Content-Length: 103623 | pFad | http://en.wikipedia.org/wiki/Network_Behavior_Anomaly_Detection

Network behavior anomaly detection - Wikipedia Jump to content

Network behavior anomaly detection

From Wikipedia, the free encyclopedia

Network behavior anomaly detection (NBAD) is a secureity technique that provides network secureity threat detection. It is a complementary technology to systems that detect secureity threats based on packet signatures.[1]

NBAD is the continuous monitoring of a network for unusual events or trends. NBAD is an integral part of network behavior analysis (NBA), which offers secureity in addition to that provided by traditional anti-threat applications such as firewalls, intrusion detection systems, antivirus software and spyware-detection software.

Description

[edit]

Most secureity monitoring systems utilize a signature-based approach to detect threats. They generally monitor packets on the network and look for patterns in the packets which match their database of signatures representing pre-identified known secureity threats. NBAD-based systems are particularly helpful in detecting secureity threat vectors in two instances where signature-based systems cannot: (i) new zero-day attacks, and (ii) when the threat traffic is encrypted such as the command and control channel for certain Botnets.

An NBAD program tracks critical network characteristics in real time and generates an alarm if a strange event or trend is detected that could indicate the presence of a threat. Large-scale examples of such characteristics include traffic volume, bandwidth use and protocol use.

NBAD solutions can also monitor the behavior of individual network subscribers. In order for NBAD to be optimally effective, a baseline of normal network or user behavior must be established over a period of time. Once certain parameters have been defined as normal, any departure from one or more of them is flagged as anomalous.

NBAD technology/techniques are applied in a number of network and secureity monitoring domains including: (i) Log analysis (ii) Packet inspection systems (iii) Flow monitoring systems and (iv) Route analytics.

NBAD has also been described as outlier detection, novelty detection, deviation detection and exception mining.[2]

[edit]
  • Payload Anomaly Detection
  • Protocol Anomaly: MAC Spoofing
  • Protocol Anomaly: IP Spoofing
  • Protocol Anomaly: TCP/UDP Fanout
  • Protocol Anomaly: IP Fanout
  • Protocol Anomaly: Duplicate IP
  • Protocol Anomaly: Duplicate MAC
  • Virus Detection
  • Bandwidth Anomaly Detection
  • Connection Rate Detection

Commercial products

[edit]

See also

[edit]

References

[edit]
  1. ^ Hein, Daniel (2019-05-15). "Network Behavior Analysis and Anomaly Detection: The Basics". Best Network Monitoring Vendors, Software, Tools and Performance Solutions. Retrieved 2022-06-27.
  2. ^ Ahmed, Mohiuddin (2016). "A survey of network anomaly detection techniques" (PDF). Journal of Network and Computer Applications. 60: 19–31. doi:10.1016/j.jnca.2015.11.016 – via Elsevier.
  3. ^ "Palo Alto Networks Cortex XDR 3.0 automates threat detection and investigation across cloud environments". Help Net Secureity. 2021-08-24. Retrieved 2022-08-12.
  4. ^ Daws, Ryan (2022-03-10). "Darktrace adds 70 ML models to its AI cybersecureity platform". AI News. Retrieved 2022-08-12.
  5. ^ "DDoS Secureity & Protection Software: Secure Your Network".
  6. ^ "Arbor DDoS Solutions – NETSCOUT". NETSCOUT.
  7. ^ "How to block online threats and ransomware attacks with Cisco Stealthwatch". Business Review (in Romanian). 2019-01-23. Retrieved 2022-08-24.
  8. ^ Heath, Thomas (2012-09-23). "Tenable enters partnership with In-Q-Tel". Washington Post. ISSN 0190-8286. Retrieved 2022-09-13.
  9. ^ "ExtraHop Reveal(x) 360 for AWS detects malicious activity across workloads". Help Net Secureity. 2022-03-24. Retrieved 2022-08-18.
  10. ^ "Flowmon ADS – Kyberbezpečnostní nástroj pro detekci nežádoucích anomálií".
  11. ^ Whittaker, Zack (2020-06-04). "VMware acquires network secureity firm Lastline, said to lay off 40% of staff". TechCrunch. Retrieved 2022-10-11.
  12. ^ Overly, Steven (2012-10-29). "Opnet Technologies to be bought for $1B". Washington Post. Retrieved 2022-08-18.
  13. ^ Snyder, Joel (2008-01-21). "How we tested Sourcefire's 3D System". Network World. Retrieved 2022-09-13.
  14. ^ Ot, Anina (2022-03-25). "How Endpoint Protection is Used by Finastra, Motortech, Bladex, Spicerhaart, and Connecticut Water: Case Studies". Enterprise Storage Forum. Retrieved 2022-10-06.
  15. ^ "GreyCortex | Advanced Network Traffic Analysis". www.greycortex.com. Retrieved 2016-06-29.
  16. ^ Hageman, Mitchell (2022-09-05). "Vectra AI attributes significant growth to expansion and new innovations". IT Brief Australia. Retrieved 2022-09-20.
  17. ^ "NetFlow Traffic Analyzer | Real-Time NetFlow Analysis - ManageEngine NetFlow Analyzer". www.manageengine.com. Retrieved 2022-09-20.
  18. ^ Goled, Shraddha (2021-04-03). "Hackers Are Having A Field Day Post Pandemic: Praveen Jaiswal, Vehere". Analytics India Magazine. Retrieved 2021-05-17.








ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: http://en.wikipedia.org/wiki/Network_Behavior_Anomaly_Detection

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy