发明名称 System and methods for adaptive model generation for detecting intrusion in computer systems
摘要 A system and methods for detecting intrusions in the operation of a computer system comprises a sensor configured to gather information regarding the operation of the computer system, to format the information in a data record having a predetermined format, and to transmit the data in the predetermined data format. A data warehouse is configured to receive the data record from the sensor in the predetermined data format and to store the data in a SQL database. A detection model generator is configured to request data records from the data warehouse in the predetermined data format, to generate an intrusion detection model based on said data records, and to transmit the intrusion detection model to the data warehouse according to the predetermined data format. A detector is configured to receive a data record in the predetermined data format from the sensor and to classify the data record in real-time as one of normal operation and an attack based on said intrusion detection model. A data analysis engine is configured to request data records from the data warehouse according to the predetermined data format and to perform a data processing function on the data records.
申请公布号 US9497203(B2) 申请公布日期 2016.11.15
申请号 US201414509208 申请日期 2014.10.08
申请人 THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF NEW YORK 发明人 Honig Andrew;Howard Andrew;Eskin Eleazar;Stolfo Salvatore J.
分类号 G06F11/00;H04L29/06;G06F21/55;G06F17/30;G06F21/56 主分类号 G06F11/00
代理机构 Baker Botts L.L.P. 代理人 Baker Botts L.L.P.
主权项 1. A system for detecting intrusions in the operation of a computer system comprising: (a) a plurality of sensors, each sensor configured to gather information regarding the operation of the computer system, to format the information in a data record, and to transmit the data record; (b) one or more databases configured to receive the data record from the sensor, to store the data record, and to store an intrusion detection model; (c) a detection model generator configured to request training data from a plurality of data records from the one or more databases, said training data comprising data from at least two sensors, to generate the intrusion detection model based on said training data from a plurality of data records, and to transmit the intrusion detection model to the one or more databases; (d) a data analysis engine configured to request a data record from the one or more databases and to perform a data processing function on the data record; (e) the detection model generator further configured to update the intrusion detection model in real-time; (f) a detection model distributor configured to receive said intrusion detection model from the one or more databases and to transmit the detection model to at least one detector; (g) one or more detectors configured to receive a data record from the sensor and to determine in real-time whether said data record corresponds to an attack based on said intrusion detection model; (h) a visualization analysis engine configured to: display the requested data record from the one or more databases in real time;enable a system administrator to identify suspicious activity, not automatically identified by the intrusion detection model, as an attack in real-time; andupdate the intrusion detection model based on the suspicious activity identified by the system administrator; and (i) a data labeling tool configured to label the requested data record from the one or more databases if the data record corresponds to an attack.
地址 New York NY US