Unlock instant, AI-driven research and patent intelligence for your innovation.

Host-based network intrusion detection systems

A host and communication network technology, which is applied in the field of communication network security and can solve problems such as vulnerability to insertion and evasion attacks, and significant overhead.

Active Publication Date: 2013-01-23
KYNDRYL INC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

NIDS uses promiscuous mode capture and analysis which incurs significant overhead on the system and is vulnerable to insertion and evasion attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Host-based network intrusion detection systems
  • Host-based network intrusion detection systems
  • Host-based network intrusion detection systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0052] figure 2 The scanning module (SM) 200 is shown in more detail. The scanning module 200 includes a scanning engine 202 , a signature database 201 and a log database 203 .

[0053] Signature database 201 contains a list of known attack signatures. This is similar to the virus signature database used by antivirus systems. Scan engine 202 uses the signatures in signature database 201 to detect intrusions. The signature database 201 may be a plain ASCII file containing a list of signatures, although other file formats may also be used. These signatures are available from the arachNIDS database.

[0054] Table 1 gives an example of a signature, where "|" is used to contain binary data in bytecode format:

[0055] ″|eb 02 eb 02 eb 02|″

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A host-based network intrusion detection system, a method, system, and computer-readable medium containing programmed instructions for detecting intrusions in a communication network are disclosed. A data packet processed by a transport layer of a network protocol associated with a communication network is scanned using a signature from a signature library. Determine whether the scanned data packet is malicious. One or more actions are taken if any data packet is determined to be malicious. Additionally, methods, systems, and computer-readable media containing programmed instructions for preventing intrusion in a communication network are also disclosed.

Description

technical field [0001] The present invention generally relates to the field of communication network security, and in particular to computer software for detecting intrusion and security violations in communication networks. Background technique [0002] Communications network security in general and computer network security in particular are often high-level targets for unauthorized intruders, including hackers. Intruders of these networks are increasingly adept at exploiting network vulnerabilities to gain access and unauthorized privileges, making it difficult to detect and track these attacks. Also, security threats such as viruses and worms require no human supervision and can replicate and spread to other networked systems. These intrusions can damage computer systems and adversely affect the vital interests of entities associated with the affected networks. [0003] Existing Network Intrusion Detection Systems (NIDS) are not suitable for deployment on every host in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L12/26H04L12/863G06F13/00G06F15/173H04L12/56H04L12/66H04L29/06H04L29/08
CPCH04L63/0263H04L63/1408H04L67/14H04L67/10H04L69/326H04L69/32
Inventor 布拉迪普塔·K·班纳杰阿纳斯·N·玛维纳卡雅纳哈里
Owner KYNDRYL INC