Movatterモバイル変換


[0]ホーム

URL:


US20230128061A1 - Unsupervised encoder-decoder neural network security event detection - Google Patents

Unsupervised encoder-decoder neural network security event detection
Download PDF

Info

Publication number
US20230128061A1
US20230128061A1US18/045,315US202218045315AUS2023128061A1US 20230128061 A1US20230128061 A1US 20230128061A1US 202218045315 AUS202218045315 AUS 202218045315AUS 2023128061 A1US2023128061 A1US 2023128061A1
Authority
US
United States
Prior art keywords
domain name
name system
vector
dns
aggregate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US18/045,315
Inventor
Yaron Koral
Rensheng Wang Zhang
Eric Noel
Patrick Velardo, JR.
Richard Hellstern
Swapna Buccapatnam Tirumala
Anestis Karasaridis
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AT&T Intellectual Property I LP
AT&T Technical Services Co Inc
Original Assignee
AT&T Intellectual Property I LP
AT&T Technical Services Co Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AT&T Intellectual Property I LP, AT&T Technical Services Co IncfiledCriticalAT&T Intellectual Property I LP
Priority to US18/045,315priorityCriticalpatent/US20230128061A1/en
Assigned to AT&T Technical Services Company, Inc.reassignmentAT&T Technical Services Company, Inc.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: HELLSTERN, RICHARD
Assigned to AT&T INTELLECTUAL PROPERTY I, L.P.reassignmentAT&T INTELLECTUAL PROPERTY I, L.P.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: VELARDO, PATRICK, JR., KARASARIDIS, ANESTIS, KORAL, YARON, NOEL, ERIC, TIRUMALA, SWAPNA BUCCAPATNAM, ZHANG, RENSHENG WANG
Publication of US20230128061A1publicationCriticalpatent/US20230128061A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method may include a processing system having at least one processor obtaining a first plurality of domain name system traffic records, generating an input aggregate vector from the first plurality of domain name system traffic records, where the input aggregate vector comprises a plurality of features derived from the first plurality of domain name system traffic records, and applying an encoder-decoder neural network to the input aggregate vector to generate a reconstructed vector, where the encoder-decoder neural network is trained with a plurality of aggregate vectors generated from a second plurality of domain name system traffic records. In one example, the processing system may then calculate a distance between the input aggregate vector and the reconstructed vector, and apply at least one remedial action associated with the first plurality of domain name system traffic records when the distance is greater than a threshold distance.

Description

Claims (20)

What is claimed is:
1. A method comprising:
generating, by a processing system including at least one processor, an input aggregate vector from a first plurality of domain name system traffic records, wherein the input aggregate vector comprises a plurality of features derived from the first plurality of domain name system traffic records;
applying, by the processing system, an encoder-decoder neural network to the input aggregate vector to generate a reconstructed vector, wherein the encoder-decoder neural network is trained with a plurality of aggregate vectors generated from a second plurality of domain name system traffic records;
calculating, by the processing system, a distance between the input aggregate vector and the reconstructed vector; and
applying, by the processing system, at least one remedial action associated with the first plurality of domain name system traffic records when the distance is greater than a threshold distance.
2. The method ofclaim 1, further comprising:
obtaining the second plurality of domain name system traffic records;
generating the plurality of aggregate vectors from the second plurality of domain name system traffic records, wherein each of the plurality of aggregate vectors comprises a plurality of features derived from the second plurality of domain name system traffic records; and
training the encoder-decoder neural network with the plurality of aggregate vectors.
3. The method ofclaim 2, wherein the training comprises, for each of the plurality of aggregate vectors:
a feedforward pass; and
a backpropagation of a deviation measure.
4. The method ofclaim 2, wherein the plurality of features derived from the first plurality of domain name system traffic records and the plurality of features derived from the second plurality of domain name system traffic records are of a same set of feature types.
5. The method ofclaim 2, wherein the first plurality of domain name system traffic records and the second plurality of domain name system traffic records are associated with domain name system queries from at least one domain name system resolver to at least one domain name system authoritative server.
6. The method ofclaim 5, wherein each of the input aggregate vector and the plurality of aggregate vectors comprises aggregate information associated with domain name system traffic for one of the at least one domain name system resolver over a designated time period.
7. The method ofclaim 6, wherein the aggregate information comprises, for the one of the at least one domain name system resolver and for the designated time period, at least one of:
a number of queries received;
a number of queries sent;
a number of domain name system authoritative servers contacted;
an average time-to-live value for the queries received;
an average domain name length in the queries received;
a number of unique top level domains included in the queries received; or
a number of unique second level domains included in the queries received.
8. The method ofclaim 6, wherein the aggregate information comprises, for the one of the at least one domain name system resolver and for the designated time period, at least one of:
a number of domain name system resolvers contacting a domain name system authoritative server that is most contacted by the one of the at least one domain name system resolver; or
a number of queries received by the domain name system authoritative server that is most contacted by the one of the at least one domain name system resolver.
9. The method ofclaim 1, wherein the encoder-decoder neural network is to encode the input aggregate vector as a compressed vector representation and to decode the compressed vector representation as the reconstructed vector.
10. The method ofclaim 9, wherein the compressed vector representation comprises between two features and four features.
11. The method ofclaim 9, wherein the encoder-decoder neural network comprises between five layers and nine layers.
12. The method ofclaim 9, further comprising:
identifying a plurality of clusters from a plurality of compressed vector representations associated with each of a plurality of input aggregate vectors, the plurality of input aggregate vectors including the input aggregate vector.
13. The method ofclaim 12, wherein the plurality of clusters is identified in a feature space having a plurality of dimensions in accordance with the plurality of compressed vector representations.
14. The method ofclaim 13, further comprising:
plotting the plurality of compressed vector representations in a graph in accordance with the feature space;
generating at least one visual identifier for at least one of the plurality of clusters for the graph; and
providing the graph including the at least one visual identifier for presentation via at least one display.
15. The method ofclaim 12, further comprising:
obtaining a first label for a first cluster of the plurality of clusters, the first label associated with a first domain name system traffic anomaly type;
detecting an additional input aggregate vector associated with the first cluster; and
applying at least one additional remedial action, wherein the at least one additional remedial action is assigned to the first domain name system traffic anomaly type.
16. The method ofclaim 1, wherein, when the distance is greater than the threshold distance, the first plurality of domain name system traffic records is categorized as anomalous domain name system traffic records.
17. The method ofclaim 16, wherein the at least one remedial action comprises:
forwarding a domain name system query from a source associated with the first plurality of domain name system traffic records to a domain name system authoritative server that is designated to process domain name system queries associated with the anomalous domain name system traffic records.
18. The method ofclaim 16, wherein the at least one remedial action comprises:
dropping a domain name system query from a source associated with the first plurality of domain name system traffic records.
19. A non-transitory computer-readable medium storing instructions which, when executed by a processing system including at least one processor, cause the processing system to perform operations, the operations comprising:
generating an input aggregate vector from a first plurality of domain name system traffic records, wherein the input aggregate vector comprises a plurality of features derived from the first plurality of domain name system traffic records;
applying an encoder-decoder neural network to the input aggregate vector to generate a reconstructed vector, wherein the encoder-decoder neural network is trained with a plurality of aggregate vectors generated from a second plurality of domain name system traffic records;
calculating a distance between the input aggregate vector and the reconstructed vector; and
applying at least one remedial action associated with the first plurality of domain name system traffic records when the distance is greater than a threshold distance.
20. A device comprising:
a processing system including at least one processor; and
a computer-readable medium storing instructions which, when executed by the processing system, cause the processing system to perform operations, the operations comprising:
generating an input aggregate vector from a first plurality of domain name system traffic records, wherein the input aggregate vector comprises a plurality of features derived from the first plurality of domain name system traffic records;
applying an encoder-decoder neural network to the input aggregate vector to generate a reconstructed vector, wherein the encoder-decoder neural network is trained with a plurality of aggregate vectors generated from a second plurality of domain name system traffic records;
calculating a distance between the input aggregate vector and the reconstructed vector; and
applying at least one remedial action associated with the first plurality of domain name system traffic records when the distance is greater than a threshold distance.
US18/045,3152018-10-032022-10-10Unsupervised encoder-decoder neural network security event detectionAbandonedUS20230128061A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US18/045,315US20230128061A1 (en)2018-10-032022-10-10Unsupervised encoder-decoder neural network security event detection

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US16/150,834US11470101B2 (en)2018-10-032018-10-03Unsupervised encoder-decoder neural network security event detection
US18/045,315US20230128061A1 (en)2018-10-032022-10-10Unsupervised encoder-decoder neural network security event detection

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US16/150,834ContinuationUS11470101B2 (en)2018-10-032018-10-03Unsupervised encoder-decoder neural network security event detection

Publications (1)

Publication NumberPublication Date
US20230128061A1true US20230128061A1 (en)2023-04-27

Family

ID=70052676

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US16/150,834Active2041-08-12US11470101B2 (en)2018-10-032018-10-03Unsupervised encoder-decoder neural network security event detection
US18/045,315AbandonedUS20230128061A1 (en)2018-10-032022-10-10Unsupervised encoder-decoder neural network security event detection

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US16/150,834Active2041-08-12US11470101B2 (en)2018-10-032018-10-03Unsupervised encoder-decoder neural network security event detection

Country Status (1)

CountryLink
US (2)US11470101B2 (en)

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109711483B (en)*2019-01-082020-10-27西安交通大学Spark Autoencoder-based power system operation mode clustering method
KR20200108523A (en)*2019-03-052020-09-21주식회사 엘렉시System and Method for Detection of Anomaly Pattern
US11356466B2 (en)*2019-03-072022-06-07Microsoft Technology Licensing, LlcReconstructing network activity from sampled network data using archetypal analysis
US11190508B2 (en)*2019-06-272021-11-30Vmware, Inc.Location-aware service request handling
US12155575B2 (en)*2019-07-122024-11-26Nippon Telegraph And Telephone CorporationExtraction device, extraction method, and extraction program
US11343275B2 (en)*2019-09-172022-05-24Fortinet, Inc.Detecting potential domain name system (DNS) hijacking by identifying anomalous changes to DNS records
US11509667B2 (en)*2019-10-192022-11-22Microsoft Technology Licensing, LlcPredictive internet resource reputation assessment
US11595357B2 (en)*2019-10-232023-02-28Cisco Technology, Inc.Identifying DNS tunneling domain names by aggregating features per subdomain
US11115338B2 (en)*2019-12-102021-09-07Hughes Network Systems, LlcIntelligent conversion of internet domain names to vector embeddings
US20230344846A1 (en)*2019-12-232023-10-26Boon Logic Inc.Method for network traffic analysis
US11599568B2 (en)*2020-01-292023-03-07EMC IP Holding Company LLCMonitoring an enterprise system utilizing hierarchical clustering of strings in data records
US11625438B2 (en)*2020-03-232023-04-11Dell Products L.P.Monitoring information processing systems utilizing co-clustering of strings in different sets of data records
US11431751B2 (en)2020-03-312022-08-30Microsoft Technology Licensing, LlcLive forensic browsing of URLs
JP2021189658A (en)*2020-05-282021-12-13富士フイルムビジネスイノベーション株式会社Information processing device and information processing program
JP7384751B2 (en)*2020-06-152023-11-21Kddi株式会社 Learning data generation device, model learning device, learning data generation method, and computer program
US11722504B2 (en)*2020-12-262023-08-08Nozomi Networks SaglMethod and apparatus for detecting anomalies of a DNS traffic
CN112769974A (en)*2020-12-302021-05-07亚信科技(成都)有限公司Domain name detection method, system and storage medium
US20220237468A1 (en)*2021-01-272022-07-28The Bank Of New York MellonMethods and systems for using machine learning models that generate cluster-specific temporal representations for time series data in computer networks
CN112995218A (en)*2021-04-302021-06-18新华三人工智能科技有限公司Domain name anomaly detection method, device and equipment
CN113570861B (en)*2021-07-262022-09-27浙江财经大学 A traffic flow prediction method and device based on synthetic data
US11853149B2 (en)*2021-09-102023-12-26International Business Machines CorporationGenerating error event descriptions using context-specific attention
CN114006745B (en)*2021-10-282024-01-26西安热工研究院有限公司Network intrusion flow classification method based on improved self-encoder
CN114024770B (en)*2021-12-102024-02-13天融信雄安网络安全技术有限公司Trojan intrusion detection method and device, electronic equipment and storage medium
FR3135850A1 (en)*2022-05-172023-11-24Orange Method for detecting routing anomalies between autonomous systems
CN114978667B (en)*2022-05-172024-02-09安捷光通科技成都有限公司 A DDoS attack detection method in SDN network based on graph neural network
US12411947B2 (en)*2022-12-292025-09-09Check Point Software Technologies Ltd.DNS tunneling detection and prevention
US20250097245A1 (en)*2023-09-152025-03-20Infoblox Inc.Applying natural language processing anomaly measures as features for dns tunneling detection
US20250280034A1 (en)*2024-02-292025-09-04Oracle International CorporationDynamic time slice autoencoder network anomaly detection
CN118368132B (en)*2024-05-152024-11-26北京火山引擎科技有限公司 Flow detection method, device, electronic device, storage medium and program product

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6769066B1 (en)1999-10-252004-07-27Visa International Service AssociationMethod and apparatus for training a neural network model for use in computer network intrusion detection
EP1280298A1 (en)2001-07-262003-01-29BRITISH TELECOMMUNICATIONS public limited companyMethod and apparatus of detecting network activity
US7017186B2 (en)2002-07-302006-03-21Steelcloud, Inc.Intrusion detection system using self-organizing clusters
US8028337B1 (en)2005-08-302011-09-27Sprint Communications Company L.P.Profile-aware filtering of network traffic
ES2442747T3 (en)2011-02-102014-02-13Telefónica, S.A. Procedure and system to improve the detection of security threats in communication networks
GB201218218D0 (en)2012-10-102012-11-21Univ LancasterComputer networks
WO2014094034A1 (en)2012-12-202014-06-26Newsouth Innovations Pty LimitedComputer intrusion detection
EP2833594A1 (en)2013-07-312015-02-04Siemens AktiengesellschaftFeature based three stage neural networks intrusion detection method and system
US9870537B2 (en)2014-01-062018-01-16Cisco Technology, Inc.Distributed learning in a computer network
US9747551B2 (en)*2014-09-292017-08-29Pivotal Software, Inc.Determining and localizing anomalous network behavior
US10044751B2 (en)2015-12-282018-08-07Arbor Networks, Inc.Using recurrent neural networks to defeat DNS denial of service attacks
US10187413B2 (en)2016-03-252019-01-22Cisco Technology, Inc.Network-based approach for training supervised learning classifiers
US20170328194A1 (en)2016-04-252017-11-16University Of Southern CaliforniaAutoencoder-derived features as inputs to classification algorithms for predicting failures
US10257214B2 (en)2016-06-232019-04-09Cisco Technology, Inc.Using a machine learning classifier to assign a data retention priority for network forensics and retrospective detection
GB2555192B (en)2016-08-022021-11-24Invincea IncMethods and apparatus for detecting and identifying malware by mapping feature data into a semantic space
US10649794B2 (en)2016-08-112020-05-12Twitter, Inc.Aggregate features for machine learning
US10375143B2 (en)2016-08-262019-08-06Cisco Technology, Inc.Learning indicators of compromise with hierarchical models
US10154051B2 (en)2016-08-312018-12-11Cisco Technology, Inc.Automatic detection of network threats based on modeling sequential behavior in network traffic
US10637874B2 (en)2016-09-012020-04-28Cylance Inc.Container file analysis using machine learning model
KR101907752B1 (en)2016-10-172018-10-12숭실대학교산학협력단SDN capable of detection DDoS attacks using artificial intelligence and controller including the same
CN106656981B (en)2016-10-212020-04-28东软集团股份有限公司Network intrusion detection method and device
US20180144241A1 (en)2016-11-222018-05-24Mitsubishi Electric Research Laboratories, Inc.Active Learning Method for Training Artificial Neural Networks
US10594712B2 (en)2016-12-062020-03-17General Electric CompanySystems and methods for cyber-attack detection at sample speed
US10121103B2 (en)2016-12-092018-11-06Cisco Technologies, Inc.Scalable deep learning video analytics
US10574575B2 (en)*2018-01-252020-02-25Cisco Technology, Inc.Network flow stitching using middle box flow stitching

Also Published As

Publication numberPublication date
US20200112574A1 (en)2020-04-09
US11470101B2 (en)2022-10-11

Similar Documents

PublicationPublication DateTitle
US20230128061A1 (en)Unsupervised encoder-decoder neural network security event detection
US10834106B2 (en)Network security event detection via normalized distance based clustering
US10834114B2 (en)Multi-tiered server architecture to mitigate malicious traffic
US10986135B2 (en)Advanced asset tracking and correlation
US11245716B2 (en)Composing and applying security monitoring rules to a target environment
US10505932B2 (en)Method and system for tracking machines on a network using fuzzy GUID technology
US9531738B2 (en)Cyber security adaptive analytics threat monitoring system and method
US11122063B2 (en)Malicious domain scoping recommendation system
US9838407B1 (en)Detection of malicious web activity in enterprise computer networks
US10264027B2 (en)Computer-implemented process and system employing outlier score detection for identifying and detecting scenario-specific data elements from a dynamic data source
US10686807B2 (en)Intrusion detection system
US10621180B2 (en)Attribute-based detection of anomalous relational database queries
US20180069883A1 (en)Detection of Known and Unknown Malicious Domains
EP4243362B1 (en)Network device identification
US12105694B2 (en)Data harmonization across multiple sources
Nadji et al.Connected colors: Unveiling the structure of criminal networks
Mahajan et al.A deep learning approach to detection and mitigation of distributed denial of service attacks in high availability intelligent transport systems
Panigrahi et al.Analytical Validation and Integration of CIC-Bell-DNS-EXF-2021 Dataset on Security Information and Event Management
Huang et al.Detect malicious IP addresses using cross-protocol analysis
Morichetta et al.LENTA: Longitudinal exploration for network traffic analysis from passive data
Sarabi et al.Smart internet probing: Scanning using adaptive machine learning
Dahanayaka et al.Inline traffic analysis attacks on DNS over HTTPS
Alserhani et al.Detection of coordinated attacks using alert correlation model
US20220327419A1 (en)Increasing inclusivity in machine learning outputs
PashamokhtariManaging Networked IoT Assets Using Practical and Scalable Traffic Inference

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:AT&T INTELLECTUAL PROPERTY I, L.P., GEORGIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KORAL, YARON;ZHANG, RENSHENG WANG;NOEL, ERIC;AND OTHERS;SIGNING DATES FROM 20180829 TO 20180904;REEL/FRAME:061621/0535

Owner name:AT&T TECHNICAL SERVICES COMPANY, INC., VIRGINIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HELLSTERN, RICHARD;REEL/FRAME:061621/0570

Effective date:20190313

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp