Search
  • 网站搜寻
亚洲知识产权资讯网为知识产权业界提供一个一站式网上交易平台,协助业界发掘知识产权贸易商机,并与环球知识产权业界建立联系。无论你是知识产权拥有者正在出售您的知识产权,或是制造商需要购买技术以提高操作效能,又或是知识产权配套服务供应商,你将会从本网站发掘到有用的知识产权贸易资讯。
返回搜索结果

Casuality Analysis and Visualization Methods and Systems for Network Security


详细技术说明

Studies estimate that nearly 25% of computers around the world are infected with malware, resulting in billions of dollars of damages. Stealthy malware residing on compromised machines can spy on the user, exfiltrating sensitive information and documents, abusing system and network resources, and disrupting user activities. Patching and scanning are the first line of defenses against the malware. However, these methods cannot detect new generations of malware (i.e., zero-day exploit) due to the lack of known signatures. Our technology can be used to analyze and monitor large amounts of computer network traffic and detect malware activities. Our detection is based on discovering sophisticated semantic and logical relations among network traffic. We detect malware while they are in action, regardless whether the malware is zero-day exploit (brand new) or not. Our technology can be used by individuals or organizations for protecting their computers. For example, it can be used by security analysts to monitor network traffic, examine traffic anomolies, and perform forensic analysis on the causes of anomolies.It provides automatic anomaly detection in the observed network activities through probabilistic reasoning of the causal relations in traffic. Our discovery algorithm constructs triggering relation graphs that uniquely pinpoint abnormal network events that lack valid triggers (i.e., legitimate causes for the event to occur). Our algorithm is accurate, scalable, and easy-to-use.Our visualization tool takes the above discovered results, and provides an interactive graphic interface for users. The graphic user interface has a unique design that is both user-friendly and convenient for examining traffic. It allows the optimal usage of the screen for displaying related network events, which is well suited for security analysts to perform further manual inspection and forensic tasks on network events based on causal relations.


国家/地区

美国

欲了解更多信息,请点击 这里
Business of IP Asia Forum
桌面版