发明名称 |
SYSTEMS AND METHODS FOR CAPTURING, REPLAYING, OR ANALYZING TIME-SERIES DATA |
摘要 |
Provided is an intrusion detection system configured to detect anomalies indicative of a zero-day attack by statistically analyzing substantially all traffic on a network in real-time. The intrusion detection system, in some aspects, includes a network interface; one or more processors communicatively coupled to the network interface; system memory communicatively coupled to the processors. The system memory, in some aspects, stores instructions that when executed by the processors cause the processors to perform steps including: buffering network data from the network interface in the system memory; retrieving the network data buffered in the system memory; applying each of a plurality of statistical or machine-learning intrusion-detection models to the retrieved network data; aggregating intrusion-likelihood scores from each of the intrusion-detection models in an aggregate score, and upon the aggregate score exceeding a threshold, outputting an alert. |
申请公布号 |
US2015082433(A1) |
申请公布日期 |
2015.03.19 |
申请号 |
US201414309873 |
申请日期 |
2014.06.19 |
申请人 |
VECTRA NETWORKS, INC. |
发明人 |
Harlacher James;Abene Mark |
分类号 |
H04L29/06;G06F3/06 |
主分类号 |
H04L29/06 |
代理机构 |
|
代理人 |
|
主权项 |
1. A tangible non-transitory machine-readable medium storing instructions that when executed by a data processing apparatus cause the data processing apparatus to perform operations comprising:
writing network data from a network interface to a buffer in a system memory, wherein the buffer comprises a plurality of sub-buffers arranged in a circular sequence and writing the network data from the network interface to the buffer in the system memory comprises:
writing the network data to an active unlocked sub-buffer among the plurality of sub-buffers,locking the active sub-buffer,designating an unlocked sub-buffer as the active sub-buffer, andafter ascertaining that the network data stored in the locked sub-buffer has been written to system storage, unlocking the locked sub-buffer; and concurrent with writing the network data to the buffer in the system memory, writing the network data from the buffer in the system memory to the system storage. |
地址 |
San Jose CA US |