发明申请
- 专利标题: SYSTEMS, METHODS, AND DEVICES FOR DETECTING SECURITY VULNERABILITIES IN IP NETWORKS
-
申请号: US12361501申请日: 2009-01-28
-
公开(公告)号: US20100125663A1公开(公告)日: 2010-05-20
- 发明人: John J. Donovan , Daniar Hussain , Adam Ierymenko , Paul Parisi , Richard Person , Marc Siegel , Charles Stefanidakis
- 申请人: John J. Donovan , Daniar Hussain , Adam Ierymenko , Paul Parisi , Richard Person , Marc Siegel , Charles Stefanidakis
- 主分类号: G06F21/00
- IPC分类号: G06F21/00 ; G06F15/173 ; G06N5/02
摘要:
This invention is a system, method, and apparatus for detecting compromise of IP devices that make up an IP-based network. One embodiment is a method for detecting and alerting on the following conditions: (1) Denial of Service Attack; (2) Unauthorized Usage Attack (for an IP camera, unauthorized person seeing a camera image); and (3) Spoofing Attack (for an IP camera, unauthorized person seeing substitute images). A survey of services running on the IP device, historical benchmark data, and traceroute information may be used to detect a possible Denial of Service Attack. A detailed log analysis and a passive DNS compromise system may be used to detect a possible unauthorized usage. Finally, a fingerprint (a hash of device configuration data) may be used as a private key to detect a possible spoofing attack. The present invention may be used to help mitigate intrusions and vulnerabilities in IP networks.
信息查询