20240048570. Device and Method for Generating a Response to an Attack in a Communication Network Using Machine Learning simplified abstract (NOKIA TECHNOLOGIES OY)

From WikiPatents
Jump to navigation Jump to search

Device and Method for Generating a Response to an Attack in a Communication Network Using Machine Learning

Organization Name

NOKIA TECHNOLOGIES OY

Inventor(s)

Siwar Kriaa of Antony (FR)

Afef Feki of Sceaux (FR)

Arunkumar Halebid of Bangalore (IN)

Serge Papillon of Paris (FR)

Device and Method for Generating a Response to an Attack in a Communication Network Using Machine Learning - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240048570 titled 'Device and Method for Generating a Response to an Attack in a Communication Network Using Machine Learning

Simplified Explanation

The abstract of this patent application describes a communication network device that is capable of predicting and detecting attacks based on data logs received from the network. The device generates graph representations of the data logs using a predefined schema. Attacks are detected by applying inference rules to the graph representations, while attacks are predicted using a graph neural network trained with subgraphs obtained from querying a graph representation of training data.

  • The device is configured to predict and detect attacks in a communication network.
  • Data logs received from the network are used to generate graph representations based on a predefined schema.
  • Attacks are detected by applying inference rules to the graph representations of the data logs.
  • Attacks are predicted using a graph neural network trained with subgraphs obtained from querying a graph representation of training data.
  • The technology utilizes graph representations and inference rules to identify and respond to attacks in a communication network.

Potential Applications:

  • Network security: This technology can be applied to enhance network security by predicting and detecting attacks in real-time, allowing for immediate response and mitigation.
  • Intrusion detection systems: The device can be integrated into intrusion detection systems to improve their accuracy and effectiveness in identifying and responding to attacks.
  • Cyber threat intelligence: The technology can contribute to the development of cyber threat intelligence systems by providing insights into attack patterns and trends.

Problems Solved:

  • Timely attack detection: The device enables the timely detection of attacks by analyzing data logs and applying inference rules to identify suspicious patterns or behaviors.
  • Attack prediction: By training a graph neural network with subgraphs obtained from training data, the device can predict attacks based on similarities to known attack patterns.
  • Efficient response: The technology allows for a quick response to attacks upon prediction or detection, minimizing potential damage and reducing response time.

Benefits:

  • Enhanced network security: The device improves the overall security of a communication network by predicting and detecting attacks, enabling proactive measures to be taken.
  • Real-time threat response: With the ability to predict and detect attacks, the device facilitates real-time response, allowing for immediate action to mitigate the impact of attacks.
  • Improved accuracy: By utilizing graph representations and inference rules, the technology enhances the accuracy of attack detection and prediction, reducing false positives and false negatives.


Original Abstract Submitted

in a communication network, a device is configured to predict attacks and detect attacks from data logs received from the network and generate a response to an attack upon prediction or detection of an attack. graph representations of data logs are generated based on a predefined schema. attacks are detected by applying inference rules to a graph representation of the data logs. attacks are predicted by using a graph neural network trained with subgraphs obtained by querying a graph representation of training data corresponding to normal traffic and attacks.