18455307. DETECTING ANOMALOUS COMMUNICATIONS simplified abstract (Robert Bosch GmbH)

From WikiPatents
Jump to navigation Jump to search

DETECTING ANOMALOUS COMMUNICATIONS

Organization Name

Robert Bosch GmbH

Inventor(s)

Paulius Duplys of Markgroeningen (DE)

Simon Greiner of Leonberg (DE)

DETECTING ANOMALOUS COMMUNICATIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18455307 titled 'DETECTING ANOMALOUS COMMUNICATIONS

Simplified Explanation

This patent application describes a method for detecting intrusions on a communications network using decoy instances.

  • Detect intrusion events on a decoy instance hosted by an embedded device.
  • Generate an intrusion event trace based on the detected intrusion event.
  • Transmit the intrusion event trace to an intrusion detection instance for analysis.

Key Features and Innovation

  • Detection of intrusion events on a decoy instance.
  • Generation of intrusion event traces for analysis.
  • Utilization of embedded devices for intrusion detection.

Potential Applications

This technology can be applied in network security systems to enhance intrusion detection capabilities.

Problems Solved

Enhances the ability to detect and respond to intrusions on communications networks.

Benefits

Improved network security through early detection of intrusion events. Enhanced protection of sensitive data and systems from unauthorized access.

Commercial Applications

  • Network security companies can integrate this technology into their products.
  • Government agencies and organizations with high-security needs can benefit from this intrusion detection method.

Prior Art

Readers can explore prior research on intrusion detection systems and network security technologies to understand the evolution of this field.

Frequently Updated Research

Stay informed about the latest advancements in intrusion detection systems and network security technologies to ensure the most effective protection against cyber threats.

Questions about Intrusion Detection

How does this technology improve network security?

This technology enhances network security by detecting and analyzing intrusion events in real-time, allowing for prompt response and mitigation.

What are the potential applications of this intrusion detection method?

This intrusion detection method can be applied in various industries, including cybersecurity, government agencies, and organizations with high-security requirements.


Original Abstract Submitted

A computer-implemented method for intrusion detection. The method includes detecting, at a first decoy instance hosted by an embedded device connected to a communications network, an intrusion event generated by an intruding instance that is not hosted by the embedded device, generating an intrusion event trace based on the detected intrusion event, and transmitting the intrusion event trace from the first decoy instance to a first intrusion detection instance that is communicably coupled to the embedded device.