ANOMALY-BASED INTRUSION DETECTION
Anomaly detection technology is used to detect attempts at remote tampering of communications used to control components of critical infrastructure. Intrusions in a control network are detected by monitoring operational traffic on the control network. Activity outside a normal region is identified,...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | VANRIPER, RYAN, A HELMERDINGER, WALTER, L GURAINIK, VALERIE |
description | Anomaly detection technology is used to detect attempts at remote tampering of communications used to control components of critical infrastructure. Intrusions in a control network are detected by monitoring operational traffic on the control network. Activity outside a normal region is identified, and alerts are provided as a function of identified activity outside the normal region. A stide algorithm may be used to identify such activity. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP1776823A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP1776823A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP1776823A13</originalsourceid><addsrcrecordid>eNrjZFB09PP3dfSJ1HVyDHZ1UfD0CwkKDfb091NwcQ1xdQ4BsngYWNMSc4pTeaE0N4OCm2uIs4duakF-fGpxQWJyal5qSbxrgKG5uZmFkbGjoTERSgDlcyH7</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>ANOMALY-BASED INTRUSION DETECTION</title><source>esp@cenet</source><creator>VANRIPER, RYAN, A ; HELMERDINGER, WALTER, L ; GURAINIK, VALERIE</creator><creatorcontrib>VANRIPER, RYAN, A ; HELMERDINGER, WALTER, L ; GURAINIK, VALERIE</creatorcontrib><description>Anomaly detection technology is used to detect attempts at remote tampering of communications used to control components of critical infrastructure. Intrusions in a control network are detected by monitoring operational traffic on the control network. Activity outside a normal region is identified, and alerts are provided as a function of identified activity outside the normal region. A stide algorithm may be used to identify such activity.</description><language>eng ; fre ; ger</language><subject>CONTROL OR REGULATING SYSTEMS IN GENERAL ; CONTROLLING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS ; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS ORELEMENTS ; PHYSICS ; REGULATING ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2007</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20070425&DB=EPODOC&CC=EP&NR=1776823A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,777,882,25545,76296</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20070425&DB=EPODOC&CC=EP&NR=1776823A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>VANRIPER, RYAN, A</creatorcontrib><creatorcontrib>HELMERDINGER, WALTER, L</creatorcontrib><creatorcontrib>GURAINIK, VALERIE</creatorcontrib><title>ANOMALY-BASED INTRUSION DETECTION</title><description>Anomaly detection technology is used to detect attempts at remote tampering of communications used to control components of critical infrastructure. Intrusions in a control network are detected by monitoring operational traffic on the control network. Activity outside a normal region is identified, and alerts are provided as a function of identified activity outside the normal region. A stide algorithm may be used to identify such activity.</description><subject>CONTROL OR REGULATING SYSTEMS IN GENERAL</subject><subject>CONTROLLING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>FUNCTIONAL ELEMENTS OF SUCH SYSTEMS</subject><subject>MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS ORELEMENTS</subject><subject>PHYSICS</subject><subject>REGULATING</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2007</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZFB09PP3dfSJ1HVyDHZ1UfD0CwkKDfb091NwcQ1xdQ4BsngYWNMSc4pTeaE0N4OCm2uIs4duakF-fGpxQWJyal5qSbxrgKG5uZmFkbGjoTERSgDlcyH7</recordid><startdate>20070425</startdate><enddate>20070425</enddate><creator>VANRIPER, RYAN, A</creator><creator>HELMERDINGER, WALTER, L</creator><creator>GURAINIK, VALERIE</creator><scope>EVB</scope></search><sort><creationdate>20070425</creationdate><title>ANOMALY-BASED INTRUSION DETECTION</title><author>VANRIPER, RYAN, A ; HELMERDINGER, WALTER, L ; GURAINIK, VALERIE</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP1776823A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2007</creationdate><topic>CONTROL OR REGULATING SYSTEMS IN GENERAL</topic><topic>CONTROLLING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>FUNCTIONAL ELEMENTS OF SUCH SYSTEMS</topic><topic>MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS ORELEMENTS</topic><topic>PHYSICS</topic><topic>REGULATING</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>VANRIPER, RYAN, A</creatorcontrib><creatorcontrib>HELMERDINGER, WALTER, L</creatorcontrib><creatorcontrib>GURAINIK, VALERIE</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>VANRIPER, RYAN, A</au><au>HELMERDINGER, WALTER, L</au><au>GURAINIK, VALERIE</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>ANOMALY-BASED INTRUSION DETECTION</title><date>2007-04-25</date><risdate>2007</risdate><abstract>Anomaly detection technology is used to detect attempts at remote tampering of communications used to control components of critical infrastructure. Intrusions in a control network are detected by monitoring operational traffic on the control network. Activity outside a normal region is identified, and alerts are provided as a function of identified activity outside the normal region. A stide algorithm may be used to identify such activity.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng ; fre ; ger |
recordid | cdi_epo_espacenet_EP1776823A1 |
source | esp@cenet |
subjects | CONTROL OR REGULATING SYSTEMS IN GENERAL CONTROLLING ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY FUNCTIONAL ELEMENTS OF SUCH SYSTEMS MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS ORELEMENTS PHYSICS REGULATING TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | ANOMALY-BASED INTRUSION DETECTION |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T17%3A30%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=VANRIPER,%20RYAN,%20A&rft.date=2007-04-25&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP1776823A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |