discovering once-in-a-lifetime events, it is ideal for detecting and exploring patterns in a stream. Fortunately, many types of network activity can be characterized as patternistic behavior. Examples of such network activity include several types of attack (e.g., flood attacks), abuse (e.g., subscriber-run servers), and theft (e.g., address spoofing), in addition to activity unrelated to network security (e.g., network congestion). Due to the repetitive nature of patterns, the technique enables suspect or abnormal network activity to be further explored at some point in the future. Since exploration occurs as we move forward in time, not backward, the technique is referred to herein as “Drill Forward.”
- For the purposes of this discussion, the term “Drill Forward” refers to the process of obtaining additional information (e.g., higher granularity data) about a particular observation point (e.g., a particular network node, host server, or subscriber) from a real-time stream of flow records AFTER analysis of data previously collected from the stream causes one to become suspicious of the observation point. Generally speaking, the Drill Forward technique enables real-time investigation into abnormal network activity by allowing real-time modification of capture module configuration parameters. Though the Drill Forward technique has been described in the context of network security, the technique may be applied to investigate any other area of network usage.
- If abnormal activity is detected in
box 340, the set of configuration parameters can be modified inbox 350 to alter a magnification level by which a subset of the network activity is subsequently monitored. This subset is generally associated with the abnormal activity detected inbox 340. If no abnormal activity is detected, however, the magnification level can be maintained (or adjusted, as desired) while the process of collecting, generating, analyzing and detecting is repeated (in box 310) for a subsequent stream of flow records. - In some cases, the “magnification level” may be altered to characterize a subsequent stream of flow records (i.e., flow records obtained during a subsequent time interval) in a slightly different manner. For example,
statistical result 410 may have been generated after modifying the set of configuration parameters to collect additional data (e.g., to collect the source address) from a subsequent stream of flow records, in addition to the destination port collected to generatestatistical result 400. As a result, the subsequent stream of flow records may be collected, and thus, a subsequent plurality of statistical results may be generated, in greater detail than they were previously collected and generated. In some cases, the type of abnormal network activity may be determined by altering the magnification level. - In other cases, however, the “magnification level” may be altered to focus on a particular subset of the flow record stream where the abnormal network activity occurred. For example, abnormal activity may be detected (or at least suspected) from
analysis result 430. To obtain a better view of the abnormal activity, the set of configuration parameters may be modified to focus on the subset of subscribers sending traffic to the greatest number of unique destination ports. For example, the set of configuration parameters may be modified to collect subscriber ID numbers, in addition to the flow record fields previously collected. As a result, a particular subscriber or subset of subscribers may be determined to be a source of the abnormal network activity. - In some cases, however, it may be necessary to repeat the steps of collecting (box 310), generating (box 320), analyzing (box 330) and modifying (box 340) over one or more consecutive time intervals in order to successfully isolate the source of abnormal network activity to one or more of the observation points (i.e., to one or more subscribers, in the current example). Unlike many conventional techniques, however, the present method enables a source of the abnormal network activity to be isolated without utilizing additional network resources, such as network probes and traces.
- As described above, the present method provides real-time detection and investigation of abnormal network activity. In the realm of network security, for example, the present method may be used for detecting event precursors (e.g., port or address scans), which may provide early indication of an upcoming attack. Such early indication may enable a network technician to minimize the amount of damage inflicted by the attack, or possibly, to prevent the upcoming attack from occurring. In addition, the present method may be used to provide real-time detection of various types of attacks, abuse, fraud and theft by configuring the capture modules in an appropriate manner.
- In one example,
FIG. 5 illustrates exemplary statistical results that may be used for detecting flood attacks. In particular,FIG. 5 plots the ratio of offered load to channel capacity for the Top N subscriber IDs. A ratio of greater than about 1.0 for any sustained period may indicate the occurrence of a flood attack. - In another example,
FIG. 6 illustrates exemplary statistical results that may be used for detecting an abusive process called “address spoofing,” where the sending party disguises their own IP address by changing it to some other address. In the example ofFIG. 6 , the number of flows to a network resource may be tracked, where the source IP address has been spoofed to an address within the Internet Assigned Numbers Authority (IANA) reserved address blocks. Since no one, other than the IANA, is allowed access to these reserved address blocks, a large number of flows to an IANA address may indicate the occurrence of address spoofing. - In yet another example,
FIGS. 7A-7E illustrate exemplary statistical results that may be used for detecting subscriber bandwidth abuse. As noted above, many Service Providers have end-user-agreements that forbid the use of subscriber-run servers.FIG. 7A is a graph illustrating the Top N subscriber server ports sorted by traffic volume.FIG. 7B is the same information represented differently (i.e., by changing the statistical model property to a logarithmic distribution) for better viewing of the lower ranked ports.FIGS. 7A and 7B highlight the subscriber server ports that are creating the highest volume of traffic on the network. - Now that we have a prioritized list of the most troublesome server ports, the Top N subscribers contributing to the traffic on a particular server port (e.g.,
Port 1214, Kazaa) may be isolated, as shown inFIG. 7C , by dynamically reconfiguring one or more capture modules after the next time interval. Now that a small subset of subscribers have been identified as the source of traffic on a few server ports, the capture modules can be dynamically reconfigured once more to investigate a particular subscriber, as shown inFIGS. 7D and 7E .FIG. 7D shows the TopN active server ports by volume for the subscriber (S411-66-13) found to be contributing the most traffic volume inFIG. 7C .FIG. 7E shows the TopN active server ports by volume and direction for subscriber S411-66-13. - Program instructions implementing methods such as those described above may be transmitted over or stored on a carrier medium. The carrier medium may be a transmission medium such as a wire, cable, or wireless transmission link, or a signal traveling along such a wire, cable, or link. The carrier medium may also be a storage medium such as a read-only memory, a random access memory, a magnetic or optical disk, or a magnetic tape.
- In an embodiment, a processor may be configured to execute the program instructions to perform a computer-executable method according to the above embodiments. The processor may take various forms, including a personal computer system, mainframe computer system, workstation, network appliance, Internet appliance, personal digital assistant (“PDA”), television system or other device. In general, the term “computer system” may be broadly defined to encompass any device having a processor, which executes instructions from a memory medium.
- The program instructions may be implemented in any of various ways, including procedure-based techniques, component-based techniques, and/or object-oriented techniques, among others. For example, the program instructions may be implemented using ActiveX controls, C++ objects, JavaBeans, Microsoft Foundation Classes (“MFC”), or other technologies or methodologies, as desired.
- The above discussion is meant to be illustrative of the principles and various embodiments of the present invention. Numerous variations and modifications will become apparent to those skilled in the art once the above disclosure is fully appreciated. Though a system and method were described primarily in the context of network security, the system and method could be used for detecting substantially any pattern of network “usage,” “activity,” “characteristic” or “behavior.” For example, the system and method could be used for detecting sources of network congestion. It is intended that the following claims be interpreted to embrace all such variations and modifications.
Claims (28)
1. A system, coupled to a network, the system comprising:
a collection module for collecting a stream of flow records from an observation point within the network, wherein the stream of flow records is collected in accordance with a first set of configuration parameters;
a statistical module for generating a statistical result from the stream of flow records as each flow record is collected, wherein the statistical result is generated in accordance with a second set of configuration parameters;
an analysis module for analyzing the statistical result to monitor network activity associated with the observation point, wherein the statistical result is analyzed in accordance with a third set of configuration parameters; and
wherein the first, second, and third sets of configuration parameters can be modified at any time, after abnormal activity is detected by the analysis module, to alter a magnification level by which a subset of the network activity is subsequently monitored.
2. The system as recited in claim 1 , wherein the subset of network activity corresponds to a portion of the network activity where the abnormal activity occurred.
3. The system as recited in claim 2 , further comprising one or more capture modules, each encapsulating the collection module and at least one of the statistical and analysis modules, wherein the one or more capture modules are implemented with computer-executable program instructions.
4. The system as recited in claim 3 , wherein the system further comprises a data storage device for storing the computer-executable program instructions and a processing device for executing the computer-executable program instructions.
5. The system as recited in claim 1 , wherein a user interface coupled to the system is configured for graphically displaying at least one of the statistical result and an analysis result thereof, and accepting user commands for modifying the first, second and third sets of configuration parameters.
6. The system as recited in claim 1 , wherein the collection module is configured for collecting the stream of flow records from a network device arranged on the network and associated with the observation point.
7. The system as recited in claim 6 , wherein the observation point comprises the network device.
8. The system as recited in claim 6 , wherein the observation point comprises an additional network device arranged within the network.
9. The system as recited in claim 6 , wherein the observation point comprises a link arranged between the network device and the additional network device.
10. The system as recited in claim 1 , wherein the first set of configuration parameters designates a subset of data to be collected from each flow record in the stream, and a time interval over which to collect the subset of data.
11. The system as recited in claim 10 , wherein the subset of data corresponds to one or more record event fields selected from a group comprising a source identifier, a destination identifier, a start time, an end time, and one or more traffic statistics.
12. The system as recited in claim 10 , wherein the time interval is selected from a range of programmable time values extending between about one second and about thirty days.
13. The system as recited in claim 10 , wherein the statistical module is configured for generating the statistical result during the time interval as each subset of data is collected from the stream of flow records.
14. The system as recited in claim 13 , wherein the second set of configuration parameters designates a type of statistical model to be used for generating the statistical result, in addition to one or more properties associated with the designated type of statistical model.
15. The system as recited in claim 13 , wherein the analysis module is configured for analyzing the statistical result upon completion of the time interval.
16. The system as recited in claim 15 , wherein the third set of configuration parameters designates a type of analysis model to be used for analyzing the statistical result, in addition to one or more properties associated with the designated type of analysis model.
17. The system as recited in claim 1 , wherein the magnification level is altered by modifying at least one of the first, second and third configuration parameters to respectively collect, generate or analyze a subsequent stream of flow records in a different manner.
18. A computer-executable method for isolating a source of abnormal network activity, the method comprising:
collecting a stream of flow records associated with a plurality of observation points within a network during a first time interval;
generating a plurality of statistical results by grouping the flow records, as each flow record is collected, by observation point and in accordance with a set of configuration parameters;
analyzing the plurality of statistical results upon completion of the first time interval to monitor network activity associated with each of the plurality of observation points;
modifying the set of configuration parameters, if abnormal network activity is detected during the step of analyzing, to alter a magnification level by which a subset of the network activity is subsequently monitored; and
repeating the steps of collecting, generating, analyzing, and modifying over one or more consecutive time intervals until the source of the abnormal network activity is isolated to one or more of the plurality of observation points.
19. The computer-executable method as recited in claim 18 , wherein the plurality of observation points comprises a plurality of network devices arranged within the network, on a boundary of the network, or both.
20. The computer-executable method as recited in claim 19 , wherein the plurality of observation points further comprises a plurality of links arranged between the plurality of network devices.
21. The computer-executable method as recited in claim 18 , wherein the set of configuration parameters designates a subset of data to be collected from each flow record in the stream, the first time interval over which to collect the subset of data, a type of statistical model to be used for generating the statistical results, and one or more properties associated with the designated type of statistical model.
22. The computer-executable method as recited in claim 18 , wherein said analyzing generates a plurality of analysis results by calculating a density function for each of the plurality of statistical results.
23. The computer-executable method as recited in claim 22 , wherein said analyzing monitors network activity by comparing the plurality of analysis results to a predefined threshold value.
24. The computer-executable method as recited in claim 22 , wherein said analyzing monitors network activity by comparing the plurality of analysis results to a predefined shape.
25. The computer-executable method as recited in claim 22 , wherein said analyzing monitors network activity without requiring previous statistical or analysis results to be stored for comparison purposes.
26. The computer-executable method as recited in claim 18 , wherein said modifying enables a subsequent stream of flow records to be collected and a subsequent plurality of statistical results to be generated in greater detail than they were previously collected and generated.
27. A computer-usable medium, comprising:
a first set of program instructions executable on a computer system for collecting a stream of flow records from a plurality of observation points within a network;
a second set of program instructions executable on a computer system for generating a plurality of statistical results by grouping the flow records, as each flow record is collected, by observation point and in accordance with a set of configuration parameters;
a third set of program instructions executable on a computer system for analyzing the plurality of statistical results to monitor network activity associated with each of the plurality of observation points; and
wherein any of the first, second and third program instructions can be programmably reconfigured at any time, after abnormal activity is detected by the third set of program instructions, to alter a magnification level by which a subset of the network activity is subsequently monitored.
28. The computer-usable medium as recited in claim 27 , wherein the computer-usable medium comprises a storage device, a processing device or a transmission medium.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/021,942 US20050234920A1 (en) | 2004-04-05 | 2004-12-22 | System, computer-usable medium and method for monitoring network activity |
DE102005010923A DE102005010923B4 (en) | 2004-04-05 | 2005-03-09 | System, computer-usable medium and method for monitoring network activity |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US55980804P | 2004-04-05 | 2004-04-05 | |
US11/021,942 US20050234920A1 (en) | 2004-04-05 | 2004-12-22 | System, computer-usable medium and method for monitoring network activity |
Publications (1)
Publication Number | Publication Date |
---|---|
US20050234920A1 true US20050234920A1 (en) | 2005-10-20 |
Family
ID=35062394
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/021,942 Abandoned US20050234920A1 (en) | 2004-04-05 | 2004-12-22 | System, computer-usable medium and method for monitoring network activity |
Country Status (2)
Country | Link |
---|---|
US (1) | US20050234920A1 (en) |
DE (1) | DE102005010923B4 (en) |
Cited By (97)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060092851A1 (en) * | 2004-10-29 | 2006-05-04 | Jeffrey Forrest Edlund | Method and apparatus for communicating predicted future network requirements of a data center to a number of adaptive network interfaces |
US20060161597A1 (en) * | 2005-01-14 | 2006-07-20 | Ougarov Andrei V | Child data structure update in data management system |
US20070019640A1 (en) * | 2005-07-11 | 2007-01-25 | Battelle Memorial Institute | Packet flow monitoring tool and method |
US7263464B1 (en) * | 2004-08-27 | 2007-08-28 | Tonic Software, Inc. | System and method for monitoring events in a computing environment |
US20070250523A1 (en) * | 2006-04-19 | 2007-10-25 | Beers Andrew C | Computer systems and methods for automatic generation of models for a dataset |
WO2008033346A2 (en) * | 2006-09-12 | 2008-03-20 | Morgan Stanley | Systems and methods for establishing rules for communication with a host |
US20080208890A1 (en) * | 2007-02-27 | 2008-08-28 | Christopher Patrick Milam | Storage of multiple, related time-series data streams |
US20080222717A1 (en) * | 2007-03-08 | 2008-09-11 | Jesse Abraham Rothstein | Detecting Anomalous Network Application Behavior |
US7433960B1 (en) * | 2008-01-04 | 2008-10-07 | International Business Machines Corporation | Systems, methods and computer products for profile based identity verification over the internet |
US20090043724A1 (en) * | 2007-08-08 | 2009-02-12 | Radware, Ltd. | Method, System and Computer Program Product for Preventing SIP Attacks |
US20090126023A1 (en) * | 2007-11-12 | 2009-05-14 | Yun Joobeom | Apparatus and method for forecasting security threat level of network |
US20090154363A1 (en) * | 2007-12-18 | 2009-06-18 | Josh Stephens | Method of resolving network address to host names in network flows for network device |
US20090328027A1 (en) * | 2007-03-30 | 2009-12-31 | Fujitsu Limited | Cluster system, process for updating software, service provision node, and computer-readable medium storing service provision program |
US20090327903A1 (en) * | 2006-07-06 | 2009-12-31 | Referentia Systems, Inc. | System and Method for Network Topology and Flow Visualization |
US20110154132A1 (en) * | 2009-12-23 | 2011-06-23 | Gunes Aybay | Methods and apparatus for tracking data flow based on flow state values |
US7975044B1 (en) * | 2005-12-27 | 2011-07-05 | At&T Intellectual Property I, L.P. | Automated disambiguation of fixed-serverport-based applications from ephemeral applications |
US20110179028A1 (en) * | 2010-01-15 | 2011-07-21 | Microsoft Corporation | Aggregating data from a work queue |
US20110267964A1 (en) * | 2008-12-31 | 2011-11-03 | Telecom Italia S.P.A. | Anomaly detection for packet-based networks |
US20110292818A1 (en) * | 2010-05-27 | 2011-12-01 | Solarwinds Worldwide, Llc | Smart traffic optimization |
US20110307691A1 (en) * | 2008-06-03 | 2011-12-15 | Institut Telecom-Telecom Paris Tech | Method of tracing and of resurgence of pseudonymized streams on communication networks, and method of sending informative streams able to secure the data traffic and its addressees |
US8099674B2 (en) | 2005-09-09 | 2012-01-17 | Tableau Software Llc | Computer systems and methods for automatically viewing multidimensional databases |
US8102770B2 (en) * | 2006-08-22 | 2012-01-24 | Embarq Holdings Company, LP | System and method for monitoring and optimizing network performance with vector performance tables and engines |
US20120137366A1 (en) * | 2005-11-14 | 2012-05-31 | Cisco Technology, Inc. | Techniques for network protection based on subscriber-aware application proxies |
US8274905B2 (en) | 2006-08-22 | 2012-09-25 | Embarq Holdings Company, Llc | System and method for displaying a graph representative of network performance over a time period |
US8307065B2 (en) | 2006-08-22 | 2012-11-06 | Centurylink Intellectual Property Llc | System and method for remotely controlling network operators |
US8358580B2 (en) | 2006-08-22 | 2013-01-22 | Centurylink Intellectual Property Llc | System and method for adjusting the window size of a TCP packet through network elements |
US8374090B2 (en) | 2006-08-22 | 2013-02-12 | Centurylink Intellectual Property Llc | System and method for routing data on a packet network |
US8407765B2 (en) | 2006-08-22 | 2013-03-26 | Centurylink Intellectual Property Llc | System and method for restricting access to network performance information tables |
US8472326B2 (en) | 2006-08-22 | 2013-06-25 | Centurylink Intellectual Property Llc | System and method for monitoring interlayer devices and optimizing network performance |
US8477614B2 (en) | 2006-06-30 | 2013-07-02 | Centurylink Intellectual Property Llc | System and method for routing calls if potential call paths are impaired or congested |
US8488495B2 (en) | 2006-08-22 | 2013-07-16 | Centurylink Intellectual Property Llc | System and method for routing communications between packet networks based on real time pricing |
US8488447B2 (en) | 2006-06-30 | 2013-07-16 | Centurylink Intellectual Property Llc | System and method for adjusting code speed in a transmission path during call set-up due to reduced transmission performance |
US8509082B2 (en) | 2006-08-22 | 2013-08-13 | Centurylink Intellectual Property Llc | System and method for load balancing network resources using a connection admission control engine |
US8520603B2 (en) | 2006-08-22 | 2013-08-27 | Centurylink Intellectual Property Llc | System and method for monitoring and optimizing network performance to a wireless device |
US8531954B2 (en) | 2006-08-22 | 2013-09-10 | Centurylink Intellectual Property Llc | System and method for handling reservation requests with a connection admission control engine |
US8537695B2 (en) | 2006-08-22 | 2013-09-17 | Centurylink Intellectual Property Llc | System and method for establishing a call being received by a trunk on a packet network |
US8549405B2 (en) | 2006-08-22 | 2013-10-01 | Centurylink Intellectual Property Llc | System and method for displaying a graphical representation of a network to identify nodes and node segments on the network that are not operating normally |
US8576722B2 (en) | 2006-08-22 | 2013-11-05 | Centurylink Intellectual Property Llc | System and method for modifying connectivity fault management packets |
US20130340076A1 (en) * | 2012-06-19 | 2013-12-19 | Deja Vu Security, Llc | Code repository intrusion detection |
US20130346417A1 (en) * | 2011-09-12 | 2013-12-26 | Hitachi, Ltd. | Stream data anomaly detection method and device |
US8619820B2 (en) | 2006-08-22 | 2013-12-31 | Centurylink Intellectual Property Llc | System and method for enabling communications over a number of packet networks |
US8619600B2 (en) | 2006-08-22 | 2013-12-31 | Centurylink Intellectual Property Llc | System and method for establishing calls over a call path having best path metrics |
US8619596B2 (en) | 2006-08-22 | 2013-12-31 | Centurylink Intellectual Property Llc | System and method for using centralized network performance tables to manage network communications |
US20140041032A1 (en) * | 2012-08-01 | 2014-02-06 | Opera Solutions, Llc | System and Method for Detecting Network Intrusions Using Statistical Models and a Generalized Likelihood Ratio Test |
US8687614B2 (en) | 2006-08-22 | 2014-04-01 | Centurylink Intellectual Property Llc | System and method for adjusting radio frequency parameters |
US8700671B2 (en) | 2004-08-18 | 2014-04-15 | Siemens Aktiengesellschaft | System and methods for dynamic generation of point / tag configurations |
US8717911B2 (en) | 2006-06-30 | 2014-05-06 | Centurylink Intellectual Property Llc | System and method for collecting network performance information |
US8743703B2 (en) | 2006-08-22 | 2014-06-03 | Centurylink Intellectual Property Llc | System and method for tracking application resource usage |
US8743700B2 (en) | 2006-08-22 | 2014-06-03 | Centurylink Intellectual Property Llc | System and method for provisioning resources of a packet network based on collected network performance information |
US8750158B2 (en) | 2006-08-22 | 2014-06-10 | Centurylink Intellectual Property Llc | System and method for differentiated billing |
US8879391B2 (en) | 2008-04-09 | 2014-11-04 | Centurylink Intellectual Property Llc | System and method for using network derivations to determine path states |
US9094257B2 (en) | 2006-06-30 | 2015-07-28 | Centurylink Intellectual Property Llc | System and method for selecting a content delivery network |
US20150248610A1 (en) * | 2006-03-13 | 2015-09-03 | Comcast Cable Communications, Llc | Tool for predicting capacity demands on an electronic system |
US9300554B1 (en) | 2015-06-25 | 2016-03-29 | Extrahop Networks, Inc. | Heuristics for determining the layout of a procedurally generated user interface |
US20160173508A1 (en) * | 2013-09-27 | 2016-06-16 | Emc Corporation | Dynamic malicious application detection in storage systems |
US9424318B2 (en) | 2014-04-01 | 2016-08-23 | Tableau Software, Inc. | Systems and methods for ranking data visualizations |
US9479341B2 (en) | 2006-08-22 | 2016-10-25 | Centurylink Intellectual Property Llc | System and method for initiating diagnostics on a packet network node |
US9521150B2 (en) | 2006-10-25 | 2016-12-13 | Centurylink Intellectual Property Llc | System and method for automatically regulating messages between networks |
US9613102B2 (en) | 2014-04-01 | 2017-04-04 | Tableau Software, Inc. | Systems and methods for ranking data visualizations |
US9621361B2 (en) | 2006-08-22 | 2017-04-11 | Centurylink Intellectual Property Llc | Pin-hole firewall for communicating data packets on a packet network |
US9660879B1 (en) | 2016-07-25 | 2017-05-23 | Extrahop Networks, Inc. | Flow deduplication across a cluster of network monitoring devices |
US20170149556A1 (en) * | 2015-11-20 | 2017-05-25 | Robert Bosch Gmbh | Operating method for an electronic device and electronic device |
US9729416B1 (en) | 2016-07-11 | 2017-08-08 | Extrahop Networks, Inc. | Anomaly detection using device relationship graphs |
EP3215943A4 (en) * | 2014-11-03 | 2017-10-11 | Vectra Networks, Inc. | A system for implementing threat detection using threat and risk assessment of asset-actor interactions |
US9832090B2 (en) | 2006-08-22 | 2017-11-28 | Centurylink Intellectual Property Llc | System, method for compiling network performancing information for communications with customer premise equipment |
US20180019931A1 (en) * | 2016-07-15 | 2018-01-18 | A10 Networks, Inc. | Automatic Capture of Network Data for a Detected Anomaly |
US10038611B1 (en) | 2018-02-08 | 2018-07-31 | Extrahop Networks, Inc. | Personalization of alerts based on network monitoring |
US10116679B1 (en) | 2018-05-18 | 2018-10-30 | Extrahop Networks, Inc. | Privilege inference and monitoring based on network behavior |
US10204211B2 (en) | 2016-02-03 | 2019-02-12 | Extrahop Networks, Inc. | Healthcare operations with passive network monitoring |
US10264003B1 (en) | 2018-02-07 | 2019-04-16 | Extrahop Networks, Inc. | Adaptive network monitoring with tuneable elastic granularity |
US10382296B2 (en) | 2017-08-29 | 2019-08-13 | Extrahop Networks, Inc. | Classifying applications or activities based on network behavior |
US10389574B1 (en) | 2018-02-07 | 2019-08-20 | Extrahop Networks, Inc. | Ranking alerts based on network monitoring |
US10411978B1 (en) | 2018-08-09 | 2019-09-10 | Extrahop Networks, Inc. | Correlating causes and effects associated with network activity |
US10594718B1 (en) | 2018-08-21 | 2020-03-17 | Extrahop Networks, Inc. | Managing incident response operations based on monitored network activity |
US10623428B2 (en) | 2016-09-12 | 2020-04-14 | Vectra Networks, Inc. | Method and system for detecting suspicious administrative activity |
EP3648408A1 (en) * | 2018-10-31 | 2020-05-06 | Atos Nederland B.V. | Monitoring system performance |
US20200167465A1 (en) * | 2017-06-05 | 2020-05-28 | Nec Corporation | Information processing device, information processing method, and recording medium |
JP2020120324A (en) * | 2019-01-25 | 2020-08-06 | 三菱電機株式会社 | Abnormality monitoring device and abnormality monitoring method |
US10742530B1 (en) | 2019-08-05 | 2020-08-11 | Extrahop Networks, Inc. | Correlating network traffic that crosses opaque endpoints |
US10742677B1 (en) | 2019-09-04 | 2020-08-11 | Extrahop Networks, Inc. | Automatic determination of user roles and asset types based on network monitoring |
WO2021038325A1 (en) * | 2019-08-26 | 2021-03-04 | Coupang Corp. | Systems and methods for dynamic aggregation of data and minimization of data loss |
US10965702B2 (en) | 2019-05-28 | 2021-03-30 | Extrahop Networks, Inc. | Detecting injection attacks using passive network monitoring |
US11165814B2 (en) | 2019-07-29 | 2021-11-02 | Extrahop Networks, Inc. | Modifying triage information based on network monitoring |
US11165831B2 (en) | 2017-10-25 | 2021-11-02 | Extrahop Networks, Inc. | Inline secret sharing |
US11165823B2 (en) | 2019-12-17 | 2021-11-02 | Extrahop Networks, Inc. | Automated preemptive polymorphic deception |
US11190542B2 (en) * | 2018-10-22 | 2021-11-30 | A10 Networks, Inc. | Network session traffic behavior learning system |
US11223633B2 (en) * | 2020-02-21 | 2022-01-11 | International Business Machines Corporation | Characterizing unique network flow sessions for network security |
US20220070282A1 (en) * | 2020-08-31 | 2022-03-03 | Ashkan SOBHANI | Methods, systems, and media for network model checking using entropy based bdd compression |
US11296967B1 (en) | 2021-09-23 | 2022-04-05 | Extrahop Networks, Inc. | Combining passive network analysis and active probing |
US11310256B2 (en) | 2020-09-23 | 2022-04-19 | Extrahop Networks, Inc. | Monitoring encrypted network traffic |
US11349861B1 (en) | 2021-06-18 | 2022-05-31 | Extrahop Networks, Inc. | Identifying network entities based on beaconing activity |
US11388072B2 (en) | 2019-08-05 | 2022-07-12 | Extrahop Networks, Inc. | Correlating network traffic that crosses opaque endpoints |
US11431744B2 (en) | 2018-02-09 | 2022-08-30 | Extrahop Networks, Inc. | Detection of denial of service attacks |
US11463466B2 (en) | 2020-09-23 | 2022-10-04 | Extrahop Networks, Inc. | Monitoring encrypted network traffic |
US11500882B2 (en) | 2014-04-01 | 2022-11-15 | Tableau Software, Inc. | Constructing data visualization options for a data set according to user-selected data fields |
US11546153B2 (en) | 2017-03-22 | 2023-01-03 | Extrahop Networks, Inc. | Managing session secrets for continuous packet capture systems |
US11843606B2 (en) | 2022-03-30 | 2023-12-12 | Extrahop Networks, Inc. | Detecting abnormal data access based on data similarity |
Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6279113B1 (en) * | 1998-03-16 | 2001-08-21 | Internet Tools, Inc. | Dynamic signature inspection-based network intrusion detection |
US6282546B1 (en) * | 1998-06-30 | 2001-08-28 | Cisco Technology, Inc. | System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment |
US20020032717A1 (en) * | 2000-09-08 | 2002-03-14 | The Regents Of The University Of Michigan | Method and system for profiling network flows at a measurement point within a computer network |
US6405251B1 (en) * | 1999-03-25 | 2002-06-11 | Nortel Networks Limited | Enhancement of network accounting records |
US6453345B2 (en) * | 1996-11-06 | 2002-09-17 | Datadirect Networks, Inc. | Network security and surveillance system |
US6484203B1 (en) * | 1998-11-09 | 2002-11-19 | Sri International, Inc. | Hierarchical event monitoring and analysis |
US20030002436A1 (en) * | 2001-06-20 | 2003-01-02 | Anderson Thomas E. | Detecting network misuse |
US6526022B1 (en) * | 1998-06-30 | 2003-02-25 | Sun Microsystems | Detecting congestion by comparing successive loss of packets in windows to provide congestion control in reliable multicast protocol |
US6535227B1 (en) * | 2000-02-08 | 2003-03-18 | Harris Corporation | System and method for assessing the security posture of a network and having a graphical user interface |
US6535482B1 (en) * | 1998-05-08 | 2003-03-18 | Nortel Networks Limited | Congestion notification from router |
US20030065409A1 (en) * | 2001-09-28 | 2003-04-03 | Raeth Peter G. | Adaptively detecting an event of interest |
US6546493B1 (en) * | 2001-11-30 | 2003-04-08 | Networks Associates Technology, Inc. | System, method and computer program product for risk assessment scanning based on detected anomalous events |
US20030101357A1 (en) * | 2001-11-29 | 2003-05-29 | Ectel Ltd. | Fraud detection in a distributed telecommunications networks |
US20030110396A1 (en) * | 2001-05-03 | 2003-06-12 | Lewis Lundy M. | Method and apparatus for predicting and preventing attacks in communications networks |
US20030115486A1 (en) * | 2001-12-14 | 2003-06-19 | Choi Byeong Cheol | Intrusion detection method using adaptive rule estimation in network-based instrusion detection system |
US20030135759A1 (en) * | 2002-01-16 | 2003-07-17 | Kim Sook Yeon | Method for representing, storing and editing network security policy |
US20030140140A1 (en) * | 2002-01-18 | 2003-07-24 | Jesse Lahtinen | Monitoring the flow of a data stream |
US6600720B1 (en) * | 1998-12-23 | 2003-07-29 | Nortel Networks Limited | Method and apparatus for managing communications traffic |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7506046B2 (en) * | 2001-07-31 | 2009-03-17 | Hewlett-Packard Development Company, L.P. | Network usage analysis system and method for updating statistical models |
-
2004
- 2004-12-22 US US11/021,942 patent/US20050234920A1/en not_active Abandoned
-
2005
- 2005-03-09 DE DE102005010923A patent/DE102005010923B4/en not_active Expired - Fee Related
Patent Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6453345B2 (en) * | 1996-11-06 | 2002-09-17 | Datadirect Networks, Inc. | Network security and surveillance system |
US6279113B1 (en) * | 1998-03-16 | 2001-08-21 | Internet Tools, Inc. | Dynamic signature inspection-based network intrusion detection |
US6535482B1 (en) * | 1998-05-08 | 2003-03-18 | Nortel Networks Limited | Congestion notification from router |
US6526022B1 (en) * | 1998-06-30 | 2003-02-25 | Sun Microsystems | Detecting congestion by comparing successive loss of packets in windows to provide congestion control in reliable multicast protocol |
US6282546B1 (en) * | 1998-06-30 | 2001-08-28 | Cisco Technology, Inc. | System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment |
US6484203B1 (en) * | 1998-11-09 | 2002-11-19 | Sri International, Inc. | Hierarchical event monitoring and analysis |
US6600720B1 (en) * | 1998-12-23 | 2003-07-29 | Nortel Networks Limited | Method and apparatus for managing communications traffic |
US6405251B1 (en) * | 1999-03-25 | 2002-06-11 | Nortel Networks Limited | Enhancement of network accounting records |
US6535227B1 (en) * | 2000-02-08 | 2003-03-18 | Harris Corporation | System and method for assessing the security posture of a network and having a graphical user interface |
US20020035698A1 (en) * | 2000-09-08 | 2002-03-21 | The Regents Of The University Of Michigan | Method and system for protecting publicly accessible network computer services from undesirable network traffic in real-time |
US20020032717A1 (en) * | 2000-09-08 | 2002-03-14 | The Regents Of The University Of Michigan | Method and system for profiling network flows at a measurement point within a computer network |
US20030110396A1 (en) * | 2001-05-03 | 2003-06-12 | Lewis Lundy M. | Method and apparatus for predicting and preventing attacks in communications networks |
US20030002436A1 (en) * | 2001-06-20 | 2003-01-02 | Anderson Thomas E. | Detecting network misuse |
US20030065409A1 (en) * | 2001-09-28 | 2003-04-03 | Raeth Peter G. | Adaptively detecting an event of interest |
US20030101357A1 (en) * | 2001-11-29 | 2003-05-29 | Ectel Ltd. | Fraud detection in a distributed telecommunications networks |
US6546493B1 (en) * | 2001-11-30 | 2003-04-08 | Networks Associates Technology, Inc. | System, method and computer program product for risk assessment scanning based on detected anomalous events |
US20030115486A1 (en) * | 2001-12-14 | 2003-06-19 | Choi Byeong Cheol | Intrusion detection method using adaptive rule estimation in network-based instrusion detection system |
US20030135759A1 (en) * | 2002-01-16 | 2003-07-17 | Kim Sook Yeon | Method for representing, storing and editing network security policy |
US20030140140A1 (en) * | 2002-01-18 | 2003-07-24 | Jesse Lahtinen | Monitoring the flow of a data stream |
Cited By (194)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8700671B2 (en) | 2004-08-18 | 2014-04-15 | Siemens Aktiengesellschaft | System and methods for dynamic generation of point / tag configurations |
US7263464B1 (en) * | 2004-08-27 | 2007-08-28 | Tonic Software, Inc. | System and method for monitoring events in a computing environment |
US20060092851A1 (en) * | 2004-10-29 | 2006-05-04 | Jeffrey Forrest Edlund | Method and apparatus for communicating predicted future network requirements of a data center to a number of adaptive network interfaces |
US20060161597A1 (en) * | 2005-01-14 | 2006-07-20 | Ougarov Andrei V | Child data structure update in data management system |
US8442938B2 (en) | 2005-01-14 | 2013-05-14 | Siemens Aktiengesellschaft | Child data structure update in data management system |
US20070019640A1 (en) * | 2005-07-11 | 2007-01-25 | Battelle Memorial Institute | Packet flow monitoring tool and method |
US7561569B2 (en) * | 2005-07-11 | 2009-07-14 | Battelle Memorial Institute | Packet flow monitoring tool and method |
US10712903B2 (en) | 2005-09-09 | 2020-07-14 | Tableau Software, Inc. | Systems and methods for ranking data visualizations using different data fields |
US11592955B2 (en) | 2005-09-09 | 2023-02-28 | Tableau Software, Inc. | Methods and systems for building a view of a dataset incrementally according to data types of user-selected data fields |
US11068122B2 (en) | 2005-09-09 | 2021-07-20 | Tableau Software, Inc. | Methods and systems for building a view of a dataset incrementally according to characteristics of user-selected data fields |
US9600528B2 (en) | 2005-09-09 | 2017-03-21 | Tableau Software, Inc. | Computer systems and methods for automatically viewing multidimensional databases |
US8099674B2 (en) | 2005-09-09 | 2012-01-17 | Tableau Software Llc | Computer systems and methods for automatically viewing multidimensional databases |
US10386989B2 (en) | 2005-09-09 | 2019-08-20 | Tableau Software, Inc. | Computer systems and methods for automatically viewing multidimensional databases |
US11847299B2 (en) | 2005-09-09 | 2023-12-19 | Tableau Software, Inc. | Building a view of a dataset incrementally according to data types of user-selected data fields |
US8844035B2 (en) * | 2005-11-14 | 2014-09-23 | Cisco Technology, Inc. | Techniques for network protection based on subscriber-aware application proxies |
US20120137366A1 (en) * | 2005-11-14 | 2012-05-31 | Cisco Technology, Inc. | Techniques for network protection based on subscriber-aware application proxies |
US7975044B1 (en) * | 2005-12-27 | 2011-07-05 | At&T Intellectual Property I, L.P. | Automated disambiguation of fixed-serverport-based applications from ephemeral applications |
US10108905B2 (en) * | 2006-03-13 | 2018-10-23 | Comcast Cable Communications, Llc | Improving an electronic system based on capacity demands of a network device |
US20150248610A1 (en) * | 2006-03-13 | 2015-09-03 | Comcast Cable Communications, Llc | Tool for predicting capacity demands on an electronic system |
US9292628B2 (en) | 2006-04-19 | 2016-03-22 | Tableau Software, Inc. | Systems and methods for generating models of a dataset for a data visualization |
US20070250523A1 (en) * | 2006-04-19 | 2007-10-25 | Beers Andrew C | Computer systems and methods for automatic generation of models for a dataset |
US7999809B2 (en) * | 2006-04-19 | 2011-08-16 | Tableau Software, Inc. | Computer systems and methods for automatic generation of models for a dataset |
US8860727B2 (en) | 2006-04-19 | 2014-10-14 | Tableau Software, Inc. | Computer systems and methods for automatic generation of models for a dataset |
US9154634B2 (en) | 2006-06-30 | 2015-10-06 | Centurylink Intellectual Property Llc | System and method for managing network communications |
US8976665B2 (en) | 2006-06-30 | 2015-03-10 | Centurylink Intellectual Property Llc | System and method for re-routing calls |
US8570872B2 (en) | 2006-06-30 | 2013-10-29 | Centurylink Intellectual Property Llc | System and method for selecting network ingress and egress |
US9094257B2 (en) | 2006-06-30 | 2015-07-28 | Centurylink Intellectual Property Llc | System and method for selecting a content delivery network |
US9054915B2 (en) | 2006-06-30 | 2015-06-09 | Centurylink Intellectual Property Llc | System and method for adjusting CODEC speed in a transmission path during call set-up due to reduced transmission performance |
US8488447B2 (en) | 2006-06-30 | 2013-07-16 | Centurylink Intellectual Property Llc | System and method for adjusting code speed in a transmission path during call set-up due to reduced transmission performance |
US9838440B2 (en) | 2006-06-30 | 2017-12-05 | Centurylink Intellectual Property Llc | Managing voice over internet protocol (VoIP) communications |
US9549004B2 (en) | 2006-06-30 | 2017-01-17 | Centurylink Intellectual Property Llc | System and method for re-routing calls |
US9749399B2 (en) | 2006-06-30 | 2017-08-29 | Centurylink Intellectual Property Llc | System and method for selecting a content delivery network |
US9118583B2 (en) | 2006-06-30 | 2015-08-25 | Centurylink Intellectual Property Llc | System and method for re-routing calls |
US8477614B2 (en) | 2006-06-30 | 2013-07-02 | Centurylink Intellectual Property Llc | System and method for routing calls if potential call paths are impaired or congested |
US8717911B2 (en) | 2006-06-30 | 2014-05-06 | Centurylink Intellectual Property Llc | System and method for collecting network performance information |
US10230788B2 (en) | 2006-06-30 | 2019-03-12 | Centurylink Intellectual Property Llc | System and method for selecting a content delivery network |
US10560494B2 (en) | 2006-06-30 | 2020-02-11 | Centurylink Intellectual Property Llc | Managing voice over internet protocol (VoIP) communications |
US9240930B2 (en) * | 2006-07-06 | 2016-01-19 | LiveAction, Inc. | System for network flow visualization through network devices within network topology |
US20130159864A1 (en) * | 2006-07-06 | 2013-06-20 | John Kei Smith | System for Network Flow Visualization through Network Devices within Network Topology |
US9350622B2 (en) | 2006-07-06 | 2016-05-24 | LiveAction, Inc. | Method and system for real-time visualization of network flow within network device |
US9246772B2 (en) | 2006-07-06 | 2016-01-26 | LiveAction, Inc. | System and method for network topology and flow visualization |
US9003292B2 (en) * | 2006-07-06 | 2015-04-07 | LiveAction, Inc. | System and method for network topology and flow visualization |
US20090327903A1 (en) * | 2006-07-06 | 2009-12-31 | Referentia Systems, Inc. | System and Method for Network Topology and Flow Visualization |
US9225646B2 (en) | 2006-08-22 | 2015-12-29 | Centurylink Intellectual Property Llc | System and method for improving network performance using a connection admission control engine |
US9112734B2 (en) | 2006-08-22 | 2015-08-18 | Centurylink Intellectual Property Llc | System and method for generating a graphical user interface representative of network performance |
US8531954B2 (en) | 2006-08-22 | 2013-09-10 | Centurylink Intellectual Property Llc | System and method for handling reservation requests with a connection admission control engine |
US8537695B2 (en) | 2006-08-22 | 2013-09-17 | Centurylink Intellectual Property Llc | System and method for establishing a call being received by a trunk on a packet network |
US8549405B2 (en) | 2006-08-22 | 2013-10-01 | Centurylink Intellectual Property Llc | System and method for displaying a graphical representation of a network to identify nodes and node segments on the network that are not operating normally |
US8509082B2 (en) | 2006-08-22 | 2013-08-13 | Centurylink Intellectual Property Llc | System and method for load balancing network resources using a connection admission control engine |
US8576722B2 (en) | 2006-08-22 | 2013-11-05 | Centurylink Intellectual Property Llc | System and method for modifying connectivity fault management packets |
US8488495B2 (en) | 2006-08-22 | 2013-07-16 | Centurylink Intellectual Property Llc | System and method for routing communications between packet networks based on real time pricing |
US8472326B2 (en) | 2006-08-22 | 2013-06-25 | Centurylink Intellectual Property Llc | System and method for monitoring interlayer devices and optimizing network performance |
US8619820B2 (en) | 2006-08-22 | 2013-12-31 | Centurylink Intellectual Property Llc | System and method for enabling communications over a number of packet networks |
US8619600B2 (en) | 2006-08-22 | 2013-12-31 | Centurylink Intellectual Property Llc | System and method for establishing calls over a call path having best path metrics |
US8619596B2 (en) | 2006-08-22 | 2013-12-31 | Centurylink Intellectual Property Llc | System and method for using centralized network performance tables to manage network communications |
US9806972B2 (en) | 2006-08-22 | 2017-10-31 | Centurylink Intellectual Property Llc | System and method for monitoring and altering performance of a packet network |
US10469385B2 (en) | 2006-08-22 | 2019-11-05 | Centurylink Intellectual Property Llc | System and method for improving network performance using a connection admission control engine |
US8670313B2 (en) | 2006-08-22 | 2014-03-11 | Centurylink Intellectual Property Llc | System and method for adjusting the window size of a TCP packet through network elements |
US8687614B2 (en) | 2006-08-22 | 2014-04-01 | Centurylink Intellectual Property Llc | System and method for adjusting radio frequency parameters |
US8407765B2 (en) | 2006-08-22 | 2013-03-26 | Centurylink Intellectual Property Llc | System and method for restricting access to network performance information tables |
US8374090B2 (en) | 2006-08-22 | 2013-02-12 | Centurylink Intellectual Property Llc | System and method for routing data on a packet network |
US8743703B2 (en) | 2006-08-22 | 2014-06-03 | Centurylink Intellectual Property Llc | System and method for tracking application resource usage |
US8743700B2 (en) | 2006-08-22 | 2014-06-03 | Centurylink Intellectual Property Llc | System and method for provisioning resources of a packet network based on collected network performance information |
US8750158B2 (en) | 2006-08-22 | 2014-06-10 | Centurylink Intellectual Property Llc | System and method for differentiated billing |
US8811160B2 (en) | 2006-08-22 | 2014-08-19 | Centurylink Intellectual Property Llc | System and method for routing data on a packet network |
US9712445B2 (en) | 2006-08-22 | 2017-07-18 | Centurylink Intellectual Property Llc | System and method for routing data on a packet network |
US8358580B2 (en) | 2006-08-22 | 2013-01-22 | Centurylink Intellectual Property Llc | System and method for adjusting the window size of a TCP packet through network elements |
US8307065B2 (en) | 2006-08-22 | 2012-11-06 | Centurylink Intellectual Property Llc | System and method for remotely controlling network operators |
US9813320B2 (en) | 2006-08-22 | 2017-11-07 | Centurylink Intellectual Property Llc | System and method for generating a graphical user interface representative of network performance |
US8274905B2 (en) | 2006-08-22 | 2012-09-25 | Embarq Holdings Company, Llc | System and method for displaying a graph representative of network performance over a time period |
US9661514B2 (en) | 2006-08-22 | 2017-05-23 | Centurylink Intellectual Property Llc | System and method for adjusting communication parameters |
US9832090B2 (en) | 2006-08-22 | 2017-11-28 | Centurylink Intellectual Property Llc | System, method for compiling network performancing information for communications with customer premise equipment |
US9014204B2 (en) | 2006-08-22 | 2015-04-21 | Centurylink Intellectual Property Llc | System and method for managing network communications |
US9042370B2 (en) | 2006-08-22 | 2015-05-26 | Centurylink Intellectual Property Llc | System and method for establishing calls over a call path having best path metrics |
US9054986B2 (en) | 2006-08-22 | 2015-06-09 | Centurylink Intellectual Property Llc | System and method for enabling communications over a number of packet networks |
US9660917B2 (en) | 2006-08-22 | 2017-05-23 | Centurylink Intellectual Property Llc | System and method for remotely controlling network operators |
US9094261B2 (en) | 2006-08-22 | 2015-07-28 | Centurylink Intellectual Property Llc | System and method for establishing a call being received by a trunk on a packet network |
US8102770B2 (en) * | 2006-08-22 | 2012-01-24 | Embarq Holdings Company, LP | System and method for monitoring and optimizing network performance with vector performance tables and engines |
US9621361B2 (en) | 2006-08-22 | 2017-04-11 | Centurylink Intellectual Property Llc | Pin-hole firewall for communicating data packets on a packet network |
US8520603B2 (en) | 2006-08-22 | 2013-08-27 | Centurylink Intellectual Property Llc | System and method for monitoring and optimizing network performance to a wireless device |
US9602265B2 (en) | 2006-08-22 | 2017-03-21 | Centurylink Intellectual Property Llc | System and method for handling communications requests |
US9479341B2 (en) | 2006-08-22 | 2016-10-25 | Centurylink Intellectual Property Llc | System and method for initiating diagnostics on a packet network node |
US9929923B2 (en) | 2006-08-22 | 2018-03-27 | Centurylink Intellectual Property Llc | System and method for provisioning resources of a packet network based on collected network performance information |
US9225609B2 (en) | 2006-08-22 | 2015-12-29 | Centurylink Intellectual Property Llc | System and method for remotely controlling network operators |
US9992348B2 (en) | 2006-08-22 | 2018-06-05 | Century Link Intellectual Property LLC | System and method for establishing a call on a packet network |
US10075351B2 (en) | 2006-08-22 | 2018-09-11 | Centurylink Intellectual Property Llc | System and method for improving network performance |
US10298476B2 (en) | 2006-08-22 | 2019-05-21 | Centurylink Intellectual Property Llc | System and method for tracking application resource usage |
US9241271B2 (en) | 2006-08-22 | 2016-01-19 | Centurylink Intellectual Property Llc | System and method for restricting access to network performance information |
US9240906B2 (en) | 2006-08-22 | 2016-01-19 | Centurylink Intellectual Property Llc | System and method for monitoring and altering performance of a packet network |
US9241277B2 (en) | 2006-08-22 | 2016-01-19 | Centurylink Intellectual Property Llc | System and method for monitoring and optimizing network performance to a wireless device |
US9253661B2 (en) | 2006-08-22 | 2016-02-02 | Centurylink Intellectual Property Llc | System and method for modifying connectivity fault management packets |
US7991899B2 (en) | 2006-09-12 | 2011-08-02 | Morgan Stanley | Systems and methods for establishing rules for communication with a host |
WO2008033346A2 (en) * | 2006-09-12 | 2008-03-20 | Morgan Stanley | Systems and methods for establishing rules for communication with a host |
US20080077695A1 (en) * | 2006-09-12 | 2008-03-27 | Morgan Stanley | Systems and methods for establishing rules for communication with a host |
WO2008033346A3 (en) * | 2006-09-12 | 2008-11-27 | Morgan Stanley | Systems and methods for establishing rules for communication with a host |
US9521150B2 (en) | 2006-10-25 | 2016-12-13 | Centurylink Intellectual Property Llc | System and method for automatically regulating messages between networks |
US20080208890A1 (en) * | 2007-02-27 | 2008-08-28 | Christopher Patrick Milam | Storage of multiple, related time-series data streams |
US8260783B2 (en) * | 2007-02-27 | 2012-09-04 | Siemens Aktiengesellschaft | Storage of multiple, related time-series data streams |
US8185953B2 (en) * | 2007-03-08 | 2012-05-22 | Extrahop Networks, Inc. | Detecting anomalous network application behavior |
US20080222717A1 (en) * | 2007-03-08 | 2008-09-11 | Jesse Abraham Rothstein | Detecting Anomalous Network Application Behavior |
US20090328027A1 (en) * | 2007-03-30 | 2009-12-31 | Fujitsu Limited | Cluster system, process for updating software, service provision node, and computer-readable medium storing service provision program |
US8214823B2 (en) * | 2007-03-30 | 2012-07-03 | Fujitsu Limited | Cluster system, process for updating software, service provision node, and computer-readable medium storing service provision program |
US8447855B2 (en) * | 2007-08-08 | 2013-05-21 | Radware, Ltd. | Method, system and computer program product for preventing SIP attacks |
US20090043724A1 (en) * | 2007-08-08 | 2009-02-12 | Radware, Ltd. | Method, System and Computer Program Product for Preventing SIP Attacks |
US20090126023A1 (en) * | 2007-11-12 | 2009-05-14 | Yun Joobeom | Apparatus and method for forecasting security threat level of network |
US8839440B2 (en) * | 2007-11-12 | 2014-09-16 | Electronics And Telecommunications Research Institute | Apparatus and method for forecasting security threat level of network |
EP2240854B1 (en) | 2007-12-18 | 2018-02-21 | Solarwinds Worldwide, LLC | Method of resolving network address to host names in network flows for network device |
US20090154363A1 (en) * | 2007-12-18 | 2009-06-18 | Josh Stephens | Method of resolving network address to host names in network flows for network device |
US7433960B1 (en) * | 2008-01-04 | 2008-10-07 | International Business Machines Corporation | Systems, methods and computer products for profile based identity verification over the internet |
US8879391B2 (en) | 2008-04-09 | 2014-11-04 | Centurylink Intellectual Property Llc | System and method for using network derivations to determine path states |
US20110307691A1 (en) * | 2008-06-03 | 2011-12-15 | Institut Telecom-Telecom Paris Tech | Method of tracing and of resurgence of pseudonymized streams on communication networks, and method of sending informative streams able to secure the data traffic and its addressees |
US9225618B2 (en) * | 2008-06-03 | 2015-12-29 | Institut Telecom-Telecom Paris Tech | Method of tracing and of resurgence of pseudonymized streams on communication networks, and method of sending informative streams able to secure the data traffic and its addressees |
US9094444B2 (en) * | 2008-12-31 | 2015-07-28 | Telecom Italia S.P.A. | Anomaly detection for packet-based networks |
US20110267964A1 (en) * | 2008-12-31 | 2011-11-03 | Telecom Italia S.P.A. | Anomaly detection for packet-based networks |
US10554528B2 (en) | 2009-12-23 | 2020-02-04 | Juniper Networks, Inc. | Methods and apparatus for tracking data flow based on flow state values |
US9967167B2 (en) | 2009-12-23 | 2018-05-08 | Juniper Networks, Inc. | Methods and apparatus for tracking data flow based on flow state values |
US11323350B2 (en) | 2009-12-23 | 2022-05-03 | Juniper Networks, Inc. | Methods and apparatus for tracking data flow based on flow state values |
US20110154132A1 (en) * | 2009-12-23 | 2011-06-23 | Gunes Aybay | Methods and apparatus for tracking data flow based on flow state values |
US9264321B2 (en) * | 2009-12-23 | 2016-02-16 | Juniper Networks, Inc. | Methods and apparatus for tracking data flow based on flow state values |
US20110179028A1 (en) * | 2010-01-15 | 2011-07-21 | Microsoft Corporation | Aggregating data from a work queue |
US8645377B2 (en) * | 2010-01-15 | 2014-02-04 | Microsoft Corporation | Aggregating data from a work queue |
US20110292818A1 (en) * | 2010-05-27 | 2011-12-01 | Solarwinds Worldwide, Llc | Smart traffic optimization |
US8923158B2 (en) * | 2010-05-27 | 2014-12-30 | Solarwinds Worldwide, Llc | Smart traffic optimization |
US20130346417A1 (en) * | 2011-09-12 | 2013-12-26 | Hitachi, Ltd. | Stream data anomaly detection method and device |
US9305043B2 (en) * | 2011-09-12 | 2016-04-05 | Hitachi, Ltd. | Stream data anomaly detection method and device |
US9323923B2 (en) * | 2012-06-19 | 2016-04-26 | Deja Vu Security, Llc | Code repository intrusion detection |
US20130340076A1 (en) * | 2012-06-19 | 2013-12-19 | Deja Vu Security, Llc | Code repository intrusion detection |
US9836617B2 (en) | 2012-06-19 | 2017-12-05 | Deja Vu Security, Llc | Code repository intrusion detection |
US20140041032A1 (en) * | 2012-08-01 | 2014-02-06 | Opera Solutions, Llc | System and Method for Detecting Network Intrusions Using Statistical Models and a Generalized Likelihood Ratio Test |
US9866573B2 (en) * | 2013-09-27 | 2018-01-09 | EMC IP Holding Company LLC | Dynamic malicious application detection in storage systems |
US20160173508A1 (en) * | 2013-09-27 | 2016-06-16 | Emc Corporation | Dynamic malicious application detection in storage systems |
US9424318B2 (en) | 2014-04-01 | 2016-08-23 | Tableau Software, Inc. | Systems and methods for ranking data visualizations |
US9613102B2 (en) | 2014-04-01 | 2017-04-04 | Tableau Software, Inc. | Systems and methods for ranking data visualizations |
US11500882B2 (en) | 2014-04-01 | 2022-11-15 | Tableau Software, Inc. | Constructing data visualization options for a data set according to user-selected data fields |
EP3215943A4 (en) * | 2014-11-03 | 2017-10-11 | Vectra Networks, Inc. | A system for implementing threat detection using threat and risk assessment of asset-actor interactions |
US10050985B2 (en) | 2014-11-03 | 2018-08-14 | Vectra Networks, Inc. | System for implementing threat detection using threat and risk assessment of asset-actor interactions |
US9300554B1 (en) | 2015-06-25 | 2016-03-29 | Extrahop Networks, Inc. | Heuristics for determining the layout of a procedurally generated user interface |
US9621443B2 (en) | 2015-06-25 | 2017-04-11 | Extrahop Networks, Inc. | Heuristics for determining the layout of a procedurally generated user interface |
US20170149556A1 (en) * | 2015-11-20 | 2017-05-25 | Robert Bosch Gmbh | Operating method for an electronic device and electronic device |
US10204211B2 (en) | 2016-02-03 | 2019-02-12 | Extrahop Networks, Inc. | Healthcare operations with passive network monitoring |
US9729416B1 (en) | 2016-07-11 | 2017-08-08 | Extrahop Networks, Inc. | Anomaly detection using device relationship graphs |
US10382303B2 (en) | 2016-07-11 | 2019-08-13 | Extrahop Networks, Inc. | Anomaly detection using device relationship graphs |
US10812348B2 (en) * | 2016-07-15 | 2020-10-20 | A10 Networks, Inc. | Automatic capture of network data for a detected anomaly |
US20180019931A1 (en) * | 2016-07-15 | 2018-01-18 | A10 Networks, Inc. | Automatic Capture of Network Data for a Detected Anomaly |
US9660879B1 (en) | 2016-07-25 | 2017-05-23 | Extrahop Networks, Inc. | Flow deduplication across a cluster of network monitoring devices |
US10623428B2 (en) | 2016-09-12 | 2020-04-14 | Vectra Networks, Inc. | Method and system for detecting suspicious administrative activity |
US11546153B2 (en) | 2017-03-22 | 2023-01-03 | Extrahop Networks, Inc. | Managing session secrets for continuous packet capture systems |
US20200167465A1 (en) * | 2017-06-05 | 2020-05-28 | Nec Corporation | Information processing device, information processing method, and recording medium |
US10382296B2 (en) | 2017-08-29 | 2019-08-13 | Extrahop Networks, Inc. | Classifying applications or activities based on network behavior |
US11165831B2 (en) | 2017-10-25 | 2021-11-02 | Extrahop Networks, Inc. | Inline secret sharing |
US11665207B2 (en) | 2017-10-25 | 2023-05-30 | Extrahop Networks, Inc. | Inline secret sharing |
US10264003B1 (en) | 2018-02-07 | 2019-04-16 | Extrahop Networks, Inc. | Adaptive network monitoring with tuneable elastic granularity |
US10594709B2 (en) | 2018-02-07 | 2020-03-17 | Extrahop Networks, Inc. | Adaptive network monitoring with tuneable elastic granularity |
US11463299B2 (en) | 2018-02-07 | 2022-10-04 | Extrahop Networks, Inc. | Ranking alerts based on network monitoring |
US10979282B2 (en) | 2018-02-07 | 2021-04-13 | Extrahop Networks, Inc. | Ranking alerts based on network monitoring |
US10389574B1 (en) | 2018-02-07 | 2019-08-20 | Extrahop Networks, Inc. | Ranking alerts based on network monitoring |
US10728126B2 (en) | 2018-02-08 | 2020-07-28 | Extrahop Networks, Inc. | Personalization of alerts based on network monitoring |
US10038611B1 (en) | 2018-02-08 | 2018-07-31 | Extrahop Networks, Inc. | Personalization of alerts based on network monitoring |
US11431744B2 (en) | 2018-02-09 | 2022-08-30 | Extrahop Networks, Inc. | Detection of denial of service attacks |
US10277618B1 (en) | 2018-05-18 | 2019-04-30 | Extrahop Networks, Inc. | Privilege inference and monitoring based on network behavior |
US10116679B1 (en) | 2018-05-18 | 2018-10-30 | Extrahop Networks, Inc. | Privilege inference and monitoring based on network behavior |
US11012329B2 (en) | 2018-08-09 | 2021-05-18 | Extrahop Networks, Inc. | Correlating causes and effects associated with network activity |
US11496378B2 (en) | 2018-08-09 | 2022-11-08 | Extrahop Networks, Inc. | Correlating causes and effects associated with network activity |
US10411978B1 (en) | 2018-08-09 | 2019-09-10 | Extrahop Networks, Inc. | Correlating causes and effects associated with network activity |
US11323467B2 (en) | 2018-08-21 | 2022-05-03 | Extrahop Networks, Inc. | Managing incident response operations based on monitored network activity |
US10594718B1 (en) | 2018-08-21 | 2020-03-17 | Extrahop Networks, Inc. | Managing incident response operations based on monitored network activity |
US11190542B2 (en) * | 2018-10-22 | 2021-11-30 | A10 Networks, Inc. | Network session traffic behavior learning system |
EP3648408A1 (en) * | 2018-10-31 | 2020-05-06 | Atos Nederland B.V. | Monitoring system performance |
JP2020120324A (en) * | 2019-01-25 | 2020-08-06 | 三菱電機株式会社 | Abnormality monitoring device and abnormality monitoring method |
JP7149863B2 (en) | 2019-01-25 | 2022-10-07 | 三菱電機株式会社 | Abnormality monitoring device and abnormality monitoring method |
US10965702B2 (en) | 2019-05-28 | 2021-03-30 | Extrahop Networks, Inc. | Detecting injection attacks using passive network monitoring |
US11706233B2 (en) | 2019-05-28 | 2023-07-18 | Extrahop Networks, Inc. | Detecting injection attacks using passive network monitoring |
US11165814B2 (en) | 2019-07-29 | 2021-11-02 | Extrahop Networks, Inc. | Modifying triage information based on network monitoring |
US10742530B1 (en) | 2019-08-05 | 2020-08-11 | Extrahop Networks, Inc. | Correlating network traffic that crosses opaque endpoints |
US11652714B2 (en) | 2019-08-05 | 2023-05-16 | Extrahop Networks, Inc. | Correlating network traffic that crosses opaque endpoints |
US11388072B2 (en) | 2019-08-05 | 2022-07-12 | Extrahop Networks, Inc. | Correlating network traffic that crosses opaque endpoints |
US11438247B2 (en) | 2019-08-05 | 2022-09-06 | Extrahop Networks, Inc. | Correlating network traffic that crosses opaque endpoints |
WO2021038325A1 (en) * | 2019-08-26 | 2021-03-04 | Coupang Corp. | Systems and methods for dynamic aggregation of data and minimization of data loss |
US11579999B2 (en) | 2019-08-26 | 2023-02-14 | Coupang Corp. | Systems and methods for dynamic aggregation of data and minimization of data loss |
US11463465B2 (en) | 2019-09-04 | 2022-10-04 | Extrahop Networks, Inc. | Automatic determination of user roles and asset types based on network monitoring |
US10742677B1 (en) | 2019-09-04 | 2020-08-11 | Extrahop Networks, Inc. | Automatic determination of user roles and asset types based on network monitoring |
US12107888B2 (en) | 2019-12-17 | 2024-10-01 | Extrahop Networks, Inc. | Automated preemptive polymorphic deception |
US11165823B2 (en) | 2019-12-17 | 2021-11-02 | Extrahop Networks, Inc. | Automated preemptive polymorphic deception |
US11223633B2 (en) * | 2020-02-21 | 2022-01-11 | International Business Machines Corporation | Characterizing unique network flow sessions for network security |
US11522978B2 (en) * | 2020-08-31 | 2022-12-06 | Huawei Technologies Co., Ltd. | Methods, systems, and media for network model checking using entropy based BDD compression |
US20220070282A1 (en) * | 2020-08-31 | 2022-03-03 | Ashkan SOBHANI | Methods, systems, and media for network model checking using entropy based bdd compression |
US11310256B2 (en) | 2020-09-23 | 2022-04-19 | Extrahop Networks, Inc. | Monitoring encrypted network traffic |
US11558413B2 (en) | 2020-09-23 | 2023-01-17 | Extrahop Networks, Inc. | Monitoring encrypted network traffic |
US11463466B2 (en) | 2020-09-23 | 2022-10-04 | Extrahop Networks, Inc. | Monitoring encrypted network traffic |
US11349861B1 (en) | 2021-06-18 | 2022-05-31 | Extrahop Networks, Inc. | Identifying network entities based on beaconing activity |
US12225030B2 (en) | 2021-06-18 | 2025-02-11 | Extrahop Networks, Inc. | Identifying network entities based on beaconing activity |
US11296967B1 (en) | 2021-09-23 | 2022-04-05 | Extrahop Networks, Inc. | Combining passive network analysis and active probing |
US11916771B2 (en) | 2021-09-23 | 2024-02-27 | Extrahop Networks, Inc. | Combining passive network analysis and active probing |
US11843606B2 (en) | 2022-03-30 | 2023-12-12 | Extrahop Networks, Inc. | Detecting abnormal data access based on data similarity |
Also Published As
Publication number | Publication date |
---|---|
DE102005010923A1 (en) | 2005-10-27 |
DE102005010923B4 (en) | 2010-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20050234920A1 (en) | System, computer-usable medium and method for monitoring network activity | |
US11330002B2 (en) | Network flow data ingestion, storage, and analysis | |
US7804787B2 (en) | Methods and apparatus for analyzing and management of application traffic on networks | |
US10567415B2 (en) | Visualization of network threat monitoring | |
KR101010302B1 (en) | Management System and Method for IRC and HTPT Botnet Security Control | |
US7594009B2 (en) | Monitoring network activity | |
Xu et al. | Internet traffic behavior profiling for network security monitoring | |
US7197762B2 (en) | Method, computer readable medium, and node for a three-layered intrusion prevention system for detecting network exploits | |
US9584533B2 (en) | Performance enhancements for finding top traffic patterns | |
US20160191549A1 (en) | Rich metadata-based network security monitoring and analysis | |
Blenn et al. | Quantifying the spectrum of denial-of-service attacks through internet backscatter | |
US20150128267A1 (en) | Context-aware network forensics | |
US7836503B2 (en) | Node, method and computer readable medium for optimizing performance of signature rule matching in a network | |
White et al. | Cooperating security managers: Distributed intrusion detection systems | |
Canini et al. | GTVS: Boosting the collection of application traffic ground truth | |
Wang et al. | Augmented attack tree modeling of distributed denial of services and tree based attack detection method | |
Affinito et al. | Spark-based port and net scan detection | |
Hirakawa et al. | Advances in visual programming | |
Allman et al. | Principles for Developing Comprehensive Network Visibility. | |
Cooke et al. | Resource-aware multi-format network security data storage | |
Xu et al. | Real-time behaviour profiling for network monitoring | |
Bou-Harb et al. | On detecting and clustering distributed cyber scanning | |
Padovan et al. | DDoSGrid 3.0: Enabling the Real-time Processing and Analysis of Cyber Attacks Traffic | |
Chen et al. | Tracing denial of service origin: Ant colony approach | |
Liu et al. | Discovering anomaly on the basis of flow estimation of alert feature distribution |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, LP., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RHODES, LEE;REEL/FRAME:016125/0222 Effective date: 20041214 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |