Method and system for confident anomaly detection in computer network traffic

A network service and network anomaly technology, applied in the field of network monitoring and event management, to achieve the effect of avoiding interruption, increasing dynamic properties, and optimizing network resources

Inactive Publication Date: 2017-05-10
NETFLOW LOGIC
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0033] The present invention solves many of the problems associated with traditional baseline anomaly detection methods by eliminating reliance on historically established baselines or prior assumptions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for confident anomaly detection in computer network traffic
  • Method and system for confident anomaly detection in computer network traffic
  • Method and system for confident anomaly detection in computer network traffic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] Generally, the present invention relates to network monitoring and event management. More specifically, the present invention relates to the processing of network metadata obtained as a result of network monitoring activities and the subsequent processing of said metadata, which can result in useful information being reported to operators and / or incident management systems in a timely manner.

[0066] The invention will now be described in detail with reference to several embodiments of the invention as illustrated in the accompanying drawings. In the following description, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the invention. It will be apparent, however, to one skilled in the art that an embodiment may be practiced without some or all of these specific details. In other instances, well known process steps and / or structures have not been described in detail in order not to unnecessarily obscure the presen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to systems and methods for detecting anomalies in computer network traffic with fewer false positives and without the need for time-consuming and unreliable historical baselines. Upon detection, traffic anomalies can be processed to determine valuable network insights, including health of interfaces, devices and network services, as well as to provide timely alerts in the event of attack.

Description

technical field [0001] Generally, the present invention relates to network monitoring and event management. More specifically, the present invention relates to processing network metadata obtained through network monitoring, which can efficiently result in useful information being reported to consumers of the metadata in a timely manner. [0002] Network monitoring is a critical information technology (IT) function commonly used by enterprises and service providers that involves observing activity that is taking place on an internal network to identify performance-related issues, misbehaving hosts, suspicious user activity, and more. Network monitoring is made possible by the information generated and provided by various network devices. This information is generally referred to as network metadata, ie, a type of information that describes activity on the network in addition to and complementary to the main information traffic transmitted over the network. [0003] Syslog (s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/00
CPCH04L63/1425H04L43/0817H04L63/1458G06F11/3006G06F11/3089G06F11/3452H04L41/40
Inventor 伊戈尔·巴拉比纳亚历山大·韦莱德尼特斯基
Owner NETFLOW LOGIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products