US20150052609A1 - Heterogeneous sensors for network defense - Google Patents
Heterogeneous sensors for network defense Download PDFInfo
- Publication number
- US20150052609A1 US20150052609A1 US14/531,858 US201414531858A US2015052609A1 US 20150052609 A1 US20150052609 A1 US 20150052609A1 US 201414531858 A US201414531858 A US 201414531858A US 2015052609 A1 US2015052609 A1 US 2015052609A1
- Authority
- US
- United States
- Prior art keywords
- network
- signature
- sensor
- attacks
- machine
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000007123 defense Effects 0.000 title description 12
- 238000010801 machine learning Methods 0.000 claims abstract description 47
- 238000000034 method Methods 0.000 abstract description 35
- 238000012360 testing method Methods 0.000 abstract description 9
- 238000012549 training Methods 0.000 description 26
- 238000001514 detection method Methods 0.000 description 23
- 238000004422 calculation algorithm Methods 0.000 description 17
- 230000008569 process Effects 0.000 description 12
- 238000004891 communication Methods 0.000 description 4
- 238000007689 inspection Methods 0.000 description 4
- 238000011012 sanitization Methods 0.000 description 4
- 238000000540 analysis of variance Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000002474 experimental method Methods 0.000 description 3
- 238000013467 fragmentation Methods 0.000 description 3
- 238000006062 fragmentation reaction Methods 0.000 description 3
- 230000035515 penetration Effects 0.000 description 3
- 238000001228 spectrum Methods 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000013400 design of experiment Methods 0.000 description 2
- 238000013401 experimental design Methods 0.000 description 2
- 238000012482 interaction analysis Methods 0.000 description 2
- 238000002372 labelling Methods 0.000 description 2
- 238000013178 mathematical model Methods 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 238000012552 review Methods 0.000 description 2
- 230000002547 anomalous effect Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000003749 cleanliness Effects 0.000 description 1
- ZPUCINDJVBIVPJ-LJISPDSOSA-N cocaine Chemical compound O([C@H]1C[C@@H]2CC[C@@H](N2C)[C@H]1C(=O)OC)C(=O)C1=CC=CC=C1 ZPUCINDJVBIVPJ-LJISPDSOSA-N 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000001186 cumulative effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000012067 mathematical method Methods 0.000 description 1
- 230000000116 mitigating effect Effects 0.000 description 1
- 238000000491 multivariate analysis Methods 0.000 description 1
- 238000003909 pattern recognition Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G06N99/005—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
Definitions
- the field of the invention relates to the simultaneous use of two sensors using different underlying inspection methods to detect the same threat to a computer network. Because the sensors use different approaches, they are heterogeneous. More specifically, the invention relates to a system for combining signature-based sensors and machine learning-based sensors to provide a full spectrum of network defense, while eliminating the blind spot and false positive rate problems each separate sensor experiences.
- a signature is a definitive sequence of network communication data-streams (bits) that are characteristic of a known attack pattern.
- bits network communication data-streams
- a signature-based sensor library database of signatures
- An updated sensor will generally detect any attacks present in the network traffic for which it contains a valid signature. Additionally, false positive rates for signature-based sensors are usually low, meaning that they do not normally alert on normal (non-attack) network traffic.
- signature-based sensors can only detect known attacks for which they have an accurate signature in their libraries. All signature-based sensors exhibit blind spots which are defined by either categories of attacks for which no signatures have been established, or “zero day exploits” (new attacks) which have never been seen before. Additionally, all signature-based sensors tend to have similar blind spots because they typically subscribe to the same reference libraries of known malicious behavior. Two of the most widely used subscription libraries can be found at Snort.org and Symantec.com.
- evasion techniques allow a hacker to sufficiently modify the pattern of an attack so that the signature will fail to produce a match (during intrusion detection).
- the most common evasion techniques are obfuscation, fragmentation, and encryption.
- Obfuscation is hiding intended meaning in communication, making communication confusing, willfully ambiguous, and harder to interpret.
- obfuscation refers to methods used to obscure an attack payload from inspection by network protection systems. For instance, an attack payload can be hidden in web protocol traffic. Fragmentation is breaking a data stream into segments and sending those segments out of order through the computer network.
- the segments are reassembled in correct order at the receiving side.
- the shuffling of the order of data stream segments can change the known attack signature due to the reordering of communication bits.
- Encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. Both the authorized sender and receiver must have the same encryption key because the process of encoding and decoding is relatively the same.
- the attack payload can often be encoded/encrypted such that the signature is no longer readable by detection systems. While each evasion technique changes the attack pattern differently, it is important to note that the goal is the same: change the attack pattern enough to no longer match published attack signatures and hence to avoid intrusion detection.
- intrusion detection system which does not rely on signature libraries, is starting to be deployed on computer networks.
- These non-signature-based sensors use mathematical algorithms to perform either anomaly detection or categorical classification (machine learning).
- anomaly detection the sensor reviews network traffic, uses algorithms (mathematical methods) to form a mathematical model to represent the network traffic, and then alerts on any traffic that does not fit the model (anomalous).
- Anomaly detectors also use thresholds and rule sets to help bound the normal network traffic space, that is, to determine whether network traffic is normal or not.
- Machine-learning sensors are similar in that they use an algorithm to form a model, but they separate network traffic into multiple categories for each variant of network traffic (as opposed to an anomaly detector which uses only one category: “normal”).
- the model is automatically created by using the algorithm to process previously-tagged training samples containing network traffic from multiple categories. After such training, the machine learning sensor will review and analyze network traffic by placing each portion of network traffic into its “best fitting” category.
- models are preferably created automatically using well known techniques, such as those disclosed in Bremner D, Demaine E, Erickson J, Iacono J, Langerman S, Morin P, Toussaint G (2005),
- algorithm-based (anomaly detection and machine-learning) methods of sensing do not depend on referencing man-made signatures, but instead depend on the ability of the algorithms to learn about and recognize both normal and malicious traffic.
- the anomaly detection and machine-learning sensors are exposed to combinations of known normal and malicious traffic samples, so that their mathematical algorithms can develop a mathematical model of the network traffic. This process is known as sensor training.
- algorithm based (anomaly detection and machine-learning) sensors is that they can alert on either known attacks (even when evasion techniques are employed by the attacker) or on new attacks/exploits (zero-days) that have never been used before.
- Computer network defense of large enterprise networks is a persistent problem that is growing more difficult and important to address as the prosperity of modern society becomes increasingly more dependent on networked computer systems.
- Network defense analysts know they are not catching all attacks and recognize that the problem is getting worse. Once a new attack is identified, defense personnel have to wait until subscription publishers update signature libraries before any protection is available. Typically, new attacks are not caught immediately and there is often a significant delay of from days to weeks before signatures are available for distribution to defense personnel. This retrospective view is inadequate for effective network intrusion defense.
- a system is needed to provide the ability to detect the full spectrum of network attacks: known, pattern obscured, and “zero-day” attacks, with an acceptable false-positive rate.
- Algorithm-based sensors combined with signature-based sensing, can provide this full spectrum of network defense while eliminating the blind spot and false positive rate problems each separate sensor experiences.
- this heterogeneous sensor combination as operationally using two sensors of different underlying inspection methods to detect the same threat.
- machine learning shall hereinafter mean and include both anomaly detection and machine learning sensors.
- the invention relates to a process for using signature-based and machine learning-based sensors in tandem to significantly improve computer network defense.
- Our process invention combines the strengths of each type of sensor while mitigating their individual weaknesses.
- the basic combination steps of the system are as follows:
- Step 1 Determine and verify the blind spot of the signature-based sensor.
- Blind spot testing to find which evasion techniques work on that a particular signature-based sensor is the first step.
- the objective is to build a broad list of known exploits that go undetected by the sensor by altering attack patterns just enough to allow previously detectable attacks to avoid detection via their published signatures. “Zero-day” attacks can also be added to the list (if available). This step helps to identify what types of attacks are currently being missed by the sensor and provides training data for preparing the machine learning sensor to cover the signature-based sensor's blind spot.
- Step 2 Build a machine-learning sensor training dataset.
- a training dataset is compiled that includes both attack (malicious) samples and sanitized, attack-free (normal) network traffic samples. The majority of the malicious samples come from completing step 1 properly. The normal traffic samples should be taken from the network access point where the sensors will be eventually deployed.
- Step 3. Optimize the machine-learning sensor.
- the machine-learning sensor is trained and optimized though various statistical techniques like design of experiments, multi-factor interaction analysis, and analysis of variance, which are disclosed in Hinkelmann, Klaus and Kempthorne, Oscar (2008), Design and Analysis of Experiments. 1 and II (Second ed.), Wiley. ISBN 978-0-470-38551-7; Hinkelmann, Klaus and Kempthorne, Oscar (2008), Design and Analysis of Experiments, Volume I: Introduction to Experimental Design (Second ed.), Wiley. ISBN 978-0-471-72756-9; Hinkelmann, Klaus and Kempthorne, Oscar (2005), Design and Analysis of Experiments, Volume 2: Advanced Experimental Design (First ed.), Wiley.
- Each machine-learning sensor algorithm is preferably individually optimized to increase its accuracy.
- Step 4. Deploy the sensor combination on the live network.
- the sensors can be used for network defense.
- Step 1 Determine and verify the blind spot of a signature-based sensor.
- the first step in our training process involves using a signature-based sensor with an up-to-date signature library. Scripted attacks are presented to the signature-based sensor to determine the blind spot of the signature sensor.
- Our attack script is a battery of automated network attacks that covers enough breadth and depth of exploits that represents a comprehensive attack profile.
- Penetration-testing tools are used to build an attack script consisting of a series of attacks representative of the known threats on the network to be defended.
- the script contains multiple types of attacks and their variants (using evasion techniques).
- This approach is similar to other automated penetration testing and vulnerability assessment tools, but was specifically designed by us for network sensor evaluation.
- Penetration testing and vulnerability assessment tools evaluate computer network nodes/targets and not the non-networked intrusion detection system sensors themselves. However, this new use of penetration testing tools is important for evaluating and discovering a sensor's blind spot.
- Step 2 Build a machine-learning sensor training dataset.
- Machine-learning sensors require three different types of training data to build their models: 1) tagged normal, 2) tagged malicious, and 3) untagged network traffic samples. Traffic samples are created from packet-capture applications that make a copy of network traffic data-stream (bits) and store them in memory. The term “tagged” means that the training sample is presented to the machine-learning sensor with its category already determined and labeled.
- the first type is tagged normal traffic from the network where the sensor combination will be employed.
- a variety of procedures to verify and sanitize the live network data is necessary to make the tagged normal traffic. These procedures include both manual and automated traffic inspection to verify the lack of network attacks in the normal traffic samples.
- the second type is tagged malicious traffic (attack samples). This is traffic either culled from archives of attacks found on a live network, or attacks generated in a lab with the same hacker tools that would be used on a live network.
- the third type of training data is untagged data.
- This data consists of straight network packet-capture, but without the sanitizing and labeling techniques administered above. This data contains both attacks and normal traffic (but not labeled) from the targeted network.
- Untagged data training is a machine learning technique for increasing the number of training samples without having to spend the arduous time and expense of labeling every sample.
- the machine-learning algorithms also employ other learning techniques that need the “untagged” data samples.
- Step 3. Optimize the machine-learning sensor.
- the machine-learning sensor is trained to model the live network and to detect malicious attacks. Training, however, is just the term used by machine learning scientists for processing the training samples with the sensor's algorithm. After a baseline model is established (by the algorithm), iterative testing is done to increase the effectiveness (reduction of false positives) of the machine-learning sensor. The results of these iterative tests are analyzed using statistical tools to determine the best usage of the training data. Because of the iterative nature of this training, the sensor can be considered to be a heuristic sensor.
- Step 4. Deploy the sensor combination on the live network.
- a heterogeneous sensor pair is placed where the network training samples were taken. Each sensor is somewhat complementary to the other, so that (in addition to both detecting known attacks) they should each detect different types of attacks, thus creating cumulative synergy greater than their individual parts.
- the signature-based sensor will catch known, subscription library attacks (including any that are outside the machine learning sensors' training), and the machine learning sensors will catch known attacks that are within its training, as well as any variant (signature blind spot) attacks and “zero-days” that evade the signature-based sensor. Together, the heterogeneous sensor pair provides a comprehensive computer network intrusion detection system that has been lacking on contemporary networks.
- the invention is a process for defending a network of computers against attack, comprising inspecting network traffic for malicious data using a signature-based sensor and simultaneously inspecting the network traffic for malicious data using a machine-learning based sensor.
- the machine-learning based sensor has been trained to detect attacks on blind spots of the signature-based sensor by modifying patterns of attack on the signature-based sensor to compile blind spot malicious samples that avoid intrusion detection by the signature-based sensor.
- the blind spot malicious samples are then tagged as tagged malicious samples. Samples of a normal portion of normal network traffic patterns are then acquired and sanitized, to obtain normal samples, which are then tagged as tagged normal samples.
- the portions of the normal network traffic that are not in the normal portion are tagged as untagged samples.
- a machine-learning training dataset comprising the tagged malicious samples, the tagged normal samples, and the untagged samples, is then presented to the machine-learning based sensor to create models of normal network traffic and to detect samples that fail to conform to the models of normal network traffic as malicious data.
- the accuracy of the machine-learning sensor is then iteratively tested using the models of normal network traffic to reduce false positives and to achieve iteratively tested models of normal network traffic.
- the machine-learning sensor then recognizes malicious data as data that fails to conform to the iteratively tested models of normal traffic, with a reduced rate of false positives, and the signature-based sensor recognizes as malicious data any network traffic that matches signatures provided to said signature-based sensor.
- the invention optionally further comprises acquiring archived malicious samples from archives of attacks on live networks, which are then tagging as malicious samples included in the machine-learning dataset.
- the modifying step can be performed by applying evasion techniques to attacks that are detected by the signature-based sensor until the signature-based sensor fails to detect the attacks.
- the evasion techniques are selected from the group consisting of obfuscation, fragmentation and encryption.
- the iteratively testing step is performed by using statistical techniques selected from the group consisting of design of experiments, multi-factor interaction analysis, and analysis of variance.
- the acquiring step is performed at a location in the network where the sensors will be deployed.
- a system comprises a network of computers, with a signature-based sensor and a machine-learning based sensor deployed in the network to simultaneously inspect network traffic for malicious data.
- the machine-learning based sensor recognizes as malicious data any network traffic that fails to conform to models of normal network traffic that have been iteratively tested to reduce false positives.
- the signature-based sensor recognizes as malicious data any network traffic that matches signatures provided to said signature-based sensor.
- the machine-learning sensor has been trained by a training process, comprising modifying patterns of attack on the signature-based sensor to compile blind spot malicious samples that avoid intrusion detection by the signature-based sensor.
- the training process includes tagging the blind spot malicious samples as tagged malicious samples, acquiring samples of normal network traffic patterns, sanitizing a normal portion of the samples of normal network traffic patterns to obtain normal samples, tagging the normal samples as tagged normal samples, and tagging a portion of the samples of normal network traffic that are not the normal portion as untagged samples.
- a machine-learning training dataset including the tagged malicious samples, the tagged normal samples, and the untagged samples, is then presented to the machine-learning based sensor to create models of normal network traffic and to detect samples that fail to conform to the models of normal network traffic as malicious data.
- the accuracy of the machine-learning based sensor is then iteratively tested using the models of normal network traffic to reduce false positives of the machine-learning based sensor and to achieve iteratively tested models of normal network traffic.
- the machine-learning sensor has been trained by a process further comprising acquiring archived malicious samples from archives of attacks on live networks, tagging the archived malicious samples as malicious and including the archived malicious samples in the machine-learning dataset.
- This invention is applicable wherever it is desired to protect computer networks against attacks.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Medical Informatics (AREA)
- Mathematical Physics (AREA)
- Virology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Heterogeneous sensors simultaneously inspect network traffic for attacks. A signature-based sensor detects known attacks but has a blind spot, and a machine-learning based sensor that has been trained to detect attacks in the blind spot detects attacks that fail to conform to normal network traffic. False positive rates of the machine-learning based sensor are reduced by iterative testing using statistical techniques.
Description
- The field of the invention relates to the simultaneous use of two sensors using different underlying inspection methods to detect the same threat to a computer network. Because the sensors use different approaches, they are heterogeneous. More specifically, the invention relates to a system for combining signature-based sensors and machine learning-based sensors to provide a full spectrum of network defense, while eliminating the blind spot and false positive rate problems each separate sensor experiences.
- Computer network intrusion detection systems (sensors) rely mainly on signature-based sensing for malicious traffic detection. At a basic level, a signature is a definitive sequence of network communication data-streams (bits) that are characteristic of a known attack pattern. Generally, every known exploit or internet attack will have many signatures written for signature-based sensors' use in intrusion detection. A signature-based sensor library (database of signatures) must be updated constantly to keep up with the evolving variety and nature of internet attacks. An updated sensor will generally detect any attacks present in the network traffic for which it contains a valid signature. Additionally, false positive rates for signature-based sensors are usually low, meaning that they do not normally alert on normal (non-attack) network traffic.
- One limitation of this method of attack detection is that it is based on a retrospective view; signature-based sensors can only detect known attacks for which they have an accurate signature in their libraries. All signature-based sensors exhibit blind spots which are defined by either categories of attacks for which no signatures have been established, or “zero day exploits” (new attacks) which have never been seen before. Additionally, all signature-based sensors tend to have similar blind spots because they typically subscribe to the same reference libraries of known malicious behavior. Two of the most widely used subscription libraries can be found at Snort.org and Symantec.com.
- The blind spot problem for signature-based sensors is compounded by the fact that use of evasion techniques by hackers has proven very effective at enabling known exploits to escape detection. Evasion techniques allow a hacker to sufficiently modify the pattern of an attack so that the signature will fail to produce a match (during intrusion detection). The most common evasion techniques are obfuscation, fragmentation, and encryption. Obfuscation is hiding intended meaning in communication, making communication confusing, willfully ambiguous, and harder to interpret. In network security, obfuscation refers to methods used to obscure an attack payload from inspection by network protection systems. For instance, an attack payload can be hidden in web protocol traffic. Fragmentation is breaking a data stream into segments and sending those segments out of order through the computer network. The segments are reassembled in correct order at the receiving side. The shuffling of the order of data stream segments can change the known attack signature due to the reordering of communication bits. Encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. Both the authorized sender and receiver must have the same encryption key because the process of encoding and decoding is relatively the same. In network attacks, the attack payload can often be encoded/encrypted such that the signature is no longer readable by detection systems. While each evasion technique changes the attack pattern differently, it is important to note that the goal is the same: change the attack pattern enough to no longer match published attack signatures and hence to avoid intrusion detection.
- Another type of intrusion detection system (sensor), which does not rely on signature libraries, is starting to be deployed on computer networks. These non-signature-based sensors use mathematical algorithms to perform either anomaly detection or categorical classification (machine learning). In anomaly detection, the sensor reviews network traffic, uses algorithms (mathematical methods) to form a mathematical model to represent the network traffic, and then alerts on any traffic that does not fit the model (anomalous). Anomaly detectors also use thresholds and rule sets to help bound the normal network traffic space, that is, to determine whether network traffic is normal or not. Machine-learning sensors are similar in that they use an algorithm to form a model, but they separate network traffic into multiple categories for each variant of network traffic (as opposed to an anomaly detector which uses only one category: “normal”). The model is automatically created by using the algorithm to process previously-tagged training samples containing network traffic from multiple categories. After such training, the machine learning sensor will review and analyze network traffic by placing each portion of network traffic into its “best fitting” category.
- In both anomaly detection and categorical classification (machine learning), models are preferably created automatically using well known techniques, such as those disclosed in Bremner D, Demaine E, Erickson J, Iacono J, Langerman S, Morin P, Toussaint G (2005),
- “Output-sensitive algorithms for computing nearest-neighbor decision boundaries”, Discrete and Computational Geometry 33 (4): 593-604. doi:10.1007/s00454-004-1152-0, and D. Coomans; D. L. Massart (1982). “Alternative k-nearest neighbour rules in supervised pattern recognition : Part 1. k-Nearest neighbour classification by using alternative voting rules”. Analytica Chimica Acta 136: 15-27. doi:10.1016/S0003-2670(01)95359-0, both of which are hereby incorporated herein by reference.
- These algorithm-based (anomaly detection and machine-learning) methods of sensing do not depend on referencing man-made signatures, but instead depend on the ability of the algorithms to learn about and recognize both normal and malicious traffic. During the learning process, the anomaly detection and machine-learning sensors are exposed to combinations of known normal and malicious traffic samples, so that their mathematical algorithms can develop a mathematical model of the network traffic. This process is known as sensor training. The benefit of using algorithm based (anomaly detection and machine-learning) sensors is that they can alert on either known attacks (even when evasion techniques are employed by the attacker) or on new attacks/exploits (zero-days) that have never been used before.
- However promising the use of algorithm-based sensors may be, in reality most algorithm-based sensors experience high false-positives rates. The more complex the computer network, the more difficult it is to train the algorithms to achieve acceptable performance levels to support effective computer network defense. An example of a high false-positive problem would be when a sensor alert report shows 10 attacks occurring, when there are only 5 actual attacks. This would be a false-positive rate of 50%. In a network defensive operation, where analysts must investigate every alert, time and effort is wasted investigating false alerts (false-positives). Thus a sensor with a high false-positive rate is not useful to network defense operations.
- Computer network defense of large enterprise networks is a persistent problem that is growing more difficult and important to address as the prosperity of modern society becomes increasingly more dependent on networked computer systems. Network defense analysts know they are not catching all attacks and recognize that the problem is getting worse. Once a new attack is identified, defense personnel have to wait until subscription publishers update signature libraries before any protection is available. Typically, new attacks are not caught immediately and there is often a significant delay of from days to weeks before signatures are available for distribution to defense personnel. This retrospective view is inadequate for effective network intrusion defense.
- A system is needed to provide the ability to detect the full spectrum of network attacks: known, pattern obscured, and “zero-day” attacks, with an acceptable false-positive rate.
- Algorithm-based sensors, combined with signature-based sensing, can provide this full spectrum of network defense while eliminating the blind spot and false positive rate problems each separate sensor experiences. We define this heterogeneous sensor combination as operationally using two sensors of different underlying inspection methods to detect the same threat. Also, for simplicity, the term “machine learning” shall hereinafter mean and include both anomaly detection and machine learning sensors.
- The invention relates to a process for using signature-based and machine learning-based sensors in tandem to significantly improve computer network defense. Our process invention combines the strengths of each type of sensor while mitigating their individual weaknesses. The basic combination steps of the system are as follows:
- Step 1. Determine and verify the blind spot of the signature-based sensor.
- Blind spot testing to find which evasion techniques work on that a particular signature-based sensor is the first step. The objective is to build a broad list of known exploits that go undetected by the sensor by altering attack patterns just enough to allow previously detectable attacks to avoid detection via their published signatures. “Zero-day” attacks can also be added to the list (if available). This step helps to identify what types of attacks are currently being missed by the sensor and provides training data for preparing the machine learning sensor to cover the signature-based sensor's blind spot.
- Step 2. Build a machine-learning sensor training dataset.
- A training dataset is compiled that includes both attack (malicious) samples and sanitized, attack-free (normal) network traffic samples. The majority of the malicious samples come from completing step 1 properly. The normal traffic samples should be taken from the network access point where the sensors will be eventually deployed.
- Step 3. Optimize the machine-learning sensor.
- After the training dataset is compiled with both malicious and normal network samples, the machine-learning sensor is trained and optimized though various statistical techniques like design of experiments, multi-factor interaction analysis, and analysis of variance, which are disclosed in Hinkelmann, Klaus and Kempthorne, Oscar (2008), Design and Analysis of Experiments. 1 and II (Second ed.), Wiley. ISBN 978-0-470-38551-7; Hinkelmann, Klaus and Kempthorne, Oscar (2008), Design and Analysis of Experiments, Volume I: Introduction to Experimental Design (Second ed.), Wiley. ISBN 978-0-471-72756-9; Hinkelmann, Klaus and Kempthorne, Oscar (2005), Design and Analysis of Experiments, Volume 2: Advanced Experimental Design (First ed.), Wiley. ISBN 978-0-471-55177-5; Tabachnick, Barbara G. & Fidell, Linda S. (2007), Using Multivariate Statistics (5th ed.), Boston: Pearson International Edition. ISBN 978-0-205-45938-4; and Gelman, Andrew (2005), “Analysis of variance? Why it is more important than ever”, The Annals of Statistics 33: 1-53, doi:10.1214/009053604000001048, all of which are hereby incorporated herein by reference.
- Each machine-learning sensor algorithm is preferably individually optimized to increase its accuracy.
- Step 4. Deploy the sensor combination on the live network.
- Now that the heterogeneous sensor pair has been created, the sensors can be used for network defense.
- It is known to combine sensors of different technologies in Intrusion Detection and Prevention Systems, see Scarfone, Karen; Mell, Peter (February 2007),“Guide to Intrusion Detection and Prevention Systems (IDPS)”, Computer Security Resource Center (National Institute of Standards and Technology) (800-94), incorporated herein by reference. However, the present invention actually combines two network-based sensors, instead of two different technologies.
- The following is a detailed description of the presently preferred embodiments.
- Step 1. Determine and verify the blind spot of a signature-based sensor.
- The first step in our training process involves using a signature-based sensor with an up-to-date signature library. Scripted attacks are presented to the signature-based sensor to determine the blind spot of the signature sensor. Our attack script is a battery of automated network attacks that covers enough breadth and depth of exploits that represents a comprehensive attack profile.
- Penetration-testing tools are used to build an attack script consisting of a series of attacks representative of the known threats on the network to be defended. The script contains multiple types of attacks and their variants (using evasion techniques). This approach is similar to other automated penetration testing and vulnerability assessment tools, but was specifically designed by us for network sensor evaluation. Penetration testing and vulnerability assessment tools evaluate computer network nodes/targets and not the non-networked intrusion detection system sensors themselves. However, this new use of penetration testing tools is important for evaluating and discovering a sensor's blind spot.
- Step 2. Build a machine-learning sensor training dataset.
- Machine-learning sensors require three different types of training data to build their models: 1) tagged normal, 2) tagged malicious, and 3) untagged network traffic samples. Traffic samples are created from packet-capture applications that make a copy of network traffic data-stream (bits) and store them in memory. The term “tagged” means that the training sample is presented to the machine-learning sensor with its category already determined and labeled.
- The first type is tagged normal traffic from the network where the sensor combination will be employed. As one cannot guarantee the “cleanliness” of live network data, a variety of procedures to verify and sanitize the live network data is necessary to make the tagged normal traffic. These procedures include both manual and automated traffic inspection to verify the lack of network attacks in the normal traffic samples.
- The second type is tagged malicious traffic (attack samples). This is traffic either culled from archives of attacks found on a live network, or attacks generated in a lab with the same hacker tools that would be used on a live network.
- The third type of training data is untagged data. This data consists of straight network packet-capture, but without the sanitizing and labeling techniques administered above. This data contains both attacks and normal traffic (but not labeled) from the targeted network. Untagged data training is a machine learning technique for increasing the number of training samples without having to spend the arduous time and expense of labeling every sample. The machine-learning algorithms also employ other learning techniques that need the “untagged” data samples.
- Step 3. Optimize the machine-learning sensor.
- Using the three types of training data described in the above section, the machine-learning sensor is trained to model the live network and to detect malicious attacks. Training, however, is just the term used by machine learning scientists for processing the training samples with the sensor's algorithm. After a baseline model is established (by the algorithm), iterative testing is done to increase the effectiveness (reduction of false positives) of the machine-learning sensor. The results of these iterative tests are analyzed using statistical tools to determine the best usage of the training data. Because of the iterative nature of this training, the sensor can be considered to be a heuristic sensor.
- Step 4. Deploy the sensor combination on the live network.
- A heterogeneous sensor pair is placed where the network training samples were taken. Each sensor is somewhat complementary to the other, so that (in addition to both detecting known attacks) they should each detect different types of attacks, thus creating cumulative synergy greater than their individual parts. The signature-based sensor will catch known, subscription library attacks (including any that are outside the machine learning sensors' training), and the machine learning sensors will catch known attacks that are within its training, as well as any variant (signature blind spot) attacks and “zero-days” that evade the signature-based sensor. Together, the heterogeneous sensor pair provides a comprehensive computer network intrusion detection system that has been lacking on contemporary networks.
- Accordingly, as can be seen from the above, the invention is a process for defending a network of computers against attack, comprising inspecting network traffic for malicious data using a signature-based sensor and simultaneously inspecting the network traffic for malicious data using a machine-learning based sensor. The machine-learning based sensor has been trained to detect attacks on blind spots of the signature-based sensor by modifying patterns of attack on the signature-based sensor to compile blind spot malicious samples that avoid intrusion detection by the signature-based sensor. The blind spot malicious samples are then tagged as tagged malicious samples. Samples of a normal portion of normal network traffic patterns are then acquired and sanitized, to obtain normal samples, which are then tagged as tagged normal samples. The portions of the normal network traffic that are not in the normal portion are tagged as untagged samples. A machine-learning training dataset comprising the tagged malicious samples, the tagged normal samples, and the untagged samples, is then presented to the machine-learning based sensor to create models of normal network traffic and to detect samples that fail to conform to the models of normal network traffic as malicious data. The accuracy of the machine-learning sensor is then iteratively tested using the models of normal network traffic to reduce false positives and to achieve iteratively tested models of normal network traffic. The machine-learning sensor then recognizes malicious data as data that fails to conform to the iteratively tested models of normal traffic, with a reduced rate of false positives, and the signature-based sensor recognizes as malicious data any network traffic that matches signatures provided to said signature-based sensor.
- The invention optionally further comprises acquiring archived malicious samples from archives of attacks on live networks, which are then tagging as malicious samples included in the machine-learning dataset.
- The modifying step can be performed by applying evasion techniques to attacks that are detected by the signature-based sensor until the signature-based sensor fails to detect the attacks. Preferably, the evasion techniques are selected from the group consisting of obfuscation, fragmentation and encryption.
- Preferably, the iteratively testing step is performed by using statistical techniques selected from the group consisting of design of experiments, multi-factor interaction analysis, and analysis of variance.
- Preferably also, the acquiring step is performed at a location in the network where the sensors will be deployed.
- A system according to the present invention comprises a network of computers, with a signature-based sensor and a machine-learning based sensor deployed in the network to simultaneously inspect network traffic for malicious data. The machine-learning based sensor recognizes as malicious data any network traffic that fails to conform to models of normal network traffic that have been iteratively tested to reduce false positives. The signature-based sensor recognizes as malicious data any network traffic that matches signatures provided to said signature-based sensor.
- Preferably, the machine-learning sensor has been trained by a training process, comprising modifying patterns of attack on the signature-based sensor to compile blind spot malicious samples that avoid intrusion detection by the signature-based sensor. The training process includes tagging the blind spot malicious samples as tagged malicious samples, acquiring samples of normal network traffic patterns, sanitizing a normal portion of the samples of normal network traffic patterns to obtain normal samples, tagging the normal samples as tagged normal samples, and tagging a portion of the samples of normal network traffic that are not the normal portion as untagged samples. A machine-learning training dataset including the tagged malicious samples, the tagged normal samples, and the untagged samples, is then presented to the machine-learning based sensor to create models of normal network traffic and to detect samples that fail to conform to the models of normal network traffic as malicious data. The accuracy of the machine-learning based sensor is then iteratively tested using the models of normal network traffic to reduce false positives of the machine-learning based sensor and to achieve iteratively tested models of normal network traffic.
- Preferably, the machine-learning sensor has been trained by a process further comprising acquiring archived malicious samples from archives of attacks on live networks, tagging the archived malicious samples as malicious and including the archived malicious samples in the machine-learning dataset.
- Although the invention has been disclosed in connection with the presently preferred best mode described above, it should be understood that this disclosure includes words of description and illustration, rather than words of limitation. There may be other embodiments of the invention that fall within the spirit and scope of the invention, as defined by the claims. Accordingly, no limitations are to be implied or inferred in this invention except as specifically and explicitly set forth in the claims.
- This invention is applicable wherever it is desired to protect computer networks against attacks.
Claims (1)
1. A system, comprising:
a network of computers;
a signature-based sensor and a machine-learning based sensor deployed in said network to simultaneously inspect network traffic for malicious data;
wherein said machine-learning based sensor recognizes as malicious data any network traffic that fails to conform to models of normal network traffic that have been iteratively tested to reduce false positives; and
wherein said signature-based sensor recognizes as malicious data any network traffic that matches signatures provided to said signature-based sensor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/531,858 US20150052609A1 (en) | 2013-03-14 | 2014-11-03 | Heterogeneous sensors for network defense |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/828,510 US8887285B2 (en) | 2013-03-14 | 2013-03-14 | Heterogeneous sensors for network defense |
US14/531,858 US20150052609A1 (en) | 2013-03-14 | 2014-11-03 | Heterogeneous sensors for network defense |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/828,510 Continuation US8887285B2 (en) | 2013-03-14 | 2013-03-14 | Heterogeneous sensors for network defense |
Publications (1)
Publication Number | Publication Date |
---|---|
US20150052609A1 true US20150052609A1 (en) | 2015-02-19 |
Family
ID=51535103
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/828,510 Active 2033-06-13 US8887285B2 (en) | 2013-03-14 | 2013-03-14 | Heterogeneous sensors for network defense |
US14/531,858 Abandoned US20150052609A1 (en) | 2013-03-14 | 2014-11-03 | Heterogeneous sensors for network defense |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/828,510 Active 2033-06-13 US8887285B2 (en) | 2013-03-14 | 2013-03-14 | Heterogeneous sensors for network defense |
Country Status (1)
Country | Link |
---|---|
US (2) | US8887285B2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200320438A1 (en) * | 2019-04-05 | 2020-10-08 | Zscaler, Inc. | Prudent ensemble models in machine learning with high precision for use in network security |
US10839312B2 (en) | 2016-08-09 | 2020-11-17 | International Business Machines Corporation | Warning filter based on machine learning |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9497204B2 (en) * | 2013-08-30 | 2016-11-15 | Ut-Battelle, Llc | In-situ trainable intrusion detection system |
US10469514B2 (en) * | 2014-06-23 | 2019-11-05 | Hewlett Packard Enterprise Development Lp | Collaborative and adaptive threat intelligence for computer security |
US9483742B1 (en) * | 2014-10-27 | 2016-11-01 | Amazon Technologies, Inc. | Intelligent traffic analysis to detect malicious activity |
US9720814B2 (en) | 2015-05-22 | 2017-08-01 | Microsoft Technology Licensing, Llc | Template identification for control of testing |
US10142353B2 (en) | 2015-06-05 | 2018-11-27 | Cisco Technology, Inc. | System for monitoring and managing datacenters |
US10536357B2 (en) | 2015-06-05 | 2020-01-14 | Cisco Technology, Inc. | Late data detection in data center |
US10033766B2 (en) * | 2015-06-05 | 2018-07-24 | Cisco Technology, Inc. | Policy-driven compliance |
SG10201507051WA (en) * | 2015-09-03 | 2017-04-27 | Certis Cisco Security Pte Ltd | System and method for high frequency heuristic data acquisition and analytics of information security events |
US10187413B2 (en) * | 2016-03-25 | 2019-01-22 | Cisco Technology, Inc. | Network-based approach for training supervised learning classifiers |
US10581901B2 (en) * | 2016-03-25 | 2020-03-03 | Cisco Technology, Inc. | Increased granularity and anomaly correlation using multi-layer distributed analytics in the network |
US10757121B2 (en) * | 2016-03-25 | 2020-08-25 | Cisco Technology, Inc. | Distributed anomaly detection management |
US10764310B2 (en) | 2016-03-25 | 2020-09-01 | Cisco Technology, Inc. | Distributed feedback loops from threat intelligence feeds to distributed machine learning systems |
US10733530B2 (en) * | 2016-12-08 | 2020-08-04 | Resurgo, Llc | Machine learning model evaluation in cyber defense |
US10652261B2 (en) * | 2017-02-01 | 2020-05-12 | Splunk Inc. | Computer-implemented system and method for creating an environment for detecting malicious content |
US11070581B1 (en) * | 2017-08-24 | 2021-07-20 | Wells Fargo Bank, N.A. | Eliminating network security blind spots |
US11106792B2 (en) * | 2019-03-29 | 2021-08-31 | Acronis International Gmbh | Methods and systems for performing a dynamic analysis of applications for protecting devices from malwares |
US11201896B1 (en) | 2019-05-07 | 2021-12-14 | Rapid7, Inc. | Vulnerability validation using lightweight offensive payloads |
CN112311744A (en) * | 2019-08-02 | 2021-02-02 | 南京信安融慧网络技术有限公司 | Monitoring system and monitoring method for monitoring network security in real time |
JP7615571B2 (en) * | 2020-08-25 | 2025-01-17 | 富士フイルムビジネスイノベーション株式会社 | Information processing device and program |
CN112118268A (en) * | 2020-09-28 | 2020-12-22 | 北京嘀嘀无限科技发展有限公司 | Network flow judgment method and system |
CN113269258A (en) * | 2021-05-27 | 2021-08-17 | 郑州大学 | Semi-supervised learning label noise defense algorithm based on AdaBoost |
EP4099621A3 (en) * | 2021-06-01 | 2023-03-22 | Cytwist Ltd. | Artificial intelligence cyber identity classification |
CN114189350B (en) * | 2021-10-20 | 2023-03-07 | 北京交通大学 | A method of intrusion detection for train communication network based on LightGBM |
CN114079579B (en) * | 2021-10-21 | 2024-03-15 | 北京天融信网络安全技术有限公司 | Malicious encryption traffic detection method and device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060137009A1 (en) * | 2004-12-22 | 2006-06-22 | V-Secure Technologies, Inc. | Stateful attack protection |
US7099320B1 (en) * | 2002-04-19 | 2006-08-29 | Conxion Corporation | Method and apparatus for detection of and response to abnormal data streams in high bandwidth data pipes |
US20070226796A1 (en) * | 2006-03-21 | 2007-09-27 | Logan Gilbert | Tactical and strategic attack detection and prediction |
US20070289013A1 (en) * | 2006-06-08 | 2007-12-13 | Keng Leng Albert Lim | Method and system for anomaly detection using a collective set of unsupervised machine-learning algorithms |
US7540025B2 (en) * | 2004-11-18 | 2009-05-26 | Cisco Technology, Inc. | Mitigating network attacks using automatic signature generation |
US7845007B1 (en) * | 2000-04-28 | 2010-11-30 | International Business Machines Corporation | Method and system for intrusion detection in a computer network |
-
2013
- 2013-03-14 US US13/828,510 patent/US8887285B2/en active Active
-
2014
- 2014-11-03 US US14/531,858 patent/US20150052609A1/en not_active Abandoned
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7845007B1 (en) * | 2000-04-28 | 2010-11-30 | International Business Machines Corporation | Method and system for intrusion detection in a computer network |
US7099320B1 (en) * | 2002-04-19 | 2006-08-29 | Conxion Corporation | Method and apparatus for detection of and response to abnormal data streams in high bandwidth data pipes |
US7540025B2 (en) * | 2004-11-18 | 2009-05-26 | Cisco Technology, Inc. | Mitigating network attacks using automatic signature generation |
US20060137009A1 (en) * | 2004-12-22 | 2006-06-22 | V-Secure Technologies, Inc. | Stateful attack protection |
US20070226796A1 (en) * | 2006-03-21 | 2007-09-27 | Logan Gilbert | Tactical and strategic attack detection and prediction |
US20070289013A1 (en) * | 2006-06-08 | 2007-12-13 | Keng Leng Albert Lim | Method and system for anomaly detection using a collective set of unsupervised machine-learning algorithms |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10839312B2 (en) | 2016-08-09 | 2020-11-17 | International Business Machines Corporation | Warning filter based on machine learning |
US20200320438A1 (en) * | 2019-04-05 | 2020-10-08 | Zscaler, Inc. | Prudent ensemble models in machine learning with high precision for use in network security |
US11669779B2 (en) * | 2019-04-05 | 2023-06-06 | Zscaler, Inc. | Prudent ensemble models in machine learning with high precision for use in network security |
Also Published As
Publication number | Publication date |
---|---|
US20140283052A1 (en) | 2014-09-18 |
US8887285B2 (en) | 2014-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8887285B2 (en) | Heterogeneous sensors for network defense | |
US12238140B2 (en) | Artificial intelligence based analyst as an evaluator | |
CN110602042B (en) | APT attack behavior analysis and detection method and device based on cascade attack chain model | |
CA2916203C (en) | Heterogeneous sensors for network defense | |
Abdullayev et al. | SQL injection attack: Quick view | |
CN116781430B (en) | Network information security system and method for gas pipe network | |
Asif et al. | Network intrusion detection and its strategic importance | |
US9641545B2 (en) | Methods, systems, and computer program products for detecting communication anomalies in a network based on overlap between sets of users communicating with entities in the network | |
US10462170B1 (en) | Systems and methods for log and snort synchronized threat detection | |
Pecchia et al. | Identifying compromised users in shared computing infrastructures: A data-driven bayesian network approach | |
Santos et al. | IT/OT convergence in industry 4.0: risks and analisy of the problems | |
Pastrana et al. | Randomized anagram revisited | |
Barabas et al. | Behavioral signature generation using shadow honeypot | |
Iqbal et al. | Ontology generation of advanced persistent threats and their automated analysis | |
Saxena et al. | Advanced Persistent Threat Datasets for Industrial IoT: A Survey | |
Rowe et al. | Challenges in monitoring cyberarms compliance | |
Liu et al. | An entropy-based method for attack detection in large scale network | |
Quader et al. | Persistent threat pattern discovery | |
Syamsul Arifin et al. | Securing the Internet of Medical Things: A Machine Learning Approach for Cyber Threat Detection. | |
Barbu et al. | Intruder monitoring system for local networks using Python | |
Wang et al. | Research on the Application and Testing Method of AI Firewalls in Network Attack Detection | |
Favour | Improving Cyber Defense Mechanisms Against Wi-Fi Phishing Through ARM-Based Insights | |
Kaddour et al. | Evaluating the Performance of Machine Learning-Based Classification Models for IoT Intrusion Detection | |
CN112637217B (en) | Active defense method and device of cloud computing system based on bait generation | |
Lim et al. | Comparison and Analysis of Anomaly Detection Methods for Detecting Data Exfiltration |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |