CA2572528A1 - Method and system for user network behavioural based anomaly detection - Google Patents
Method and system for user network behavioural based anomaly detection Download PDFInfo
- Publication number
- CA2572528A1 CA2572528A1 CA002572528A CA2572528A CA2572528A1 CA 2572528 A1 CA2572528 A1 CA 2572528A1 CA 002572528 A CA002572528 A CA 002572528A CA 2572528 A CA2572528 A CA 2572528A CA 2572528 A1 CA2572528 A1 CA 2572528A1
- Authority
- CA
- Canada
- Prior art keywords
- network
- user
- anomaly detection
- baseline
- users
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0876—Network utilisation, e.g. volume of load or congestion level
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
A baseline can be defined using specific attributes of the network traffic.
Using the established baseline, deviation can then be measured to detect anomaly on the network. The accuracy of the baseline is the most important criterion of any effective network anomaly detection technique. In a local area network (LAN) environment, the attributes change very frequently by many change agents; for example, new entities, such as users, application, and network-enabled devices, added to and removed from the LAN environment. The invention provides an improved method of establishing a baseline for network anomaly detection based on user's behaviour profiling. A user behaviour profiling is a distinct network usage pattern pertaining to a specific individual user operating on the LAN environment
Using the established baseline, deviation can then be measured to detect anomaly on the network. The accuracy of the baseline is the most important criterion of any effective network anomaly detection technique. In a local area network (LAN) environment, the attributes change very frequently by many change agents; for example, new entities, such as users, application, and network-enabled devices, added to and removed from the LAN environment. The invention provides an improved method of establishing a baseline for network anomaly detection based on user's behaviour profiling. A user behaviour profiling is a distinct network usage pattern pertaining to a specific individual user operating on the LAN environment
Description
TITLE: Method and System for User Behavioural Based Anomaly Detection FIELD OF THE INVENTION
[0001] The invention relates generally to monitoring network usage patterns, and more specifically to a method and system of detecting anomalies in network environments by monitoring user network behaviours.
BACKGROUND OF THE INVENTION
[0001] The invention relates generally to monitoring network usage patterns, and more specifically to a method and system of detecting anomalies in network environments by monitoring user network behaviours.
BACKGROUND OF THE INVENTION
[0002] The topic on the anomaly based intrusion detection has been extensively studied in the past decade and witnessed so many security breaches made headlines. In order to improve weaknesses of signature based intrusion detection system (IDS), the anomaly detection systems come into play since in 1987 when Dorothy Denning presents a model of how an anomaly detection system could be implemented. The anomaly detection systems fall into six major categories, depending upon the methods they use to learn baseline behaviours and identify deviations from those established baselines. The six main detection types include neural networks, statistical analysis, signal processing, graph, payload and protocol-based systems.
However, anomaly detection system is frequently plagued by time-consuming false positives. One design consideration for anomaly detection is that LAN
environment is highly dynamic and any number of things can change the network traffic patterns; for example, adding new services, adding new employees or adding new resources. Another design consideration is that network user habits are deterministic and once engrained, these habits are difficult to change. A more accurate and effective network anomaly detection system should be based on user behavioural profiling and assume the network environment is always dynamic and not static. These two attributes (i.e. dynamic LAN environment and deterministic human habits) are used to design a system that applies behavioural analysis to measure anomaly and deviation in how the network resources are used by the user.
However, anomaly detection system is frequently plagued by time-consuming false positives. One design consideration for anomaly detection is that LAN
environment is highly dynamic and any number of things can change the network traffic patterns; for example, adding new services, adding new employees or adding new resources. Another design consideration is that network user habits are deterministic and once engrained, these habits are difficult to change. A more accurate and effective network anomaly detection system should be based on user behavioural profiling and assume the network environment is always dynamic and not static. These two attributes (i.e. dynamic LAN environment and deterministic human habits) are used to design a system that applies behavioural analysis to measure anomaly and deviation in how the network resources are used by the user.
[0003] SUMMARY OF THE INVENTION
[0004] This invention applies behavioural analysis methods to establish individual user's set of network attributes baselines for measuring anomaly and deviation in the user's network usage on an internal local area network (LANs) that are behind firewalls at the network edge and DMZ. The said system in this invention deals with the complexity of LAN environment and network user's behaviour. The said system models these two attributes (i.e.
dynamic LAN environment and complex network user's bebaviour) detect obvious, subtle, new, and unknown network anomalies often difficult to identify, distinguish, and differentiate in a highly dynamic LAN environment where constant changes of the network environment make it ineffective to use pre-defined network traffic patterns for detecting unknown, unforeseen, and new network attacks. The said system is deployed in an internal LANs environment and can be configured to sniff network packets either through SPAN port (ie port mirroring) or inline network tap. Both configurations duplicate a copy of a network packet to the said system. One or more network subnets/segments may be aggregated and have their network packets copy to the said system.
dynamic LAN environment and complex network user's bebaviour) detect obvious, subtle, new, and unknown network anomalies often difficult to identify, distinguish, and differentiate in a highly dynamic LAN environment where constant changes of the network environment make it ineffective to use pre-defined network traffic patterns for detecting unknown, unforeseen, and new network attacks. The said system is deployed in an internal LANs environment and can be configured to sniff network packets either through SPAN port (ie port mirroring) or inline network tap. Both configurations duplicate a copy of a network packet to the said system. One or more network subnets/segments may be aggregated and have their network packets copy to the said system.
[0005] The said system uses the network packets to identify user and host on the LANs. A user is defined as one whose identity can be associated to a network resource used by that particular user. A host is defined as one which does not have an affiliation to a particular user. It is assumed that the network users and hosts on the LAN must have been authenticated before allowed access on the LAN or use any network services. Based on this assumption, the said system can trace the presence of network users and hosts on the LAN by interrogating the authentication server or installing a desktop software agent on the user's/host's machine to emit the presence information whenever the user/host is granted access to the network. The presence information is then correlated with the network IP address that is used by the network user/host. The said system can operate with both agent-based and agentless-based approaches to capture user's and host's identities automatically. Once user or host has been identified, the said system associates the network packets pertaining to a user or host and extract network usage attributes, from the network packets, to build a set of profiles of the user or host. By correlating presence and network information, a behavioural profiling can be established that uniquely reflect an individual user's/host's distinct network usage and network traffic patterns. A profile represents the behaviour of the user or host on the LAN, such as quantity and velocity of network connections, time of connectivity, direction of network packet flow, frequency and ratio of valid network packets, volume of network packets, length and size of network packets, etc. Each user and host has a set of profiles, which are various baselines that can be used to measure network behaviour deviation against learned/observed normal acceptable network behaviour. The baselines are a representation of accepted user's behaviour on the network that is learned by the said system over a period of time. The baselines can be learned and relearned continuously by the said system.
[0006] In addition to user and host profiles, a group profile can be defined by logically grouping network users who have similar or common network usage attributes (for example, a group of users who use certain types of network resources, or use a common point of entry into the networks via VPN wireless-LAN, a group of users belonging to a department, and etc.) Hence a group profile reflects the common behaviour of majority members in the group that are considered good network usage behaviour, based on the assumption that network security breaches are caused by a minority of network users on the LAN. The application of a group profile can effectively separate a particular "bad" behaviour from a collective "acceptable"
behaviour.
behaviour.
[0007] The said system is composed of the following four components:
1. User presence detection - this is used to track where a user is connected to the network.
2. User, host and group profilings - this is used to build set of baselines for detecting network usage abnormality..
3. Behavioural deviation detection engine - this is used to identify deviations from the learned and observed historical network usage behavioural patterns.
4. Graphical User Interface (GUI) - this is used by an administrator to view, examine, and reporting on the events captured by the said system.
BRIEF DESCRIPTION OF THE DRAWINGS
1. User presence detection - this is used to track where a user is connected to the network.
2. User, host and group profilings - this is used to build set of baselines for detecting network usage abnormality..
3. Behavioural deviation detection engine - this is used to identify deviations from the learned and observed historical network usage behavioural patterns.
4. Graphical User Interface (GUI) - this is used by an administrator to view, examine, and reporting on the events captured by the said system.
BRIEF DESCRIPTION OF THE DRAWINGS
[0008] For a better understanding of the embodiments described herein and to show more clearly how they may be carried into effect, reference will now be made, by way of example only, to the accompanying drawings which show at least one exemplary embodiment, and in which:
[0009] FIG. 1 is a diagram illustrating the components of a anomaly detection system;
[0010] FIG. 2 is a block diagram illustrating the components of the analysis server;
[0011] FIG. 3 is a flowchart illustrating the steps of an auto user presence detection method [0012] FIG. 4 is an example illustrating how Identity Aggregate Module works [0013] FIG. 5 is a flowchart illustrating the steps of user and group profiling method [0014] FIG. 6 is an example illustrating visited HTTP service usage [0015] FIG. 7 is a flowchart illustrating the steps of an anomaly detection method DETAILED DESCRIPTION OF THE INVENTION
[0016] Reference is now made to FIG. 1, where the components of the anomaly detection system 10 are shown in an exemplary embodiment. The detection system 10 is comprised of one or more computing stations 12 that communicate with an analysis server 14 through a corporate communication network 16. The detection system 10 in an exemplary embodiment is used to profile user behaviour in relation to the use of one or more computing stations 12 that are part of the system 10. By profiling user behaviour and group behaviour, as explained below, usage changes associated with a user can be detected and can then be used to determine whether any anomalies exist in a network (where the system 10 is part of a network).
[0017] The computing stations 12 may be any devices that can communicate with a communication network 16, and may include, but are not limited to, desktop computers, slimline computers, server computers, handheld computers, and any other computing devices that can communicate with a corporate communication network 16 via wired or wireless communication medium. The network packets generated by the computing stations 12 are captured by network devices (not shown within the corporate communication network 16), using SPAN port configurable by software and hardware-based network tap, and duplicated and sent to the analysis server 14.
[0018] The analysis server 14, is further described with respect to FIG.
2, and is used to detect the presence of users through one or more ways.
Specifically, the analysis server may receive user presence information from an authentication server (not shown) which may be a server type computer which regulates access to the network and any associated devices that are part of the network. Alternatively, the server may receive information from software agents that are installed on the computing stations 12. The software agent can be installed manually by the user and scheduled push installation.
Once it is installed, the software agent is started at system boot and runs as a service. The software agent detects activities such as user-invoked log-on, user-invoked log-off, system-invoke time-out and screen-lock. These activities will trigger the software agent to transmit the present information to the analysis server 14. The software agents would gather user information containing user identity and IP addresses of used computing stations 12. The user identity may consist of a combination of identifiers that are gathered to uniquely associate with the user. Examples of user identifiers include, but are not limited to a user's network log-on identification and (host) name of the computing stations 12. Also, the analysis server 14 may detect the presence of users through engaging in analysis or sniffing of the network traffic, which may be referred to as auto user presence detection. By analysis or sniffing of the network traffic data, the analysis server 14 may then decode the protocols that contain user information. The analysis server 14 also allows for user and group profiling, and anomaly detection as described below.
2, and is used to detect the presence of users through one or more ways.
Specifically, the analysis server may receive user presence information from an authentication server (not shown) which may be a server type computer which regulates access to the network and any associated devices that are part of the network. Alternatively, the server may receive information from software agents that are installed on the computing stations 12. The software agent can be installed manually by the user and scheduled push installation.
Once it is installed, the software agent is started at system boot and runs as a service. The software agent detects activities such as user-invoked log-on, user-invoked log-off, system-invoke time-out and screen-lock. These activities will trigger the software agent to transmit the present information to the analysis server 14. The software agents would gather user information containing user identity and IP addresses of used computing stations 12. The user identity may consist of a combination of identifiers that are gathered to uniquely associate with the user. Examples of user identifiers include, but are not limited to a user's network log-on identification and (host) name of the computing stations 12. Also, the analysis server 14 may detect the presence of users through engaging in analysis or sniffing of the network traffic, which may be referred to as auto user presence detection. By analysis or sniffing of the network traffic data, the analysis server 14 may then decode the protocols that contain user information. The analysis server 14 also allows for user and group profiling, and anomaly detection as described below.
[0019] The corporate communication network 16 may be any network that allows for the exchange of data, and may be a combination of a wired or wireless network, and may include, but is not limited to, a local area network.
For example, an Ethernet LAN. The corporate communication network 16 resides behind the firewall of the DMZ (Demilitarized Zone in Computer Networking, and network edge). The corporate communication network 16 may be partitioned into one or more network segments that are controlled by one or more network switches. One analysis server 14 may monitor one or more network segments. One analysis server 14 may be designated as the central analysis server to manage and control multiple node analysis servers 14 that are deployed across the entire corporate communication network 16.
The central analysis server is termed the "Controller" and the node analysis server is termed the "Sensor". The "Sensor" performs the task of sniffing network packets, decoding the networks packets, and summarizing the network packets. Afterwards, the "Sensor" sends those summarized information to the "Controller" by syslog. The data transfer method via syslog between analysis servers 14, specifically between one "Controller" and multiple "Sensors" is not only to reduce workload of the "Controller", but also centralizes network information on the "Controller". The "Controller" receives syslogs from the various "Sensors", processes the syslogs, and stores the data into a database.
For example, an Ethernet LAN. The corporate communication network 16 resides behind the firewall of the DMZ (Demilitarized Zone in Computer Networking, and network edge). The corporate communication network 16 may be partitioned into one or more network segments that are controlled by one or more network switches. One analysis server 14 may monitor one or more network segments. One analysis server 14 may be designated as the central analysis server to manage and control multiple node analysis servers 14 that are deployed across the entire corporate communication network 16.
The central analysis server is termed the "Controller" and the node analysis server is termed the "Sensor". The "Sensor" performs the task of sniffing network packets, decoding the networks packets, and summarizing the network packets. Afterwards, the "Sensor" sends those summarized information to the "Controller" by syslog. The data transfer method via syslog between analysis servers 14, specifically between one "Controller" and multiple "Sensors" is not only to reduce workload of the "Controller", but also centralizes network information on the "Controller". The "Controller" receives syslogs from the various "Sensors", processes the syslogs, and stores the data into a database.
[0020] Reference is now made to FIG. 2, where the components of the analysis server 14 are shown in an exemplary embodiment. The analysis server 14 has associated with it a user detection module 20, a user and group profiling module 22, an anomaly detection module 24, and a reporting module 26. The user presence detection module 20 is used to track where a user is connected to the corporate communication network 16. User and group profiling module 22 is used to build a user and group profiling database (not shown) based on the information collected from a network access authentication system and network devices (not shown), such as network switch and network tap. The anomaly detection module 24 is used to identify network behavioural deviations from the established user and group profiling data (i.e. baseline or normal behaviour). The Reporting module 26 is used to monitor events and alerts and manage the detection engine by the administrators.
[0021] Reference is now made to FIG. 3, where the steps of an auto user presence detection method 200 are shown. The auto user presence detection method 200 is used to automatically discover the user's and host's network identity information by only sniffing and analyzing network packets -i.e. without necessarily install a desktop agent software on the user's computer. Auto user presence detection, method 200, in an exemplary embodiment begins at step 202, where the analysis server 14 sniffs the network packets using a network packet capture library, such as pcap, libpcap, etc. At step 202, by using a network packet capture library, the analysis server 14 captures packets from the network card directly. The analysis server 12 is installed with one or multiple network cards, operating at Mega or Giga bps, to capture and process the network packets. At step 204, the network packets are decoded to identify the protocol that contains the clear-text user information. Specifically, protocols including DNS, DHCP, NetBIOS, Microsoft Windows domain authentication (Kerberos), POP3, SMTP, IMAP, and propertiary desktop agent software. First, the relevant network packet is decoded to obtain the ethernet header, IP header, and TCP
header. From the various headers, the source IP address, destination IP
address, source port, and destination port information are obtained. Then, based on the protocol's port number (for example, the port number typically used by protocol POP3 is 110), the specific protocol analyzer is used to extract the user information. In step 206, the various user identities are extracted from the user information encoded in the protocol-specific network packet. The analysis server 14 implements various Extract User Information step 206 to extract user information from the various protocol-specific network packets that consist of clear-text user information. There is one Extract User Information step 206 for each protocol-specific authentication method. For example, if the analysis server 14 is decoding a SMTP network packet, then the user information as represented in the format of email address will be obtained. If only the IP address can be obtained, then the IP address is assigned as the user information of the computing station 12. If only the host name and the IP address can be obtained, then the hostname is assigned as the user information of the computing station 12. If username and the IP
address can be obtained, then the username is assigned as the user information of the computing station 12. In order to eliminate incorrect user identification, the step 208 correlates the user information with the authentication status reported in the protocol that requires authentication, such as POP3, SMTP, IMAP4 and Kerberos. Furthermore, because a person may have multiple identities (for example, one corporate email account, one VPN account, multiple personal email accounts, etc), the step 210 is used to associate multiple users' identities with the rightful person, and aggregate multiple users' identities into one single identity representing a network user.
At step 212, the user information is inserted into the analysis server's database.
header. From the various headers, the source IP address, destination IP
address, source port, and destination port information are obtained. Then, based on the protocol's port number (for example, the port number typically used by protocol POP3 is 110), the specific protocol analyzer is used to extract the user information. In step 206, the various user identities are extracted from the user information encoded in the protocol-specific network packet. The analysis server 14 implements various Extract User Information step 206 to extract user information from the various protocol-specific network packets that consist of clear-text user information. There is one Extract User Information step 206 for each protocol-specific authentication method. For example, if the analysis server 14 is decoding a SMTP network packet, then the user information as represented in the format of email address will be obtained. If only the IP address can be obtained, then the IP address is assigned as the user information of the computing station 12. If only the host name and the IP address can be obtained, then the hostname is assigned as the user information of the computing station 12. If username and the IP
address can be obtained, then the username is assigned as the user information of the computing station 12. In order to eliminate incorrect user identification, the step 208 correlates the user information with the authentication status reported in the protocol that requires authentication, such as POP3, SMTP, IMAP4 and Kerberos. Furthermore, because a person may have multiple identities (for example, one corporate email account, one VPN account, multiple personal email accounts, etc), the step 210 is used to associate multiple users' identities with the rightful person, and aggregate multiple users' identities into one single identity representing a network user.
At step 212, the user information is inserted into the analysis server's database.
[0022] Reference is now made to FIG. 4, where the components of Identity Aggregate Module 210 are shown in an exemplary embodiment.
Email address module 2102 parses email identity. However, it may obtain multiple email identities from a same IP address almost in the same time (for example, in one minute). Then, Check and select Module 2108 selects one of these email identities as the primary identity based on the following scenarios:
1). By analyzing the identity names, the one which is more similar to the host name of the used machine will be considered as the identity of this user; 2).
The identity which has already been used by another IP or host name will be not considered as the identity of this user; 3). The one which has the name such as support, admin, administrator, root, etc., will not be considered as the identity of this user. Then we have one email identity of these email identities as the identity of this user, other email addresses will be discarded. VPN
Login Module 2104 parses events from VPN log sent by VPN server.
Windows Login Module 2106 parses user Windows account name. Combine Module 2110 combines the email identities to VPN or Windows login identity, when their status is login and all of them have the same IP address.
Email address module 2102 parses email identity. However, it may obtain multiple email identities from a same IP address almost in the same time (for example, in one minute). Then, Check and select Module 2108 selects one of these email identities as the primary identity based on the following scenarios:
1). By analyzing the identity names, the one which is more similar to the host name of the used machine will be considered as the identity of this user; 2).
The identity which has already been used by another IP or host name will be not considered as the identity of this user; 3). The one which has the name such as support, admin, administrator, root, etc., will not be considered as the identity of this user. Then we have one email identity of these email identities as the identity of this user, other email addresses will be discarded. VPN
Login Module 2104 parses events from VPN log sent by VPN server.
Windows Login Module 2106 parses user Windows account name. Combine Module 2110 combines the email identities to VPN or Windows login identity, when their status is login and all of them have the same IP address.
[0023] Reference is now made to FIG. 5, where a flowchart illustrating the steps of a User and Group Profiling module are shown. Given the user's presence information, the said system could obtain the network packets through various methods to build the user and group profiling by Network Sniff Module 220. Some of the methods are (1) proprietary and standard-based network packets collection protocols such as NetFlow, sFlow, jFlow, and cFlow, (2) network TAP, and (3) SPAN port. By aggregating information from user presence information and Network Sniff Module 220, User Profiling Module 224 builds the profiling of a user's network activities including, but not limited to, such as network services used 2240, Destination Visited 2242, Bytes Consumed 2244, Packets Consumed 2246, Visited service usage 2248, and network connection frequency 2249. User Group Information Module 222 can either collect group information from an authentication server, such as LDAP, or be entered by an administrator manually. By aggregating information from user group information and User profiling, Group Profiling Module 226 builds the profiling of a group of users' network activities including, but not limited to, such as network services used 2260, Destination Visited 2262, Bytes Consumed 2264, Packets Consumed 2266, Visited service usage 2268, and network connection frequency 2269. A threshold level can be defined for each level of acceptable risk. When a deviation exceeds the pre-defined threshold, an alert is generated to record and notify the breach. Based on the alert generated, the Anomaly Detection Module 24 (shown in FIG 7) performs further analysis to (A) correlate the deviation against known exploits (through known vulnerable network services), and (B) correlate the deviation with other anomaly behaviour to detect unknown and new threats.
[0024] Network Services used 2240 is calculated by measuring the average network service used and its standard deviation over a predefined period of time, for example, two weeks. The Network Services 2240 behaviour anomaly model can be used to detect spyware using unknown network services for communication with un-trusted system.
[0025] Destination Visited 2242 is calculated by measuring the average destination visited and its standard deviation over a predefined period of time, for example, two weeks. The Destination Visited 2242 behaviour anomaly model can be used to differentiate two types of attackes - "within" and "outbound". For a "within" attack, a higher ratio of internal IP addresses of destination visited would be targeted. An example of such attack may be network probe. For an "outbound" attack, a higher ratio of external IP
addresses of destination visited would be targeted. An example of such attack may be malware using the compromised host for sending spam, transmiting data, generating unauthorized network traffic, and etc.
addresses of destination visited would be targeted. An example of such attack may be malware using the compromised host for sending spam, transmiting data, generating unauthorized network traffic, and etc.
[0026] Bytes Consumed 2244 is calculated by measuring the average bytes consumed and its standard deviation over a predefined period of time, for example, two weeks. The Bytes Consumed 2244 behaviour anomaly model can be used to detect burst of activity that exceeds or defies acceptable risk level.
[0027] Packets Consumed 2246 is calculated by measuring the average packets consumed and its standard deviation over a predefined period of time, for example, two weeks. Trend analysis, using simple moving average and exponential moving average, is also used to spot behavioural shift, even though the deviation is within acceptable risk threshold. Ratio of packet types are also calculated to measure abnormality in packet consumption. The Packet Consumed 2246 behaviour anomaly model can be used to detect subtle behavioural shift.
[0028] Suppose the network services usage of a particular user is represented in the form of a histogram. The X-axis represents the network services visited and the Y-axis represents the number of network packets generated using the network services. Using the histogram as a probability distribution, the analysis server 14 calculates the entropy (which is a measurement of the degree of dispersion of a distribution) to evaluate any shifts in user behaviour, which are shown as in Figures 6. An entropy is calculated for each network service consumed by the user, and is recorded as one of his normal network activities. All entropies are normalized to provide a faster evaluation of anomalous score and to decide whether or not there are behavioural anomalies by comparing against the established baseline.
[0029] Visited service usage 2268 is calculated by measuring the average entropies and its standard deviation over a predefined period of time, for example, two weeks.
[0030] Network connection frequency 2269 is calculated by measuring the average network connection frequency and its standard deviation over a predefined period of time, for example, two weeks.
[0031] Group Profiling Module 2260 analyzes all the common network activities among a set of users to derive group profiles. All group profiling is calculated by measuring the average and its standard deviation over a predefined period of time among the group of users.
[0032] Reference is now made to FIG. 7, which is an illustration of anomaly Detection Module 24, are shown. The user and group profiling data could become input of any machine learning algorithms, such as ANN ( Artificial Neural Network ), SVM ( Support Vector Machines ), Decision tree, and create a detection engine and increase the accuracy of anomaly intrusion detection. For example, the heuristic decision tree algorithm can be used to detect behavioural anomaly. Specifically, a user's bytes consumed profile exceeded the deviation threshold and the service used was TCP 9100, then the behavioural anomaly might be printer abuse. However, suppose the deviation threshold was triggered by visited service usage profile, then the behavioural anomaly might be a scan for network vulnerability.
[0033] Reporting module 26 is used for analysis using a variety of graphical and text reports to notify an administrator what is going on in the corporate network and how the user uses the network.
[0034] The inventions have been described by reference to exemplary embodiments, but many additions, modifications, and/or deletions can be made thereto without departing from the spirit and scope of the inventions. In other words, the particular embodiments of the inventions described herein are merely illustrative and are not the only embodiments possible. Those skilled in the art can readily identify additional embodiments and features of the inventions that are within the spirit and scope of the inventions.
Claims
1. A method of detecting network anomalies of a network, the method comprising:
analyzing network traffic to determine network usage patterns for one or more users of the network;
defining one or more baselines of network usage for the one or more users;
measuring the network usage of the one or more users; and determining if the network usage of the one or more users exceeds the baseline of the network usage for the one or more users, and generating an event alert.
analyzing network traffic to determine network usage patterns for one or more users of the network;
defining one or more baselines of network usage for the one or more users;
measuring the network usage of the one or more users; and determining if the network usage of the one or more users exceeds the baseline of the network usage for the one or more users, and generating an event alert.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002572528A CA2572528A1 (en) | 2005-12-23 | 2006-12-27 | Method and system for user network behavioural based anomaly detection |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002531410A CA2531410A1 (en) | 2005-12-23 | 2005-12-23 | Behavioural-based network anomaly detection based on user and group profiling |
CA2,531,410 | 2005-12-23 | ||
CA002572528A CA2572528A1 (en) | 2005-12-23 | 2006-12-27 | Method and system for user network behavioural based anomaly detection |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2572528A1 true CA2572528A1 (en) | 2007-06-23 |
Family
ID=38175513
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002572528A Abandoned CA2572528A1 (en) | 2005-12-23 | 2006-12-27 | Method and system for user network behavioural based anomaly detection |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA2572528A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009142751A2 (en) | 2008-05-21 | 2009-11-26 | Luis Filipe Pereira Valente | System and method for discovery of network entities |
US8584195B2 (en) | 2006-11-08 | 2013-11-12 | Mcafee, Inc | Identities correlation infrastructure for passive network monitoring |
CN114205306A (en) * | 2021-11-26 | 2022-03-18 | 阿里云计算有限公司 | Flow identification method, equipment and storage medium |
-
2006
- 2006-12-27 CA CA002572528A patent/CA2572528A1/en not_active Abandoned
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8584195B2 (en) | 2006-11-08 | 2013-11-12 | Mcafee, Inc | Identities correlation infrastructure for passive network monitoring |
WO2009142751A2 (en) | 2008-05-21 | 2009-11-26 | Luis Filipe Pereira Valente | System and method for discovery of network entities |
WO2009142751A3 (en) * | 2008-05-21 | 2010-03-18 | Mcafee, Inc. | System and method for discovery of network entities |
CN114205306A (en) * | 2021-11-26 | 2022-03-18 | 阿里云计算有限公司 | Flow identification method, equipment and storage medium |
CN114205306B (en) * | 2021-11-26 | 2024-06-14 | 阿里云计算有限公司 | Traffic identification method, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20070245420A1 (en) | Method and system for user network behavioural based anomaly detection | |
US7664963B2 (en) | Data collectors in connection-based intrusion detection | |
US7774839B2 (en) | Feedback mechanism to minimize false assertions of a network intrusion | |
US8504879B2 (en) | Connection based anomaly detection | |
US10356106B2 (en) | Detecting anomaly action within a computer network | |
US7827272B2 (en) | Connection table for intrusion detection | |
US7949737B2 (en) | Method and apparatus for grouping nodes based on connection characteristics | |
US8176544B2 (en) | Network security system having a device profiler communicatively coupled to a traffic monitor | |
US7716737B2 (en) | Connection based detection of scanning attacks | |
US7461404B2 (en) | Detection of unauthorized access in a network | |
US8458795B2 (en) | Event detection/anomaly correlation heuristics | |
US7596807B2 (en) | Method and system for reducing scope of self-propagating attack code in network | |
US20040220984A1 (en) | Connection based denial of service detection | |
Shetty et al. | Rogue access point detection by analyzing network traffic characteristics | |
US20030188189A1 (en) | Multi-level and multi-platform intrusion detection and response system | |
US20040199792A1 (en) | Role grouping | |
US20050033989A1 (en) | Detection of scanning attacks | |
US20140165207A1 (en) | Method for detecting anomaly action within a computer network | |
US20050216956A1 (en) | Method and system for authentication event security policy generation | |
US20040221190A1 (en) | Aggregator for connection based anomaly detection | |
EP3223495B1 (en) | Detecting an anomalous activity within a computer network | |
Vaarandi | Detecting anomalous network traffic in organizational private networks | |
CA2572528A1 (en) | Method and system for user network behavioural based anomaly detection | |
Matoušek et al. | Security monitoring of iot communication using flows | |
JP2006115129A (en) | Network anomaly detection system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FZDE | Dead |