Claims
- 1. A device, comprising:
a processor; a memory storing a connection table that maps each node of a network to a record object that stores information about traffic to or from the node.
- 2. The device of claim 1 wherein the memory further stores an aggregator process to aggregate occurrences of network anomalies into events.
- 3. The device of claim 1 wherein the aggregator further comprises:
a process that communicates occurrences of network events to an operator.
- 4. The device of claim 1 wherein the aggregator device further comprises:
a process to aggregate anomalies into the network events according to connection patterns.
- 5. The device of claim 1 wherein the connection table includes a plurality of records that are indexed by source address.
- 6. The device of claim 1 wherein the connection table includes a plurality of records that are indexed by destination address.
- 7. The device of claim 1 wherein the connection table includes a plurality of records that are indexed by time.
- 8. The device of claim 1 wherein the connection table includes a plurality of records that are indexed by source address, destination address and time.
- 9. The device of claim 1 wherein the connection table includes a plurality of connection sub-tables to track data at different time scales.
- 10. The device of claim 1 wherein the connection sub-tables include a time-slice connection table that operates on a small unit of time and at least one other sub-table that operates on a larger unit of time than the time slice sub-table with each sub-table holding the sum of records received from all collectors during respective units of time.
- 11. The device of claim 4 wherein the process to determine events tracks a moving average to allow the device to adapt to slowly changing network conditions.
- 12. The device of claim 4 wherein the process to determine events tracks a variance of a parameter to allow the device to account for burstiness in network traffic.
- 13. The device of claim 4 wherein the amount of memory spaced used by the aggregator is bounded in order to avoid denial of service attacks on the aggregator.
- 14. The device of claim 13 wherein if the Aggregator exceeds a memory use threshold “m_{hi}”, the aggregator de-allocates records until its memory use falls below the threshold “m_{hi}”.
- 15. The device of claim 14 wherein the aggregator de-allocates records by random eviction or records.
- 16. The device of claim 14 wherein the aggregator de-allocates records by picking records of low-connectivity hosts to evict over high connectivity hosts.
- 17. The device of claim 14 wherein the aggregator de-allocates records by picking records of high-connectivity hosts to evict before records of low connectivity hosts.
- 18. The device of claim 14 wherein the aggregator de-allocates records by evicting records of most recently added hosts first.
- 19. A computer program product residing on a computer readable medium for use in detecting network intrusions comprises instructions for causing a processor to:
store a connection table that maps each node of a network to a record object that stores information about traffic to or from the node.
- 20. The program of claim 19 wherein the instructions further comprise instructions to:
store an aggregator process to aggregate occurrences of network anomalies into events.
- 21. The program of claim 19 wherein the instructions further comprise instructions to:
communicate occurrences of network events to an operator.
- 22. The program of claim 19 wherein the instructions further comprise instructions to:
aggregate anomalies into the network events according to connection patterns.
- 23. The program of claim 19 wherein the instructions further comprise instructions to:
determine events by tracking a moving average to adapt to slowly changing network conditions.
- 24. The program of claim 19 wherein the instructions further comprise instructions to:
track a variance of a parameter to allow the device to account for burstiness in network traffic.
Parent Case Info
[0001] This application claims the benefit of US Provisional Application Serial No. 60/423,557, filed Nov. 04, 2002 entitled “ALGORITHMS FOR NETWORK ANOMALY DETECTION IN THE MAZU NETWORK PROFILER”; U.S. Provisional Application Serial No. 60/427,294, filed Nov. 18, 2002 entitled “ANOMALY DETECTION AND ROLE CLASSIFICATION IN A DISTRIBUTED COMPUTING NETWORK” and U.S. Provisional Application Serial No. 60/429,050, filed Nov. 25, 2002 entitled “ROLE CLASSIFICATION OF HOSTS WITHIN ENTERPRISE NETWORKS BASED ON CONNECTION PATTERNS.”
[0002] AGGREGATOR FOR CONNECTION BASED ANOMALY DETECTION
Provisional Applications (3)
|
Number |
Date |
Country |
|
60423557 |
Nov 2002 |
US |
|
60427294 |
Nov 2002 |
US |
|
60429050 |
Nov 2002 |
US |