The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
May. 29, 2018

Filed:

Oct. 26, 2015
Applicant:

National Technology & Engineering Solutions of Sandia, Llc, Albuquerque, NM (US);

Inventors:

Adrian R. Chavez, Albuquerque, NM (US);

William M. S. Stout, Albuquerque, NM (US);

Jason R. Hamlet, Albuquerque, NM (US);

Erik James Lee, Jackson, MO (US);

Mitchell Tyler Martin, Albuquerque, NM (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 21/00 (2013.01); G06F 11/00 (2006.01); H04N 7/16 (2011.01); H04L 29/08 (2006.01); H04L 29/12 (2006.01); G05B 19/05 (2006.01); G06N 99/00 (2010.01);
U.S. Cl.
CPC ...
H04L 63/1441 (2013.01); G05B 19/05 (2013.01); G06N 99/005 (2013.01); H04L 61/2503 (2013.01); H04L 63/1425 (2013.01); H04L 67/327 (2013.01); G05B 2219/1105 (2013.01); H04L 67/10 (2013.01);
Abstract

The various technologies presented herein relate to determining a network attack is taking place, and further to adjust one or more network parameters such that the network becomes dynamically configured. A plurality of machine learning algorithms are configured to recognize an active attack pattern. Notification of the attack can be generated, and knowledge gained from the detected attack pattern can be utilized to improve the knowledge of the algorithms to detect a subsequent attack vector(s). Further, network settings and application communications can be dynamically randomized, wherein artificial diversity converts control systems into moving targets that help mitigate the early reconnaissance stages of an attack. An attack(s) based upon a known static address(es) of a critical infrastructure network device(s) can be mitigated by the dynamic randomization. Network parameters that can be randomized include IP addresses, application port numbers, paths data packets navigate through the network, application randomization, etc.


Find Patent Forward Citations

Loading…