Claims
- 1. A network intrusion detection system, comprising:
a processor; a memory accessible by the processor; a monitor application stored in the memory and executable by the processor, the monitor application adapted to monitor network activity associated with a network node; a profile application stored in the memory and executable by the processor, the profile application adapted to automatically generate an activity profile associated with the network node using the monitored network activity; and a recognition engine stored in the memory and executable by the processor, the recognition engine adapted to compare a network event to the activity profile to determine whether the network event is authorized for the network node.
- 2. The system of claim 1, wherein the network activity comprises inbound data communications and outbound data communications.
- 3. The system of claim 2, wherein the inbound and outbound data communications comprise electronic mail communications.
- 4. The system of claim 2, wherein the inbound and outbound data communications comprise Internet communications.
- 5. The system of claim 1, wherein the profile application generates the activity profile corresponding to network activity occurring over a predetermined time period.
- 6. The system of claim 1, wherein the profile application is further adapted to automatically update the activity profile in response to a predetermined event.
- 7. The system of claim 1, wherein the profile application is further adapted to automatically update the activity profile corresponding to a predetermined time period.
- 8. The system of claim 1, wherein the recognition engine is further adapted to block the network event if the network event exceeds the activity profile.
- 9. The system of claim 1, wherein the profile application is further adapted to automatically update the activity profile if the network event is authorized.
- 10. The system of claim 1, further comprising an event library accessible by the recognition engine to determine whether the network event is authorized, the event library comprising information associated with authorized network activities not reflected in the activity profile.
- 11. A method for network intrusion detection, comprising:
monitoring network activity associated with a network node for a predetermined time period; automatically generating an activity profile corresponding to the network node using the monitored network activity; identifying a network event associated with the network node; and automatically determining whether the network event is authorized for the network node using the activity profile.
- 12. The method of claim 11, wherein monitoring the network activity comprises monitoring inbound data communications and outbound data communications associated with the network node.
- 13. The method of claim 11, wherein monitoring the network activity comprises monitoring network application usage corresponding to the network node.
- 14. The method of claim 11, further comprising accessing an event library to determine whether the network event is authorized, the event library comprising information associated with authorized network activities not reflected in the activity profile.
- 15. The method of claim 11, further comprising automatically updating the activity profile if the network event is authorized.
- 16. The method of claim 11, further comprising automatically blocking the network event if the network event is not authorized.
- 17. The method of claim 11, further comprising automatically updating the activity profile in response to a predetermined network event.
- 18. The method of claim 11, further comprising automatically updating the activity profile corresponding to a predetermined time period.
- 19. A network detection intrusion system, comprising:
a plurality of nodes coupled to a server via a network; a monitoring application accessibly by the server and adapted to monitor network activity between the plurality of nodes; a profile application accessible by the server and adapted to generate an activity profile for each of the plurality of nodes; and a recognition engine accessible by the server and adapted to compare a network event corresponding to one of the plurality of nodes to the activity profile corresponding to the one node to determine whether the network event is authorized for the one node.
- 20. The system of claim 19 wherein the profile application is further adapted to automatically update the activity profile corresponding to the one node if the network event is authorized.
- 21. The system of claim 19 wherein the monitoring application is adapted to monitor inbound data communications and outbound data communications associated with each of the nodes.
- 22. The system of claim 19 further comprising an event library accessible by the server to determine whether the network event is authorized, the event library comprising information associated with authorized network activities not reflected in the activity profile for the one node.
- 23. The system of claim 19 wherein the monitoring application is adapted to monitor network application usage for each of the nodes.
- 24. The system of claim 19 wherein the recognition engine is further adapted to generate an event alarm log for the network event if the network event is not authorized.
- 25. The system of claim 19, wherein the profile application is further adapted to automatically update the activity profile for each of the nodes corresponding to a predetermined time period.
- 26. The system of claim 19, wherein the profile application is further adapted to automatically update an activity profile corresponding to a node in response to a predetermined network event corresponding to the node.
- 27. A computer program for assisting in network intrusion detection, comprising:
a computer-readable medium; and a profile application stored on the computer-readable medium, the profile application adapted to monitor network activity and generate an activity profile using the monitored network activity, the activity profile used to determine whether a network event is authorized.
- 28. The computer program of claim 27, wherein the profile application is configured to automatically update the activity profile in response to a predetermined network event.
- 29. The computer program of claim 27, wherein the profile application is further configured to automatically update the activity profile corresponding to a predetermined time interval.
- 30. The computer program of claim 27, further comprising a recognition engine stored on the computer-readable medium and adapted to compare the network event to the activity profile.
- 31. The computer program of claim 27, wherein the profile application is adapted to monitor inbound data communications and outbound data communications corresponding to the network.
- 32. The computer program of claim 27, further comprising a recognition engine adapted to compare the network event to the activity profile and block the network event if the network event exceeds the activity profile.
- 33. The computer program of claim 27, wherein the profile application generates the activity profile corresponding to network activity occurring over a predetermined time period.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This patent application is related to co-pending U.S. patent Application, Attorney Docket No. 10014010-1, entitled “METHOD AND COMPUTER READABLE MEDIUM FOR SUPPRESSING EXECUTION OF SIGNATURE FILE DIRECTIVES DURING A NETWORK EXPLOIT”; U.S. patent Application, Attorney Docket No. 10016933-1, entitled “SYSTEM AND METHOD OF DEFINING THE SECURITY CONDITION OF A COMPUTER SYSTEM”; U.S. patent Application, Attorney Docket No. 10017028-1, entitled “SYSTEM AND METHOD OF DEFINING THE SECURITY VULNERABILITIES OF A COMPUTER SYSTEM”; U.S. patent Application, Attorney Docket No. 10017029-1, entitled “SYSTEM AND METHOD OF DEFINING UNAUTHORIZED INTRUSIONS ON A COMPUTER SYSTEM”; U.S. patent Application, Attorney Docket No. 10016861-1, entitled “NODE, METHOD AND COMPUTER READABLE MEDIUM FOR INSERTING AN INTRUSION PREVENTION SYSTEM INTO A NETWORK STACK”; U.S. patent Application, Attorney Docket No. 10016862-1, entitled “METHOD, COMPUTER-READABLE MEDIUM, AND NODE FOR DETECTING EXPLOITS BASED ON AN INBOUND SIGNATURE OF THE EXPLOIT AND AN OUTBOUND SIGNATURE IN RESPONSE THERETO”; U.S. patent Application, Attorney Docket No. 10016591-1, entitled “NETWORK, METHOD AND COMPUTER READABLE MEDIUM FOR DISTRIBUTED SECURITY UPDATES TO SELECT NODES ON A NETWORK”; U.S. patent Application, Attorney Docket No. 10014006-1, entitled “METHOD, COMPUTER READABLE MEDIUM, AND NODE FOR A THREE-LAYERED INTRUSION PREVENTION SYSTEM FOR DETECTING NETWORK EXPLOITS”; U.S. patent Application, Attorney Docket No. 10016864-1, entitled “SYSTEM AND METHOD OF AN OS-INTEGRATED INTRUSION DETECTION AND ANTI-VIRUS SYSTEM”; U.S. patent Application, Attorney Docket No. 10002019-1, entitled “METHOD, NODE AND COMPUTER READABLE MEDIUM FOR IDENTIFYING DATA IN A NETWORK EXPLOIT”; U.S. patent Application, Attorney Docket No. 10017334-1, entitled “NODE, METHOD AND COMPUTER READABLE MEDIUM FOR OPTIMIZING PERFORMANCE OF SIGNATURE RULE MATCHING IN A NETWORK”; U.S. patent Application, Attorney Docket No. 10017333-1, entitled “METHOD, NODE AND COMPUTER READABLE MEDIUM FOR PERFORMING MULTIPLE SIGNATURE MATCHING IN AN INTRUSION PREVENTION SYSTEM”; U.S. patent Application, Attorney Docket No. 10017330-1, entitled “USER INTERFACE FOR PRESENTING DATA FOR AN INTRUSION PROTECTION SYSTEM”; U.S. patent Application, Attorney Docket No. 10017270-1, entitled “NODE AND MOBILE DEVICE FOR A MOBILE TELECOMMUNICATIONS NETWORK PROVIDING INTRUSION DETECTION”; U.S. patent Application, Attorney Docket No. 10017331-1, entitled “METHOD AND COMPUTER-READABLE MEDIUM FOR INTEGRATING A DECODE ENGINE WITH AN INTRUSION DETECTION SYSTEM”; U.S. patent Application, Attorney Docket No. 10017328-1, entitled “SYSTEM AND METHOD OF GRAPHICALLY DISPLAYING DATA FOR AN INTRUSION PROTECTION SYSTEM”; and U.S. patent Application, Attorney Docket No. 10017303-1, entitled “SYSTEM AND METHOD OF GRAPHICALLY CORRELATING DATA FOR AN INTRUSION PROTECTION SYSTEM”.