Abstract: The various technologies presented herein relate to determining a network
attack is taking place, and further to adjust one or more network
parameters such that the network becomes dynamically configured. A
plurality of machine learning algorithms are configured to recognize an
active attack pattern. Notification of the attack can be generated, and
knowledge gained from the detected attack pattern can be utilized to
improve the knowledge of the algorithms to detect a subsequent attack
vector(s). Further, network settings and application communications can
be dynamically randomized, wherein artificial diversity converts control
systems into moving targets that help mitigate the early reconnaissance
stages of an attack. An attack(s) based upon a known static address(es)
of a critical infrastructure network device(s) can be mitigated by the
dynamic randomization. Network parameters that can be randomized include
IP addresses, application port numbers, paths data packets navigate
through the network, application randomization, etc. |
Filed: 10/26/2015 |
Application Number: 14/923049 |
This invention was made with Government support under Contract No. DE-NA0003525 awarded by the United States Department of Energy/National Nuclear Security Administration. The Government has certain rights in the invention. |
Attribution for Derwent World Patents Index Records published on Sandia ® echo date('Y'); ?> Clarivate. All rights reserved. Republication or redistribution of Clarivate content, including by framing or similar means, is prohibited without the prior written consent of Clarivate. Clarivate and its logo, as well as all other trademarks used herein are trademarks of their respective owners and used under license. |