发明名称 |
NON-HARMFUL INSERTION OF DATA MIMICKING COMPUTER NETWORK ATTACKS |
摘要 |
Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected. |
申请公布号 |
US2016277433(A1) |
申请公布日期 |
2016.09.22 |
申请号 |
US201615165036 |
申请日期 |
2016.05.26 |
申请人 |
Los Alamos National Security, LLC |
发明人 |
Neil Joshua;Kent Alexander;Hash, JR. Curtis |
分类号 |
H04L29/06;G06N5/02 |
主分类号 |
H04L29/06 |
代理机构 |
|
代理人 |
|
主权项 |
1. A computer-implemented method, comprising:
determining based on historical data, by a computing system, which anomalous real network connections to generate between a plurality of computing systems in a network to create the anomalous real network connections based on stochastic models, the anomalous real network connections forming a k-path between the plurality of computing systems comprising a plurality of directed edges, each directed edge comprising associated data; and generating, by the plurality of computing systems, the determined anomalous real network connections between the plurality of computing systems in the network and data mimicking an attack. |
地址 |
Los Alamos NM US |