亞洲知識產權資訊網為知識產權業界提供一個一站式網上交易平台,協助業界發掘知識產權貿易商機,並與環球知識產權業界建立聯繫。無論你是知識產權擁有者正在出售您的知識產權,或是製造商需要購買技術以提高操作效能,又或是知識產權配套服務供應商,你將會從本網站發掘到有用的知識產權貿易資訊。

Casuality Analysis and Visualization Methods and Systems for Network Security

詳細技術說明
Studies estimate that nearly 25% of computers around the world are infected with malware, resulting in billions of dollars of damages. Stealthy malware residing on compromised machines can spy on the user, exfiltrating sensitive information and documents, abusing system and network resources, and disrupting user activities. Patching and scanning are the first line of defenses against the malware. However, these methods cannot detect new generations of malware (i.e., zero-day exploit) due to the lack of known signatures. Our technology can be used to analyze and monitor large amounts of computer network traffic and detect malware activities. Our detection is based on discovering sophisticated semantic and logical relations among network traffic. We detect malware while they are in action, regardless whether the malware is zero-day exploit (brand new) or not. Our technology can be used by individuals or organizations for protecting their computers. For example, it can be used by security analysts to monitor network traffic, examine traffic anomolies, and perform forensic analysis on the causes of anomolies.It provides automatic anomaly detection in the observed network activities through probabilistic reasoning of the causal relations in traffic. Our discovery algorithm constructs triggering relation graphs that uniquely pinpoint abnormal network events that lack valid triggers (i.e., legitimate causes for the event to occur). Our algorithm is accurate, scalable, and easy-to-use.Our visualization tool takes the above discovered results, and provides an interactive graphic interface for users. The graphic user interface has a unique design that is both user-friendly and convenient for examining traffic. It allows the optimal usage of the screen for displaying related network events, which is well suited for security analysts to perform further manual inspection and forensic tasks on network events based on causal relations.
*Abstract
None
*Principal Investigation

Name: Danfeng (Daphne) Yao, Assistant Professor

Department: Computer Science


Name: Hao Zhang, PhD Student

Department: Computer Science

國家/地區
美國

欲了解更多信息,請點擊 這裡
移動設備