Network Behavior Anomaly Detection

Network Behavior Anomaly Detection

Contents

Network Behavior Anomaly Detection (NBAD)

Network behavior anomaly detection (NBAD) is a solution for helping protection against zero-day attacks on the network.

NBAD is the continuous monitoring of a network for unusual events or trends. NBAD is an integral part of network behavior analysis (NBA), which offers security in addition to that provided by traditional anti-threat applications such as firewalls, antivirus software and spyware-detection software.

An NBAD program tracks critical network characteristics in real time and generates an alarm if a strange event or trend is detected that could indicate the presence of a threat. Large-scale examples of such characteristics include traffic volume, bandwidth use and protocol use.

NBAD solutions can also monitor the behavior of individual network subscribers. In order for NBAD to be optimally effective, a baseline of normal network or user behavior must be established over a period of time. Once certain parameters have been defined as normal, any departure from one or more of them is flagged as anomalous.

NBAD should be used in addition to conventional firewalls and applications for the detection of malware. Some vendors have begun to recognize this fact by including NBA/NBAD programs as integral parts of their network security packages.

Popular Threat Detections within NBAD

  • Payload Anomaly Detection
  • Protocol Anomaly: MAC Spoofing
  • Protocol Anomaly: IP Spoofing
  • Protocol Anomaly: TCP/UDP Fanout
  • Protocol Anomaly: IP Fanout
  • Protocol Anomaly: Duplicate IP
  • Protocol Anomaly: Duplicate MAC
  • Virus Detection
  • Bandwidth Anomaly Detection
  • Connection Rate Detection

Commercial NBAD Products

External links


Wikimedia Foundation. 2010.

Игры ⚽ Нужна курсовая?

Look at other dictionaries:

  • Anomaly detection — Anomaly detection, also referred to as outlier detection[1] refers to detecting patterns in a given data set that do not conform to an established normal behavior.[2] The patterns thus detected are called anomalies and often translate to critical …   Wikipedia

  • Network security — In the field of networking, the area of network security[1] consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and… …   Wikipedia

  • Cellular neural network — Cellular neural networks (CNN) are a parallel computing paradigm similar to neural networks, with the difference that communication is allowed between neighbouring units only. Typical applications include image processing, analyzing 3D surfaces,… …   Wikipedia

  • Intrusion detection — In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. When Intrusion detection takes a preventive measure without direct human… …   Wikipedia

  • ProCurve Manager — (PCM) is a Comprehensive Network Management suite for products and solutions by ProCurve Networking, a division of HP. Versions ProCurve Manager comes in two versions; a base version supplied both free of charge with all managed ProCurve Products …   Wikipedia

  • Data mining — Not to be confused with analytics, information extraction, or data analysis. Data mining (the analysis step of the knowledge discovery in databases process,[1] or KDD), a relatively young and interdisciplinary field of computer science[2][3] is… …   Wikipedia

  • Intrusion prevention system — Intrusion Prevention Systems (IPS), also known as Intrusion Detection and Prevention Systems (IDPS), are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention… …   Wikipedia

  • Global Prescience — Looking for a lesson in humility? Stand at a major historical marker, and try drawing a perfectly reasonable, prudent conclusion about where that marker is pointing. Believe me, if you read about a 15th century traveler saying, I have to get back …   Wikipedia

  • Oracle Data Mining — (ODM) is an option of Oracle Corporation s Relational Database Management System (RDBMS) Enterprise Edition (EE). It contains several data mining and data analysis algorithms for classification, prediction, regression, classification,… …   Wikipedia

  • Natural computing — For the scientific journal, see Natural Computing (journal). Natural computing, also called Natural computation, is a terminology introduced to encompass three classes of methods: 1) those that take inspiration from nature for the development of… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”