ANOMALY-BASED INTRUSION DETECTION

Anomaly detection technology is used to detect attempts at remote tampering of communications used to control components of critical infrastructure. Intrusions in a control network are detected by monitoring operational traffic on the control network. Activity outside a normal region is identified,...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: VANRIPER, RYAN, A, HELMERDINGER, WALTER, L, GURAINIK, VALERIE
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator VANRIPER, RYAN, A
HELMERDINGER, WALTER, L
GURAINIK, VALERIE
description Anomaly detection technology is used to detect attempts at remote tampering of communications used to control components of critical infrastructure. Intrusions in a control network are detected by monitoring operational traffic on the control network. Activity outside a normal region is identified, and alerts are provided as a function of identified activity outside the normal region. A stide algorithm may be used to identify such activity.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP1776823A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP1776823A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP1776823A13</originalsourceid><addsrcrecordid>eNrjZFB09PP3dfSJ1HVyDHZ1UfD0CwkKDfb091NwcQ1xdQ4BsngYWNMSc4pTeaE0N4OCm2uIs4duakF-fGpxQWJyal5qSbxrgKG5uZmFkbGjoTERSgDlcyH7</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>ANOMALY-BASED INTRUSION DETECTION</title><source>esp@cenet</source><creator>VANRIPER, RYAN, A ; HELMERDINGER, WALTER, L ; GURAINIK, VALERIE</creator><creatorcontrib>VANRIPER, RYAN, A ; HELMERDINGER, WALTER, L ; GURAINIK, VALERIE</creatorcontrib><description>Anomaly detection technology is used to detect attempts at remote tampering of communications used to control components of critical infrastructure. Intrusions in a control network are detected by monitoring operational traffic on the control network. Activity outside a normal region is identified, and alerts are provided as a function of identified activity outside the normal region. A stide algorithm may be used to identify such activity.</description><language>eng ; fre ; ger</language><subject>CONTROL OR REGULATING SYSTEMS IN GENERAL ; CONTROLLING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS ; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS ORELEMENTS ; PHYSICS ; REGULATING ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2007</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20070425&amp;DB=EPODOC&amp;CC=EP&amp;NR=1776823A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,777,882,25545,76296</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20070425&amp;DB=EPODOC&amp;CC=EP&amp;NR=1776823A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>VANRIPER, RYAN, A</creatorcontrib><creatorcontrib>HELMERDINGER, WALTER, L</creatorcontrib><creatorcontrib>GURAINIK, VALERIE</creatorcontrib><title>ANOMALY-BASED INTRUSION DETECTION</title><description>Anomaly detection technology is used to detect attempts at remote tampering of communications used to control components of critical infrastructure. Intrusions in a control network are detected by monitoring operational traffic on the control network. Activity outside a normal region is identified, and alerts are provided as a function of identified activity outside the normal region. A stide algorithm may be used to identify such activity.</description><subject>CONTROL OR REGULATING SYSTEMS IN GENERAL</subject><subject>CONTROLLING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>FUNCTIONAL ELEMENTS OF SUCH SYSTEMS</subject><subject>MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS ORELEMENTS</subject><subject>PHYSICS</subject><subject>REGULATING</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2007</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZFB09PP3dfSJ1HVyDHZ1UfD0CwkKDfb091NwcQ1xdQ4BsngYWNMSc4pTeaE0N4OCm2uIs4duakF-fGpxQWJyal5qSbxrgKG5uZmFkbGjoTERSgDlcyH7</recordid><startdate>20070425</startdate><enddate>20070425</enddate><creator>VANRIPER, RYAN, A</creator><creator>HELMERDINGER, WALTER, L</creator><creator>GURAINIK, VALERIE</creator><scope>EVB</scope></search><sort><creationdate>20070425</creationdate><title>ANOMALY-BASED INTRUSION DETECTION</title><author>VANRIPER, RYAN, A ; HELMERDINGER, WALTER, L ; GURAINIK, VALERIE</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP1776823A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2007</creationdate><topic>CONTROL OR REGULATING SYSTEMS IN GENERAL</topic><topic>CONTROLLING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>FUNCTIONAL ELEMENTS OF SUCH SYSTEMS</topic><topic>MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS ORELEMENTS</topic><topic>PHYSICS</topic><topic>REGULATING</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>VANRIPER, RYAN, A</creatorcontrib><creatorcontrib>HELMERDINGER, WALTER, L</creatorcontrib><creatorcontrib>GURAINIK, VALERIE</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>VANRIPER, RYAN, A</au><au>HELMERDINGER, WALTER, L</au><au>GURAINIK, VALERIE</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>ANOMALY-BASED INTRUSION DETECTION</title><date>2007-04-25</date><risdate>2007</risdate><abstract>Anomaly detection technology is used to detect attempts at remote tampering of communications used to control components of critical infrastructure. Intrusions in a control network are detected by monitoring operational traffic on the control network. Activity outside a normal region is identified, and alerts are provided as a function of identified activity outside the normal region. A stide algorithm may be used to identify such activity.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre ; ger
recordid cdi_epo_espacenet_EP1776823A1
source esp@cenet
subjects CONTROL OR REGULATING SYSTEMS IN GENERAL
CONTROLLING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
FUNCTIONAL ELEMENTS OF SUCH SYSTEMS
MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS ORELEMENTS
PHYSICS
REGULATING
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title ANOMALY-BASED INTRUSION DETECTION
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T17%3A30%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=VANRIPER,%20RYAN,%20A&rft.date=2007-04-25&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP1776823A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true